Hello friends ,today i'm going to share with u,about proxychains configuration and how to use them.
what is meant my proxy?
proxy is ,dealing with someone or something in place of specific person.
In our scenario,we surf over internet and leave our footprints like ip address in the logs of visted web-site's server.
when u want to surf something anonoymosly ,here we deal with proxy generally proxy servers are and paid and non-paid,paid proxyserver are easy to setup and gives more features at low risk whereas free-proxy severs their is no gaureente that they maintain privacy and risk is high.where using a proxy dosen't mean you are surfing anonymously because your logs are saved in proxy server. if proxy server gives the logs then your anoymity goes revealed so..........Here comes the role of proxy-chains.
Proxy-chians ;The proxy servers located in different countries and connected to-gether and form as proxy-chains even FBI want to trace you they want to seek permissions of around 6 countries ,it's not an easy task and take more to trace you..............
Do you want to use proxychains then i'll teach u how easy to configure them.
Configure Proxy-chains In Your Kali Machine:
1.open terminal and follow this commands:
apt-get install
apt-get update
apt-get upgrade
2. To run proxychains you must need Tor service.
apt-get install tor
apt-get update
apt-get upgrade
3.To know the status of tor service ,type:$ service tor status
To start tor service:$service tor start
To restart tor service:$service tor restart
4.To configure proxychains you must know the file where it located.
To loacate the proxychains configuration file type
$locate proxychains.conf
The default location is /etc/proxychains
5.Open proxychains config file with leaf pad or nano editor.
To open with leafpad:$leafpad /etc/proxychains.conf
To open with nano editor :$nano /etc/proxychains.conf
6.Now you get a code as given below:
We are going to use dynamic chain here so un comment line starts with dynamic chain and comment the strict chain where defatly uncommented.
U can just copy and paste whole file to get error free configuration
and set your port to 9050 to local ip127.0.0.1 with socks 4 and socks 5 and hith ctrl-X to save and exit.
cofigurtion file:
# proxychains.conf VER 4
#
# HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS.
#
# The option below identifies how the ProxyList is treated.
# only one option should be uncommented at time,
# otherwise the last appearing option will be accepted
#
dynamic_chain
#
# Dynamic - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# at least one proxy must be online to play in chain
# (dead proxies are skipped)
# otherwise EINTR is returned to the app
#
#strict_chain
#
# Strict - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# all proxies must be online to play in chain
# otherwise EINTR is returned to the app
#
#random_chain
#
# Random - Each connection will be done via random proxy
# (or proxy chain, see chain_len) from the list.
# this option is good to test your IDS :)
# Make sense only if random_chain
#chain_len = 2
# Quiet mode (no output from library)
#quiet_mode
# Proxy DNS requests - no leak for DNS data
proxy_dns
# set the class A subnet number to usefor use of the internal remote DNS mapping
# we use the reserved 224.x.x.x range by default,
# if the proxified app does a DNS request, we will return an IP from that range.
# on further accesses to this ip we will send the saved DNS name to the proxy.
# in case some control-freak app checks the returned ip, and denies to
# connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x.
# of course you should make sure that the proxified app does not need
# *real* access to this subnet.
# i.e. dont use the same subnet then in the localnet section
#remote_dns_subnet 127
#remote_dns_subnet 10
remote_dns_subnet 224
# Some timeouts in milliseconds
tcp_read_time_out 15000
tcp_connect_time_out 8000
# By default enable localnet for loopback address ranges
# RFC5735 Loopback address range
localnet 127.0.0.0/255.0.0.0
# RFC1918 Private Address Ranges
# localnet 10.0.0.0/255.0.0.0
# localnet 172.16.0.0/255.240.0.0
# localnet 192.168.0.0/255.255.0.0
# Example for localnet exclusion
## Exclude connections to 192.168.1.0/24 with port 80
# localnet 192.168.1.0:80/255.255.255.0
## Exclude connections to 192.168.100.0/24
# localnet 192.168.100.0/255.255.255.0
## Exclude connections to ANYwhere with port 80
# localnet 0.0.0.0:80/0.0.0.0
# ProxyList format
# type host port [user pass]
# (values separated by 'tab' or 'blank')
#
#
# Examples:
#
# socks5 192.168.67.78 1080 lamer secret
# http 192.168.89.3 8080 justu hidden
# socks4 192.168.1.49 1080
# http 192.168.39.93 8080
#
#
# proxy types: http, socks4, socks5
# ( auth types supported: "basic"-http "user/pass"-socks )
#
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks5 127.0.0.1 9050
socks4 127.0.0.1 9050
Now start surfing anoymously by typing:$proxychains firefox.
Comments
Post a Comment