How do hackers or cybersecurity researchers cover their tracks during visiting or scanning any website or any cyber attack? Today, in this article we will discuss an important concept which is Proxying. Proxying is a technique bouncing your internet traffic through multiple machines to hide the real identity of your original machine. For achieving this goal we can use a tool which is ProxyChains. So in this article, I am gonna show how to setup Proxychains in Kali Linux.