Proxychain is one of the pre-installed application in Kali Linux, it is available opensource since 2013. It allows hackers to use chain proxy servers includes TOR, SOCKS, HTTP (S) to make the attacker perfectly Anonymous.
By using Proxychains, an attacker can hide his location by hiding his IP address of Source traffic DNS information and firewalls. Some serious work requires Anonymity or some time we don't want to share our information with others we want to share our things.
Proxychains use multiple proxies at once which makes the attacker harder to be tracked. However it some proxy servers likely keep the logs of your traffic and have to obey local laws and jurisdictions.
DISCLAIMER: This software/tutorial is for educational purposes only. It should not be used for illegal activity. The author is not responsible for its use or the user's action.
Step:1 Upgrade/Update & Install Tor
1.1 Upgrade and update the OS.
1.2 Install the tor service.
1.3 Start Tor service.
1.4 Display Tor service status.
NOTE: Tor service needs to run for proxychains to work.
Step2: Configure Proxychains
2.1 The proxychains configuration file is located in the “/etc/” directory edit the configuration file.
sudo nano /etc/proxychains.conf
There are three methods we can run proxychains.
strict_chain
dynamic_chain
random_chain
strict_chain: default option in proxychains, every connection goes through the proxies so that is listed in the configuration file. Strict chaining is best used when you want the source traffic to appear from particular locations.
dynamic_chain: works like the strict chain but it does not require all the proxies in the configuration file to work. If a proxy is down then the connection will jump to the next proxy server in the list.
random_chain: randomnesses proxy connections from the list on the configuration file, the chain of proxy will look different to the target.
Uncomment out the “dynamic_chains” line, it will enable dynamic chaining.
You can also check our latest video on Eash Phishing EFX Tool. Believe me, it's really easy to hack any social media credentials. To visit our blog, you can Click Here
Simply run the command
proxychains firefox www.google.com
Watch this video to understand it better
Enjoy and be Anonymous to the entire world.
By using Proxychains, an attacker can hide his location by hiding his IP address of Source traffic DNS information and firewalls. Some serious work requires Anonymity or some time we don't want to share our information with others we want to share our things.
Proxychains use multiple proxies at once which makes the attacker harder to be tracked. However it some proxy servers likely keep the logs of your traffic and have to obey local laws and jurisdictions.
DISCLAIMER: This software/tutorial is for educational purposes only. It should not be used for illegal activity. The author is not responsible for its use or the user's action.
Step:1 Upgrade/Update & Install Tor
1.1 Upgrade and update the OS.
apt-get update
apt-get upgrade
1.2 Install the tor service.
apt-get install tor
1.3 Start Tor service.
service tor start
1.4 Display Tor service status.
service tor status
NOTE: Tor service needs to run for proxychains to work.
Step2: Configure Proxychains
2.1 The proxychains configuration file is located in the “/etc/” directory edit the configuration file.
sudo nano /etc/proxychains.conf
There are three methods we can run proxychains.
strict_chain
dynamic_chain
random_chain
strict_chain: default option in proxychains, every connection goes through the proxies so that is listed in the configuration file. Strict chaining is best used when you want the source traffic to appear from particular locations.
dynamic_chain: works like the strict chain but it does not require all the proxies in the configuration file to work. If a proxy is down then the connection will jump to the next proxy server in the list.
random_chain: randomnesses proxy connections from the list on the configuration file, the chain of proxy will look different to the target.
Uncomment out the “dynamic_chains” line, it will enable dynamic chaining.
You can also check our latest video on Eash Phishing EFX Tool. Believe me, it's really easy to hack any social media credentials. To visit our blog, you can Click Here
Simply run the command
proxychains firefox www.google.com
Watch this video to understand it better
Enjoy and be Anonymous to the entire world.