How to Protect yourself While Hacking in Kali Linux!

If you want to defend yourself and protect your identity while performing security audits and doing enumeration against firewalls. In that case, we’ll discuss various techniques you can use to protect your identity and conduct your scanning without worry.
For this tutorial, we’ll be using Kali Linux operating system.
If you’re fuzzing or exploiting a company or individual, you should enforce these methods to protect your privacy.
Hacking over the internet?
Changing (spoofing) your MAC address
In this case, we use the network adapter “wlan0” for hacking. Replace “wlan0” with your network adapter.
Open a Terminal and Type:
ifconfig //to check your network adapter in my case "wlan0" ifconfig wlan0 down macchanger -m 00:11:22:33:44:55 // you can use any MAC you want ifconfig wlan0 up
Install Tor & Proxy
sudo apt-get install tor privoxy // this will download and install tor and privoxy sudo apt-get install vidalia polipo sudo apt-get install gedit // this step is optional. You can use any text editor you want but i prefer gedit sudo gedit /etc/privoxy/config // scroll down and put following line at the bottom and save the file : forward-socks4a / localhost:9050 /etc/init.d/tor start && /etc/init.d/privoxy start // this will start tor & privoxy
Now, open the IceWeasel Browser or any other browser and change proxy settings to:
Proxy IP: 127.0.0.1 Proxy Port: 9050 Type: Socks5
Hacking on Local Networks?
Open a Terminal and Type:
ifconfig //to check your network adapter in my case "wlan0" ifconfig wlan0 down macchanger -m 00:11:22:33:44:55 // you can use any MAC you want ifconfig wlan0 up
Changing your Hostname
If a Network Admin sees a machine in his network named kali-364 or Kali-Linux or something like this he will definitely know that there is something wrong. To prevent this we have to change our hostname to something that matches the internal network scheme.
Example:
If the computers in this network got hostnames like Peter-01, Peter-02, Peter-03 .. up to Peter-91, you should choose a hostname like “Peter-92” to stay undetected.
Open a Terminal and type:
gedit hostname//change the hostname and save gedit hosts //change the hosts and save the file sudo reboot
Closing Ports
Many network admins and ids will detect Linux machines automatically cause of the open ports like 22 for SSH.
To check your open Ports open a terminal and type:
nmap 127.0.0.1
Now check your open ports and close them. You can close the ports by stopping the service.
Example Port 22:
service ssh stop
Example Port 80:
service apache2 stop
If we want to be undetected we also have to turn off the ping request. After this, your Kali Linux box doesn`t reply to ping requests anymore.
Open a Terminal ad type:
echo 1 >/proc/sys/net/ipv4/icmp_echo_ignore_all
Please use this only for hacking/pen-testing on allowed networks and not for illegal things, Black Hat. If you have any questions, just let me know.