I was playing around with getting wpscan to run through the Tor network so I needed to setup Tor (from source) and Privoxy on BackTrack. These are the steps I took to setup Tor and Privoxy on Backtrack 5 R1. (wpscan does not yet support scanning through the Tor network)
I am no Tor expert and there are probably easier/better ways of doing this.
Installing Tor (Anonymous SOCKS proxy):
$apt-get install libssl-dev
$tar -xzvf tor-0.2.2.32.tar.gz
$chmod +x configure
$./configure && make && src/or/tor
To check that Tor has been setup properly, add the following settings to your Firefox browser and then visit; https://check.torproject.org/
Installing Privoxy (HTTP proxy):
$apt-get install privoxy
$vim /etc/privoxy/config (uncomment line 1257, see comments below)
$kill -9 (privoxy pid, there is probably a much nicer/easier way to do this)
$/usr/sbin/privoxy –pidfile /var/run/privoxy.pid –user privoxy /etc/privoxy/config
To check that Privoxy has been setup properly, add the following settings to your Firefox browser and then visit; http://config.privoxy.org/show-status/
Now all you have to do is point your applications to Privoxy on “127.0.0.1:8118″.
For example, to setup Nikto to use Tor/Privoxy, edit the nikto.conf file, lines 52-53:
# Proxy settings — still must be enabled by -useproxy
And then run Nikto with the following command:
./nikto.pl -host 192.168.1.112 -useproxy
Please read the Tor warning before using Tor:
 Also uncomment the following lines to use tor/privoxy when connecting to machines on your LAN:
# forward 192.168.*.*/ .
# forward 10.*.*.*/ .
# forward 127.*.*.*/ .