Proxychains | Set Up Proxies and TOR to Stay Anonymous!
In this tutorial, we’ll learn to setup and use proxychains. If you are using Kali Linux, you are already lucky – you got it pre-installed. Proxychains help you to tie several proxies and Tor network together to provide you anonymity, esp. when you perform your hacking acts.
Table of Contents [Quick Links]
A proxy or proxy server is basically another computer which serves as a hub through which internet requests are processed. By connecting through one of these servers, your computer sends your requests to the proxy server which then processes your request and returns what you were wanting.
proxychains – a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. This is open source software for GNU/Linux systems.
You need it when you want two (or more) different proxies in chain:
like: your_host <–> proxy 1 (TOR) <–> proxy 2 (HTTP or SOCKS4/5) <–> target_host.
Wikipedia Explains, Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name “The Onion Router”. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user:
Setup Proxychains and Tor Together
The first thing, download and install the Tor package with following commands. Just go to terminal and type (you need to be root):
Now, after downloading and installing, you need to start the tor service:
To check for the status of the service (optional), use the following command:
Tor should have started now. It’s time to configure proxychains’ configuration file to use Tor. So, let’s open the configuration file using following commands:
Feel free to read the content of proxychains.conf file. Now, add the following statement at the end of the configuration file:
- socks5 127.0.0.1 9050
Finally, save the file and everything should work fine!
From now, you are ready to use tor via proxychains! To open any program using proxychains, use the following commands:
Adding Proxy Servers list to Proxychains.Conf!
If you are interested in using random proxies instead of tor then this section is for you. You have to add proxy servers list to proxychains configuration file.
Let’s open the proxychains.conf file for editing. Type the following commands:
Now remove the # symbol from #idynamic_chain, this # symbol means anything written after this symbol is a comment and should not be read or followed.
Remove # symbol to activate dynamic_chain script.
# ADD IMAGE HERE
dynamic_chain option allows listed proxies to be used one by one, and dead proxies won’t be entertained.
Now, get an updated proxy list from somewhere (Just Google or Bing!):
Finally, to run any program using proxychains, you just have to run them through proxychains which will force them to use your proxies. Look at following examples:
Conclusion – Are you 100% Anonymous?
You should never underestimate authorities and other computer guys. You are never 100% anonymous. Someone, somewhere, better than you exists and watching you!
- It’s difficult to track and trace someone on Tor. But authorities are known to use different methods (such as injecting tracking code into user browser, infecting pc etc.) to track down the suspect.
- Proxies may log the traffic source and users (you).
- You use DNS provided by your ISP. All packets originating from your computer have details about you and your computer/network.
- Humans do mistakes! Practice and knowledge helps to avoid them!