How do attackers use compromised home PCs as proxy chains to anonymize themselves?

So I've researched techniques attackers use to hide their IP and one of the ways mentioned is using other people's machines to launch their attacks. Let's say an attacker wanted to use a browser to perform tasks on a particular website and want to remain anonymous, can they use their compromised machines like proxy chains to hide their original IP and what techniques do they use to do this?

submitted by /u/Lanky-Librarian8521
[link] [comments]

from hacking: security in practice https://ift.tt/TSh5zrY

Comments