HOW TO USE PROXY CHAINS ?
What is Proxy Chains?
Proxy Chains is a UNIX program that hooks network-related libc
functions in dynamically linked programs via a preloaded DLL and redirects the
connections through SOCKS4a/5 or HTTP proxies. This is open source software for
GNU/Linux systems. A tool that forces any TCP connection made by any given
application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or
HTTP(S) proxy.
Supported auth-types: "user/pass" for SOCKS4/5,
"basic" for HTTP.
proxyresolv - DNS resolving. Used to resolve host names via proxy
or TOR.
When to use it? What for? Why?
*When you want two (or more) different proxies in chain:
Like: your_host <--> proxy 1 (TOR) <--> proxy 2
(HTTP or SOCKS4/5) <--> target_host
* You may need it when the only way out from your LAN is through proxy server or to get out from behind restrictive firewall that filters some ports in outgoing traffic.
* You want to do that with some app like telnet. Indeed you can even access your home LAN from outside via reverse proxy if you set it.
* Use external DNS from behind any proxy/firewall.
* Use TOR network with SSH and friends.
* You may need it when the only way out from your LAN is through proxy server or to get out from behind restrictive firewall that filters some ports in outgoing traffic.
* You want to do that with some app like telnet. Indeed you can even access your home LAN from outside via reverse proxy if you set it.
* Use external DNS from behind any proxy/firewall.
* Use TOR network with SSH and friends.
Some Cool Features:
* Different chaining options supported:
Random order from the list ( user defined length of chain ).
Exact order (as they appear in the list )
Dynamic order (smart exclude dead proxies from chain)
Random order from the list ( user defined length of chain ).
Exact order (as they appear in the list )
Dynamic order (smart exclude dead proxies from chain)
* You can use it with any application, even network scanners
Oh yes - you can make portscan via proxy (or chained proxies)
Oh yes - you can make portscan via proxy (or chained proxies)
for example with Nmap scanner (www.insecire.org/nmap).
proxychains nmap -sT -PO -p 80 -iR (find some webservers
through proxy)
through proxy)
* Really long chains supported with tunable timeouts.
Configuration:
Fire up your Kali Linux machine, open terminal and type:
locate proxychains
remember the location.
now take a list of proxy-IP address list and port number from
online websites. (You can get PROXY IP ADDRESS list from
here.)
open terminal again and type:
vim /etc/proxychains.conf
scroll below you will find a line "add proxies
here" paste all proxt-IP address list(which you have downloaded
earlier) here
example:
#add proxy here
socks 26.99.40.36 5678
socks 46.69.14.68 8090
socks 16.99.43.98 2368
socks 116.89.13.110 4658
* If you are using multiple Proxy IP then uncomment:
dynamic_chain
* If you are not using TOR then comment(typed #) the line below:
#socks4 127.0.0.1 9050
* If you are using the TOR then leave this unchanged:
socks4 127.0.0.1 9050
***Important Notes***
If you want to make a random IP from defined Proxy list then
uncomment:
random_chain
Now lets Check how to use Proxy Chain :
> proxychains ping www.google.com
If its start pinging then its set correctly or if it show
google.com not available or denied, then please check that you followed all
steps properly.
We Highly Appreciate Your Feedback,
Support Us To Produce More And More.
Enjoy Have A Good Time :)
If You Have Any Problem Please Comment Below Or Contact Admin:
bsolutionhub@gmail.Com
You Can Also Follow Us On:
Instagram – Best Solution Hub
Comments
Post a Comment