Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ProxyChains + Tor
- I've decided to whip up a quick guide on Proxychains + Tor. What is ProxyChains? An awesome program that chains together different proxies and uses them on any program you want. This means if you want to have a chain of proxies going through nmap or metasploit or any other program, you can! As for tor, you can read more about it at Tor Project: Overview
- Anyways, on with the tutorial. Proxychains is fairly easy and straightforward to use. I prefer it because it can be run through almost any program. This includes SSH :)
- To install it, simply type:
- Code:
- sudo aptitude install proxychains
- In your terminal. Once this is done, install tor. Follow the tutorial at
- Tor: Linux/BSD/Unix Install Instructions
- This is a great tutorial for getting tor and polipo up and running on your system.
- Once you've gotten tor, polipo and proxychains, you should be ready to go.
- Step 1:
- Edit your proxychains.conf file. This is located in /etc/proxychains.conf. Just type
- sudo geany /etc/proxychain.conf
- You can replace geany with any file editor you choose. I prefer nano, but geany is a good visual text editor.
- Step 2:
- Edit that bitch. On the top couple lines you'll see this:
- # The option below identifies how the ProxyList is treated.
- # only one option should be uncommented at time,
- # otherwise the last appearing option will be accepted
- #
- #dynamic_chain
- #
- # Dynamic - Each connection will be done via chained proxies
- # all proxies chained in the order as they appear in the list
- # at least one proxy must be online to play in chain
- # (dead proxies are skipped)
- # otherwise EINTR is returned to the app
- #
- strict_chain
- #
- # Strict - Each connection will be done via chained proxies
- # all proxies chained in the order as they appear in the list
- # all proxies must be online to play in chain
- # otherwise EINTR is returned to the app
- #
- #random_chain
- #
- # Random - Each connection will be done via random proxy
- # (or proxy chain, see chain_len) from the list.
- # this option is good to test your IDS :)
- I'd recommend deleting the # in front of strict_chain, because it always works best for me. Or you can use random_chain or dynamic_chain. Their definitions are below them.
- Step3:
- Get proxies. Just go on google and search for some. ProxyChains accepts http, socks4 and socks5 proxies.
- KEEP the line that says:
- Code:
- socks4 127.0.0.1 9050
- That's so it can connect to tor. Under that, just place your proxies. This is what mine looks like:
- Code:
- socks4 127.0.0.1 9050
- socks5 72.218.43.131 5033
- socks4 178.239.57.16 1080
- socks4 117.79.94.160 1080
- You can add more if you'd like. Just save and exit the editor when your done.
- Step 4:
- Run proxychains. This is easy. Just type this into your terminal:
- Code:
- proxychains <program>
- For example, if I want to run proxychains through nmap:
- Code:
- proxychains nmap -sS google.com
- Or metasploit:
- Code:
- proxychains msfconsole
- If you want to run proxychains on SSH or something similar, you may need greater privileges. Just add sudo in front of the command and you should be able to connect to SSH through proxychains.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement