Network Basics: Proxychains

March 18, 2018 | Views: 1891

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

To understand what proxychains are we first need to understand what a proxy server is.

This is the definition according to Wikipedia:

” A Proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. … ” 

Diagram of two computers connected only via a proxy server. The first computer says to the proxy server: "ask the second computer what the time is".                                                                                                                              Src: Wikipedia

“Communication between two computers (shown in grey) connected through a third computer (shown in red) acting as a proxy. Bob does not know to whom the information is going, which is why proxies can be used to protect privacy.”

So, basically proxychains are a sequence of different proxies servers you use to connect to a certain host.

Types of Proxys:

Open Proxy – An open proxy is a forwarding proxy server that is accessible by any Internet user.

Reverse Proxy – reverse proxy (or surrogate) is a proxy server that appears to clients to be an ordinary server. Reverse proxies forward requests to one or more ordinary servers which handle the request.

The best way to surf the web anonymously with proxies is with the tor browser, its easy to use and it does the job well, you can download it here

 

Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
5 Comments
  1. sorry this is a bit useless

  2. Hi Guys,

    i didn’t get to details but i in the post i wrote this:

    ” So, basically proxychains are a sequence of different proxies servers you use to connect to a certain host. ”

    it is basically what logssvk explained in his comment, thanks by the way!

  3. Yeah what is proxy chain is not explained, so here are my two cents.
    Proxy chaining involves having more than one proxy in between the source and destination.
    By using proxy chaining you will work by this way:

    host computer -> proxy1 -> proxy2 -> … -> proxy X -> web-site

  4. Yeah what is proxy chain is not explained, so here are my two cents.
    Proxy chaining involves having more than one proxy in between the source and destination.
    By using proxy chaining you will work by this way:

    your computer => proxy1 => proxy2 => … => proxy X => web-site

  5. Well, What is proxy chain by the way? You have not covered what is a proxy chain.

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel