Skip to main content

How to Hacker anonymous on internet using proxy chain server


 

proxy change (ip change in continusely 3 sec)

open kali linux < open terminal < give commands: < proxychains < cd /etc < apply kali password < sudo nano /etc/proxychains4.conf < systemctl start tor < system status tor < proxychains4 firefox


               Mac Address Change

proxychains4 nmap -p 22 -sV scanme.nmap.org < ip addr < macchanger < macchanger --help < sudo macchanger -r eth0 < apply kali linux password 

Comments

Popular posts from this blog

How to contribute open source projects at github

Select an organization < check the repo, which is already mention in the organization < click fork < after forking, the same repo copy will be added to your personal github account repo < we chould clone repo < so open git bash in desired file manager folder < then run git clone repolink.git < the repo is successfully cloned to your local computer < then you can make contributions (openly). To fetch latest code use the command "git  pull origin 'main branch'"  (double quotes). {It helps to fetch original->updated code from the main repo.} < Then you can do your other branch according to big issues, e.g., {fix/livechat-transfer-comment-wrap, feature/totp-field-identification}->according to issues that you solved. < To create a branch, you should run this command in terminal/powershell: < git checkout -b feature/totp-field-identification. <  To check git status for how many branches exist and which branch you are currentl...

Coder vs Developer vs Hacker

                              CODER->DEVELOPER->HACKER coder is starting point it means-->>write code>build logic>learn programming languages(like:c,cpp,python,js,java etc.)>learn dsa(data structure and algorithm)>doing cp(competitive programming) developer is second point it means-->>build something>create product from coding (coder)>we can say full stack developer hacker is third point it means-->>find bugs or vulnerabilities>it can destroy build product>it can saves product     start with coder then move developer then move hacker