Advertisement
Guest User

ProxyChains + Tor

a guest
Oct 13th, 2012
586
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.08 KB | None | 0 0
  1. ProxyChains + Tor
  2. I've decided to whip up a quick guide on Proxychains + Tor. What is ProxyChains? An awesome program that chains together different proxies and uses them on any program you want. This means if you want to have a chain of proxies going through nmap or metasploit or any other program, you can! As for tor, you can read more about it at Tor Project: Overview
  3.  
  4. Anyways, on with the tutorial. Proxychains is fairly easy and straightforward to use. I prefer it because it can be run through almost any program. This includes SSH :)
  5.  
  6. To install it, simply type:
  7. Code:
  8. sudo aptitude install proxychains
  9. In your terminal. Once this is done, install tor. Follow the tutorial at
  10. Tor: Linux/BSD/Unix Install Instructions
  11. This is a great tutorial for getting tor and polipo up and running on your system.
  12.  
  13. Once you've gotten tor, polipo and proxychains, you should be ready to go.
  14. Step 1:
  15. Edit your proxychains.conf file. This is located in /etc/proxychains.conf. Just type
  16. sudo geany /etc/proxychain.conf
  17.  
  18. You can replace geany with any file editor you choose. I prefer nano, but geany is a good visual text editor.
  19.  
  20. Step 2:
  21. Edit that bitch. On the top couple lines you'll see this:
  22.  
  23. # The option below identifies how the ProxyList is treated.
  24. # only one option should be uncommented at time,
  25. # otherwise the last appearing option will be accepted
  26. #
  27. #dynamic_chain
  28. #
  29. # Dynamic - Each connection will be done via chained proxies
  30. # all proxies chained in the order as they appear in the list
  31. # at least one proxy must be online to play in chain
  32. # (dead proxies are skipped)
  33. # otherwise EINTR is returned to the app
  34. #
  35. strict_chain
  36. #
  37. # Strict - Each connection will be done via chained proxies
  38. # all proxies chained in the order as they appear in the list
  39. # all proxies must be online to play in chain
  40. # otherwise EINTR is returned to the app
  41. #
  42. #random_chain
  43. #
  44. # Random - Each connection will be done via random proxy
  45. # (or proxy chain, see chain_len) from the list.
  46. # this option is good to test your IDS :)
  47. I'd recommend deleting the # in front of strict_chain, because it always works best for me. Or you can use random_chain or dynamic_chain. Their definitions are below them.
  48.  
  49. Step3:
  50. Get proxies. Just go on google and search for some. ProxyChains accepts http, socks4 and socks5 proxies.
  51. KEEP the line that says:
  52. Code:
  53. socks4 127.0.0.1 9050
  54. That's so it can connect to tor. Under that, just place your proxies. This is what mine looks like:
  55. Code:
  56. socks4 127.0.0.1 9050
  57. socks5 72.218.43.131 5033
  58. socks4 178.239.57.16 1080
  59. socks4 117.79.94.160 1080
  60. You can add more if you'd like. Just save and exit the editor when your done.
  61.  
  62. Step 4:
  63. Run proxychains. This is easy. Just type this into your terminal:
  64. Code:
  65. proxychains <program>
  66. For example, if I want to run proxychains through nmap:
  67. Code:
  68. proxychains nmap -sS google.com
  69. Or metasploit:
  70. Code:
  71. proxychains msfconsole
  72. If you want to run proxychains on SSH or something similar, you may need greater privileges. Just add sudo in front of the command and you should be able to connect to SSH through proxychains.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement