Tor and Proxychains – Tip for Hacking Anonymous

December 30, 2016 | Views: 18574

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Anonymity is an interesting protective weapon, whether inside or outside the computer network. In this post I’ll introduce two basic tips on this topic using Tor and Proxychains, so come on!

First, install Tor and Proxychains on your Linux distribution:

Debian and derivatives: $ sudo apt-get install tor proxychains

Arch Linux and derivatives: $ sudo pacman -S tor proxychains

For other distributions, look at the documentation for compatibility/installation instructions.

 

After installing the packages, we will configure Proxychains for a dynamic chain and add a line to the Socks5 protocol at the end of the file.

  1. Delete the # sign before dynamic_chain.
  2. Put a # signal before the strict_chain function.
  3. Put the following Socks5 protocol statement on the last line: socks5 127.0.0.1 9050
  4. Save the file.

Example configuration in Pastebin: http://pastebin.com/02uNPWYf

 

Start the Tor service:

  1. In distros based on Debian.
    • # service tor start
  2. In Arch Linux based distros.
    • # systemctl start tor.service
  3. Open a Terminal and run Proxychains with your favorite browser. Disable any Proxy in the browser, if it is in use.
    • # proxychains firefox

Test if your IP address has changed, if not, revise your Proxychains settings.

TIP: It is possible to do port scanning with Nmap and Proxychains.

Socks proxies servers have limitations, in case the target receives an IMCP Ping, its actual IP will be detected. To avoid this we will use the syntax of the Nmap option –sT (3-way-handshake complete) and -Pn (not to use ping).

Command Demo:

# proxychains nmap -sT -Pn 192.168.11.1
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
17 Comments
  1. please can you teach how to access a site running on apache2 server on another network not localhost

  2. Also you can use whonix gateway and tor to stop webRTC local ip address leaks.

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel