PROXYCHAINS-CONFIGURATION
Proxychains is open source software for Linux systems and comes pre installed with Kali Linux, the tool redirect TCP connections through proxies like Socks, Tor, HTTP(S) and it allows us to chain proxy servers.
Uses
- With proxychains we can hide the IP address of the sourcetraffic and evade IDS and Firewalls.
- It can be used in the situations like when we want to avoid giving up our IP address or when scanning a target or visiting a website.
Benfits
Chainging multiple proxies makes it difficult to track down the source IP Address of rhe TCP connection, the application gives us a way to hide ourselves and stay anonymous.
Drawbacks
The proxychained proxy servers are likely to log your traffic and have to obey local law and jurisdiction.
To use proxychains follow to steps below-
1. UPGRADE/UPDATE and INSTALL TOR
Upgrade and Update the os
sudo apt-get update
sudo apt-get upgrade
Install the tor service
sudo apt-get install tor
Start Tor service
sudo service tor start
Display Tor service status
sudo service tor status
**It is must to run tor service to use proxychains.
2. CONFIGURE PROXYCHAINS
The proxychains configuration file is located in the '/etc/' directory
Edit the configuration file
sudo nano /etc/proxychains.conf
There are three methods we can run proxychains.
1. strict_chain - is the default option in the proxychains, every connection goes through the proxies in order that is llisted in the listed in the configuration file. Strict chaining is the best used when you want the source traffic appear from a particular locations.
2. dynamic_chain - works like the strict chain but it does not require all the proxies in the configuration file. If a proxy is down then the connection will jump to the next proxy server in the list.
3. random_chain - randomnesses proxy connections from the list on the configuration file, the chain of proxy will look different to the target.
Uncomment out the “dynamic_chains” line, it will enable dynamic chaining.
Uncomment “chain_len” if you are using random_chain , the parameter establishes the number of IP addresses in the chain which are utilized in generating your randomized chain of proxies.
By default proxychains sends traffic through the host at 127.0.0.1 on port 9050. This is the default Tor configuration, if you are planing to use Tor leave the “defaults set to “tor” as it is. If you are not using Tor, you will need to comment out this line.
Add proxy servers to the proxychains configuration file -
there are free proxy servers on the Internet, you can find them here in the site spys.one.
Before adding custom proxies add Tor socks5 support, and socks5 127.0.0.1 9050
Prevent DNS leaks, uncomment “Proxy DNS requests – no leak for DNS data”.
Exit ans Save it by commands
To save the configured file: ctrl+o click enter
To exit the editor: ctrl+x
3. PROXYCHAINS SYNTAX
Verify that the proxychain is working.
proxychains firefox www.whatsmyip.org
proxychains with nmap to scan a network
proxychains nmap 1.1.1.1
We learnt how to start, configure and use proxychains in this article. Suppose you like it.
Share the content to your friends.
For more content and queries FOLLOW our blog.
Thank you.
0 Comments