PROXYCHAINS | KALI LINUX | ETHICAL HACKING

PROXYCHAINS-CONFIGURATION

Proxychains

Proxychains is open source software for Linux systems and comes pre installed with Kali Linux, the tool redirect TCP connections through proxies like Socks, Tor, HTTP(S) and it allows us to chain proxy servers.

Uses
  • With proxychains we can hide the IP address of the sourcetraffic and evade IDS and Firewalls.
  • It can be used in the situations like when we want to avoid giving up our IP address or when scanning a target or visiting a website.
Benfits

Chainging multiple proxies makes it difficult to track down the source IP Address of rhe TCP connection, the application gives us a way to hide ourselves and stay anonymous.

Drawbacks

The proxychained proxy servers are likely to log your traffic and have to obey local law and jurisdiction.

To use proxychains follow to steps below-



1. UPGRADE/UPDATE and INSTALL TOR

Upgrade and Update the os

sudo apt-get update
sudo apt-get upgrade

Install the tor service

sudo apt-get install tor

Start Tor service

sudo service tor start

Display Tor service status

sudo service tor status

**It is must to run tor service to use proxychains.

2. CONFIGURE PROXYCHAINS

The proxychains configuration file is located in the '/etc/' directory 

Edit the configuration file 

sudo nano /etc/proxychains.conf

There are three methods we can run proxychains.

1. strict_chain - is the default option in the proxychains, every connection goes through the proxies in order that is llisted in the listed in the configuration file. Strict chaining is the best used when you want the source traffic appear from a particular locations.

2. dynamic_chain - works like the strict chain but it does not require all the proxies in the configuration file. If a proxy is down then the connection will jump to the next proxy server in the list.

3. random_chain - randomnesses proxy connections from the list on the configuration file, the chain of proxy will look different to the target.

Uncomment out the “dynamic_chains” line, it will enable dynamic chaining.

Uncomment “chain_len” if you are using random_chain , the parameter establishes the number of IP addresses in the chain which are utilized in generating your randomized chain of proxies.

By default proxychains sends traffic through the host at 127.0.0.1 on port 9050. This is the default Tor configuration, if you are planing to use Tor leave the “defaults set to “tor” as it is. If you are not using Tor, you will need to comment out this line.

Add proxy servers to the proxychains configuration file -

there are free proxy servers on the Internet, you can find them here in the site spys.one.

Before adding custom proxies add Tor socks5 support, and socks5  127.0.0.1  9050

Prevent DNS leaks, uncomment “Proxy DNS requests – no leak for DNS data”.

Exit ans Save it by commands

To save the configured file: ctrl+o click enter 
To exit the editor: ctrl+x

3. PROXYCHAINS SYNTAX

Verify that the proxychain is working.

proxychains firefox www.whatsmyip.org

proxychains with nmap to scan a network 

proxychains nmap 1.1.1.1


We learnt how to start, configure and use proxychains in this article. Suppose you like it.

Share the content to your friends.
For more content and queries FOLLOW our blog.

Thank you.

Post a Comment

0 Comments