Read Time:3 Minute, 25 Second

Proxy-Chains : “H0w to setup?”


What is Proxy-Chains?

ONE WHO H4CKS WITHOUT LEAVING ANY TRACES BEHIND IS A REAL H4CKER.

ProxyChains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any other SOCKS4, SOCKS5 or HTTP proxies. It is an open-source project for GNU/Linux systems.

Essentially, you can use ProxyChains to run any program through a proxy server. This will allow you to access the Internet from behind a restrictive firewall, hide your IP address, run applications like SSH/ telnet/wget/FTP and Nmap through proxy servers, and even access your local Intranet from outside through an external proxy.

ProxyChains even allows you to use multiple proxies at once by “chaining” the proxies together and to use programs with no built-in proxy support through a proxy.


 

First off, let’s go through how to install and configure ProxyChains! If you are using Mac OSX, you can simply install ProxyChains using Homebrew. Run the following command after you install Homebrew:

brew install proxychains

If you are using another Unix flavor, you have two options. First, if you are using a Debian-based Linux distribution, you can install ProxyChains with the command:

apt-get install proxychains

You can also build the project from source code. First, download the latest project source on ProxyChain’s official release page here.

Then, “cd” into the project directory and run the following commands.

./configure
make
sudo make install

 

The proxying behavior of ProxyChains is fully customizable. You can, for example, choose from three different chaining options:

  • Strict Chain: all proxies in the list will be used and they will be chained in order.
  • Random Chain: each connection made through ProxyChains will be done via a random combo of proxies in the proxy list. Users can specify the number of proxies to use. (This option is useful for IDS testing.)
  • Dynamic Chain: the same as a strict chain, but dead proxies are excluded from the chain.

You can also specify the list of proxies that ProxyChain uses in the following format:

type host port [username password]

Here are some examples:

socks5 192.168.67.78 1080 lamer secret
http 192.168.89.3 8080 justu hidden
socks4 192.168.1.49 1080
 

The supported proxy types are socks4, socks5, and HTTP. You can list either a single proxy or multiple ones for ProxyChains to use.

You can see an example of a ProxyChains configuration file here:

ProxyChains looks for the configuration file in the following order:

  • SOCKS5 proxy port in environment variable ${PROXYCHAINS_SOCKS5},
  • file listed in environment variable ${PROXYCHAINS_CONF_FILE},
  • the -f argument provided to the proxychains command,
  • ./proxychains.conf,
  • $(HOME_DIRECTORY)/.proxychains/proxychains.conf,
  • and finally, /etc/proxychains.conf.

 

The most basic usage of ProxyChains is as follows. After configuring ProxyChains in the configuration file, you can simply run:

proxychains [original command]

To execute that command through ProxyChains. For example, this command will tunnel telnet through the listed proxies.

proxychains telnet targethost.com

While this command will simply connect to targethost.com through the listed proxies:

proxychains targethost.com

 

You can also perform Nmap scans via ProxyChains.

proxychains [nmap command]
proxychains nmap -sT targethost.com

 

You might also want to use ProxyChains with SSH. To make ProxyChains work with SSH, you’ll first need to configure SSH to work as a proxy. This can be done with the “-D” option for SSH.

ssh -D 127.0.0.1:8080 targethost.com 

This will make SSH forward all traffic sent to port 8080 to targethost.com. You should then add 127.0.0.1:8080 to the ProxyChains proxy list.


Anonymity is a shield from the tyranny of the majority.

STAY HOME!! STAY SAFE!! JAI HIND!!

DO FOLLOW US ON SOCIAL MEDIA :

Instagram: https://www.instagram.com/indiancybertroops/

Our website: https://indiancybertroops.in

Our blog: https://indiancybertroops.org


 

About Post Author

Indian Cyber Troops

Indian Cyber Work For Nation's Wellness And Nation's Security We Share new and unique things with you Jai Hind Jai Shri Ram