Every time we send a packet to our intended target, that packet contains our IP address in the IP header.When we make a TCP connection, the target system will log our IP address as it logs all connections.

Now that we have put a proxy between us and any traffic we send, let's test it out.The basic concept of proxy chaining is discussed now in this section we will discuss the practical aspect of Proxy Chaining, Proxy Chains (Proxy Chains) is an open source program which allows you to make TCP and DNS connection by using proxy for example TOR.In Kali Linux proxychains is already configured but if you are using any other version of Linux you may download it from official website.All we can do is make detection MUCH harder, and proxychains can help do this for us.Memory Forensics is the analysis of the memory image taken from the running computer.

Leave a Reply