is an interesting protective weapon, whether inside or outside the computer network. In this post I'll introduce two basic tips on this topic using Tor
, so come on!First, install Tor and Proxychains on your Linux distribution:Debian
and derivatives: $ sudo apt-get install tor proxychainsArch Linux
and derivatives: $ sudo pacman -S tor proxychainsFor other distributions, look at the documentation for compatibility/installation instructions.
After installing the packages, we will configure Proxychains for a dynamic chain and add a line to the Socks5 protocol at the end of the file.
- Delete the# sign before dynamic_chain.
- Put a# signal before the strict_chain function.
- Put the following Socks5 protocol statement on the last line: socks5 127.0.0.1 9050
- Save the file.
Example configuration in Pastebin: http://pastebin.com/02uNPWYf Start the Tor service:
- In distros based on Debian.
- In Arch Linux based distros.
- Open a Terminal and run Proxychains with your favorite browser. Disable any Proxy in the browser, if it is in use.
Test if your IP address has changed, if not, revise your Proxychains settings.TIP: It is possible to do port scanning with Nmap and Proxychains.Socks proxies servers have limitations, in case the target receives an IMCP Ping, its actual IP will be detected. To avoid this we will use the syntax of the Nmap option -sT
(3-way-handshake complete) and -Pn
(not to use ping).Command Demo:
# proxychains nmap -sT -Pn 192.168.11.1