Tor and Proxychains – Tip for Hacking Anonymous

December 30, 2016 | Views: 26370

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Anonymity is an interesting protective weapon, whether inside or outside the computer network. In this post I’ll introduce two basic tips on this topic using Tor and Proxychains, so come on!

First, install Tor and Proxychains on your Linux distribution:

Debian and derivatives: $ sudo apt-get install tor proxychains

Arch Linux and derivatives: $ sudo pacman -S tor proxychains

For other distributions, look at the documentation for compatibility/installation instructions.


After installing the packages, we will configure Proxychains for a dynamic chain and add a line to the Socks5 protocol at the end of the file.

  1. Delete the # sign before dynamic_chain.
  2. Put a # signal before the strict_chain function.
  3. Put the following Socks5 protocol statement on the last line: socks5 9050
  4. Save the file.

Example configuration in Pastebin:


Start the Tor service:

  1. In distros based on Debian.
    • # service tor start
  2. In Arch Linux based distros.
    • # systemctl start tor.service
  3. Open a Terminal and run Proxychains with your favorite browser. Disable any Proxy in the browser, if it is in use.
    • # proxychains firefox

Test if your IP address has changed, if not, revise your Proxychains settings.

TIP: It is possible to do port scanning with Nmap and Proxychains.

Socks proxies servers have limitations, in case the target receives an IMCP Ping, its actual IP will be detected. To avoid this we will use the syntax of the Nmap option –sT (3-way-handshake complete) and -Pn (not to use ping).

Command Demo:

# proxychains nmap -sT -Pn
Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. please can you teach how to access a site running on apache2 server on another network not localhost

  2. Also you can use whonix gateway and tor to stop webRTC local ip address leaks.

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge



Is Linux Worth Learning in 2020?
Views: 742 / December 14, 2019
How do I Get MTA Certified?
Views: 1314 / December 12, 2019
How much does your PAM software really cost?
Views: 1751 / December 10, 2019
How Do I Get into Android Development?
Views: 2141 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?