Proxychains | Set Up Proxies and TOR to Stay Anonymous!

In this tutorial, we’ll learn to setup and use proxychains. If you are using Kali Linux, you are already lucky – you got it pre-installed. Proxychains help you to tie several proxies and Tor network together to provide you anonymity, esp. when you perform your hacking acts.

Background Intro!


A proxy or proxy server is basically another computer which serves as a hub through which internet requests are processed. By connecting through one of these servers, your computer sends your requests to the proxy server which then processes your request and returns what you were wanting.


proxychains – a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. This is open source software for GNU/Linux systems.
You need it when you want two (or more) different proxies in chain:
like: your_host <–> proxy 1 (TOR) <–> proxy 2 (HTTP or SOCKS4/5) <–> target_host.

Tor Network

Wikipedia Explains, Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name “The Onion Router”. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user:


Setup Proxychains and Tor Together

The first thing, download and install the Tor package with following commands. Just go to terminal and type (you need to be root):

ANY Linux Terminal

[email protected]:~# apt-get update

[email protected]:~# apt-get install tor

Now, after downloading and installing, you need to start the tor service:

Terminal | Tor Started
[email protected]:~#  service tor start 

To check for the status of the service (optional), use the following command:

Terminal Tor Service Status
[email protected]:~#  service tor status

Tor should have started now. It’s time to configure proxychains’ configuration file to use Tor. So, let’s open the configuration file using following commands:

Terminal | Locating and Editing Conf File

[email protected]:~# cd etc

[email protected]:~/etc# leafpad proxychains.conf

Feel free to read the content of proxychains.conf file. Now, add the following statement at the end of the configuration file:

  • socks5 9050

Finally, save the file and everything should work fine!

From now, you are ready to use tor via proxychains! To open any program using proxychains, use the following commands:

Terminal | Run Services with Proxychains

[email protected]:~# proxychains iceweasle

[email protected]:~#  proxychains nmap

Adding Proxy Servers list to Proxychains.Conf!

If you are interested in using random proxies instead of tor then this section is for you. You have to add proxy servers list to proxychains configuration file.

Let’s open the proxychains.conf file for editing. Type the following commands:

Terminal | Locating and Editing Conf File

[email protected]:~# cd etc

[email protected]:~/etc# leafpad proxychains.conf

Now remove the # symbol from #idynamic_chain, this # symbol means anything written after this symbol is a comment and should not be read or followed.

Remove # symbol to activate dynamic_chain script.


dynamic_chain option allows listed proxies to be used one by one, and dead proxies won’t be entertained.

Now, get an updated proxy list from somewhere (Just Google or Bing!):

Finally, to run any program using proxychains, you just have to run them through proxychains which will force them to use your proxies. Look at following examples:

Terminal | Run Services with Proxychains

[email protected]:~# proxychains iceweasle

[email protected]:~#  proxychains nmap

Conclusion – Are you 100% Anonymous?

You should never underestimate authorities and other computer guys. You are never 100% anonymous. Someone, somewhere, better than you exists and watching you!

  • It’s difficult to track and trace someone on Tor. But authorities are known to use different methods (such as injecting tracking code into user browser, infecting pc etc.) to track down the suspect.
  • Proxies may log the traffic source and users (you).
  • You use DNS provided by your ISP. All packets originating from your computer have details about you and your computer/network.
  • Humans do mistakes! Practice and knowledge helps to avoid them!

You may also like...