Avoid Detection Using Proxychains

August 8, 2016 | Views: 12929

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Hi Computer Security Enthusiasts,

In this tutorial, I’m going to explain how to stay anonymous and keep your internet traffic private. Before starting, you know that every hacker needs to hide his tracks. We need to make it difficult for system administrators, investigators and others to track our moves or to spy on us. I believe we have the right to uncensored communication.


What are Proxychains?
A proxychain is a tool that combines many proxies to assure a higher levels of anonymity.

If you are using Kali Linux distribution, just type locate proxychains in your terminal:

root@Ghost:~# locate proxychains
/root/.config/google-chrome/Default/Local Storage/http_proxychains.sourceforge.net_0.localstorage
/root/.config/google-chrome/Default/Local Storage/http_proxychains.sourceforge.net_0.localstorage-journal


As you can see, proxychains are built in Kali linux and we can use the command from any
directory (simply because it’s in the /usr/bin directory.)


To use proxychains, for example, to anonymously scan a website, just type:
root@ghost:~# proxychains nmap ­sS <IP address>



Proxychains Configuration

If you want to configure your proxychains, you need to open the configuration file  /etc/proxychains.conf using a text editor like Vim or leafpad etc…

root@ghost:~# vi /etc/proxychains.conf


To add IP addresses for new proxies, you just need to replace “ #add proxy here… “ by your IP address list. As you can see, proxychains use the default Tor configuration on port 9050.  So, if you’re using it, leave it (else comment that line).


Now you can do your hacking with a greater anonymity.

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. so nice to have this cool stuff! thanks Cybrary

  2. Cool article! I know this isn’t 100% anonymous. What else can be done on top of this to make your communications more secure?

  3. what about on window operating system?

  4. Good insight to the Proxy Chaining…Learnt something new today.

Page 3 of 3«123
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge



Is Linux Worth Learning in 2020?
Views: 295 / December 14, 2019
How do I Get MTA Certified?
Views: 893 / December 12, 2019
How much does your PAM software really cost?
Views: 1344 / December 10, 2019
How Do I Get into Android Development?
Views: 1723 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?