HOW TO INSTALL UBUNTU 20.04 ON YOUR SYSTEM USING VM-WARE

Image
SYSTEM REQUIREMENTS:  1. MINIMUM OF 2GB RAM FOR YOUR VMWARE IS REQUIRED TO INSTALL    UBUNTU 20.04 BUT 4GB OF RAM IS HIGHLY RECOMENDED. 2. MINIMUM OF 20GB STORAGE IS REQUIRED.I PREFER 30-40GB IF YOU CAN  EFFORT. 3. ANY INTEL OR IT'S EQUIVALENT AMD-PROCESSOR WITH MINIMUM i3 10th GEN.I PREFER i5 10th gen. THESE ARE THE BASIC SYSTEM REQUIREMENTS FOR INSTALLATION OF UBUNTU 20.04   DOWNLOADING ISO IMAGE: FOR INSTALLATION OF UBUNTU,WE NEED ISO FILE WITH 20.04 VERSION SO GO TO THE OFFICIAL WEBSITE GIVEN BELOW:     CLICK HERE     AFTER DOWNLOADING ISO FILE FOLLOW THESE STEPS: 1. OPEN YOUR VM-WARE:     IF VMWARE IS NOT INSTALLED IN YOUR SYSYTEM THEN       CLICK HERE        NOW,CLICK ON NEW VIRTUAL MACHINE.     NOW,CLICK ON TYPICAL,AS DEFAULT AND CLICK NEXT.   NOW,CLICK ON I WILL INSTALL THE OPERATING STSTEM LATER AND CLICK NEXT. NOW,SELECT THE TYPE OF OPERATING SYSTEM AS LINUX AND CLICK NEXT.   NOW,BROWSE THE PATH WHERE YOU WANT TO INSTALL IN YOUR SYSTEM AND SET A NAME FOR YOUR VIRTUAL MACH

HOW TO SURF ANONYMOSLY USING PROXY-CHAINS

 Hello friends ,today i'm going to share with u,about proxychains       configuration and how to use them.



what is meant my proxy?
proxy is ,dealing with someone or something in place of specific person.


In our scenario,we surf over internet and leave our footprints like ip address in the logs of visted web-site's server.
when u want to surf something anonoymosly ,here we deal with proxy generally proxy servers are and paid and non-paid,paid proxyserver are easy to setup and gives more features at low risk whereas free-proxy severs their is no gaureente that they maintain privacy and risk is high.where using a proxy dosen't mean you are surfing anonymously because your logs are saved in proxy server. if proxy server gives the logs then your anoymity goes revealed so..........Here comes the role of proxy-chains.



Proxy-chians ;The proxy servers located in different countries and connected to-gether and form as proxy-chains even FBI want to trace you they want to seek permissions of around 6 countries ,it's not an easy task and take more to trace you..............


Do you want to use proxychains then i'll teach u how easy to configure them.

Configure Proxy-chains In Your Kali Machine:

1.open terminal and follow this commands:
   apt-get install
   apt-get update
   apt-get upgrade
2. To run proxychains you must need Tor service.
   apt-get install tor
   apt-get update
   apt-get upgrade
3.To know the status of tor service ,type:$ service tor status
   To start tor service:$service tor start
   To restart tor service:$service tor restart
4.To configure proxychains you must know the file where it located.
   To loacate the proxychains configuration file type
   $locate proxychains.conf
   The default location is /etc/proxychains
5.Open proxychains config file with leaf pad or nano editor.
     To open with leafpad:$leafpad /etc/proxychains.conf
     To open with nano editor :$nano /etc/proxychains.conf
6.Now you get a code as given below:
      We are going to use dynamic chain here so un comment line starts with dynamic chain and                      comment the strict chain where defatly uncommented.
      U can just copy and paste whole file to get error free configuration
      and set your port to 9050 to local ip127.0.0.1 with socks 4 and socks 5 and hith ctrl-X to save and          exit.
cofigurtion file:
# proxychains.conf  VER 4
#
#        HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS.
#   

# The option below identifies how the ProxyList is treated.
# only one option should be uncommented at time,
# otherwise the last appearing option will be accepted
#
dynamic_chain
#
# Dynamic - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# at least one proxy must be online to play in chain
# (dead proxies are skipped)
# otherwise EINTR is returned to the app
#
#strict_chain
#
# Strict - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# all proxies must be online to play in chain
# otherwise EINTR is returned to the app
#
#random_chain
#
# Random - Each connection will be done via random proxy
# (or proxy chain, see  chain_len) from the list.
# this option is good to test your IDS :)

# Make sense only if random_chain
#chain_len = 2

# Quiet mode (no output from library)
#quiet_mode

# Proxy DNS requests - no leak for DNS data
proxy_dns 

# set the class A subnet number to usefor use of the internal remote DNS mapping
# we use the reserved 224.x.x.x range by default,
# if the proxified app does a DNS request, we will return an IP from that range.
# on further accesses to this ip we will send the saved DNS name to the proxy.
# in case some control-freak app checks the returned ip, and denies to 
# connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x.
# of course you should make sure that the proxified app does not need
# *real* access to this subnet. 
# i.e. dont use the same subnet then in the localnet section
#remote_dns_subnet 127 
#remote_dns_subnet 10
remote_dns_subnet 224

# Some timeouts in milliseconds
tcp_read_time_out 15000
tcp_connect_time_out 8000

# By default enable localnet for loopback address ranges
# RFC5735 Loopback address range
localnet 127.0.0.0/255.0.0.0
# RFC1918 Private Address Ranges
# localnet 10.0.0.0/255.0.0.0
# localnet 172.16.0.0/255.240.0.0
# localnet 192.168.0.0/255.255.0.0


# Example for localnet exclusion
## Exclude connections to 192.168.1.0/24 with port 80
# localnet 192.168.1.0:80/255.255.255.0

## Exclude connections to 192.168.100.0/24
# localnet 192.168.100.0/255.255.255.0

## Exclude connections to ANYwhere with port 80
# localnet 0.0.0.0:80/0.0.0.0

# ProxyList format
#       type  host  port [user pass]
#       (values separated by 'tab' or 'blank')
#
#
#        Examples:
#
#               socks5  192.168.67.78   1080    lamer   secret
#       http    192.168.89.3    8080    justu   hidden
#       socks4  192.168.1.49    1080
#           http    192.168.39.93   8080    
#       
#
#       proxy types: http, socks4, socks5
#        ( auth types supported: "basic"-http  "user/pass"-socks )
#
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks5 127.0.0.1 9050
socks4 127.0.0.1 9050
Now start surfing anoymously by typing:$proxychains firefox.

Comments

Popular posts from this blog

HOW TO INSTALL UBUNTU 20.04 ON YOUR SYSTEM USING VM-WARE

How to install windows 10 operating system