Avoid Detection Using Proxychains

August 8, 2016 | Views: 12480

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Hi Computer Security Enthusiasts,

In this tutorial, I’m going to explain how to stay anonymous and keep your internet traffic private. Before starting, you know that every hacker needs to hide his tracks. We need to make it difficult for system administrators, investigators and others to track our moves or to spy on us. I believe we have the right to uncensored communication.

 

What are Proxychains?
A proxychain is a tool that combines many proxies to assure a higher levels of anonymity.

If you are using Kali Linux distribution, just type locate proxychains in your terminal:

root@Ghost:~# locate proxychains
/etc/proxychains.conf
/root/.config/google-chrome/Default/Local Storage/http_proxychains.sourceforge.net_0.localstorage
/root/.config/google-chrome/Default/Local Storage/http_proxychains.sourceforge.net_0.localstorage-journal
etc…

proxychains-1

As you can see, proxychains are built in Kali linux and we can use the command from any
directory (simply because it’s in the /usr/bin directory.)

 

To use proxychains, for example, to anonymously scan a website, just type:
root@ghost:~# proxychains nmap ­sS <IP address>

proxychains-2

 

Proxychains Configuration

If you want to configure your proxychains, you need to open the configuration file  /etc/proxychains.conf using a text editor like Vim or leafpad etc…

root@ghost:~# vi /etc/proxychains.conf

proxychains-3

To add IP addresses for new proxies, you just need to replace “ #add proxy here… “ by your IP address list. As you can see, proxychains use the default Tor configuration 127.0.0.1 on port 9050.  So, if you’re using it, leave it (else comment that line).

 

Now you can do your hacking with a greater anonymity.

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
23 Comments
  1. so nice to have this cool stuff! thanks Cybrary

  2. Cool article! I know this isn’t 100% anonymous. What else can be done on top of this to make your communications more secure?

  3. what about on window operating system?

  4. Good insight to the Proxy Chaining…Learnt something new today.

Page 3 of 3«123
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel