0% found this document useful (0 votes)
361 views5 pages

Proxy Chain

ProxyChains is an open source tool that forces any TCP connection made by a given application to go through proxy servers like Tor or other SOCKS4, SOCKS5 or HTTP proxies. It allows creating chains of multiple proxies and works with the Tor network. To use it with Tor, one needs to install Tor, Polipo or Privoxy, and ProxyChains, then configure ProxyChains to use Tor by adding lines to its configuration file. Once Tor is activated, any application run through ProxyChains will have its network traffic routed through the Tor network, anonymizing it.

Uploaded by

Francisco Diaz
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
361 views5 pages

Proxy Chain

ProxyChains is an open source tool that forces any TCP connection made by a given application to go through proxy servers like Tor or other SOCKS4, SOCKS5 or HTTP proxies. It allows creating chains of multiple proxies and works with the Tor network. To use it with Tor, one needs to install Tor, Polipo or Privoxy, and ProxyChains, then configure ProxyChains to use Tor by adding lines to its configuration file. Once Tor is activated, any application run through ProxyChains will have its network traffic routed through the Tor network, anonymizing it.

Uploaded by

Francisco Diaz
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

ProxyChains README current version: 3.1 ====================== This is open source software for !"#$inux syste%s.

proxychains & a too' that forces any TCP connection %a(e )y any *iven app'ication to fo''ow throu*h proxy 'i+e T,R or any other -,C.-/0 -,C.-1 or 2TTP3-4 proxy. -upporte( auth&types: 5user#pass5 for -,C.-/#10 5)asic5 for 2TTP. proxyreso'v & D!- reso'vin*. "se( to reso've host na%es via proxy or T,R. 6hen to use it 7 6hat for 7 6hy 7 6hen you want two 3or %ore4 (ifferent proxies in chain: 'i+e: your8host 9&&: proxy 1 3T,R4 9&&: proxy ; 32TTP or -,C.-/#14 9&&: tar*et8host <ou %ay nee( it when the on'y way out fro% your $A! is throu*h proxy server. ,r to *et out fro% )ehin( restrictive firewa'' that fi'ters so%e ports in out*oin* traffic. An( you want to (o that with so%e app 'i+e te'net. =n(ee( you can even access your ho%e $A! fro% outsi(e via reverse proxy if you set it. "se externa' D!- fro% )ehin( any proxy#firewa''. "se T,R networ+ with --2 an( frien(s. -o%e coo' features: > Different chainin* options supporte( ran(o% or(er fro% the 'ist 3 user (efine( 'en*th of chain 4. exact or(er 3as they appear in the 'ist 4 (yna%ic or(er 3s%art exc'u(e (ea( proxies fro% chain4 > <ou can use it with any app'ication0 even networ+ scanners oh yes & you can %a+e portscan via proxy 3or chaine( proxies4 for exa%p'e with !%ap scanner 3www.insecire.or*#n%ap4. proxychains n%ap &sT &P, &p ?@ &iR 3fin( so%e we)servers throu*h proxy4 > Rea''y 'on* chains supporte( with tuna)'e ti%eouts. Confi*uration: proxychains 'oo+s for confi* fi'e in fo''owin* or(er: 14 .#proxychains.conf ;4 A32,ME4#.proxychains#proxychains.conf 34 #etc#proxychains.conf >> >>see %ore in #etc#proxychains.conf "sa*e Exa%p'e: )ashA proxychains te'net tar*ethost.co% in this exa%p'e it wi'' run te'net throu*h proxy3or chaine( proxies4 specifie( )y proxychains.conf "sa*e Exa%p'e: )ashA proxyreso'v tar*ethost.co% in this exa%p'e it wi'' reso've tar*ethost.co% throu*h proxy3or chaine( proxies4 specifie( )y proxychains.conf !,TE: to run sui(#s*i( pro*ra%s3'i+e ssh4 throu*h proxychains you have to )e root

http://proxychains.sourceforge.net/howto.html http://sockslist.net/ lista de proxys IP address Port Country Type Checked (ago) Check !."#$.%".&& "'#' (lo)akia $ '':'':'" check *'*.#+.*"+.*+' "'#' China + '':'':"# check "#'.*$".*$+.!% "'#' Indonesia $ '':'':*! check #$.*$".$$.*"# "'#' Iran, Islamic -epu.lic of $ '':'':+% check " .*'"."*&."&! $$! Canada $ '':'":'' check " !.*!#.""".*& "'#' /kraine $ '':'":'# check $&." ".*!%.""# "'#' -ussian 0ederation $ '':'":"' check **!.*+.*$*.&* "'#' 1alaysia $/+ '':'":"* check *'*.&*.&%.*+' "'#' India $ '':'":"# check **".*"$.*'#.**& "'#' China $ '':'":" check "#'."& ."*+.$ #### China $/+ '':'":*" check " .*!"."#%.&' "'#' /nited (tates $ '':'":!" check "%&. ."'%."#$ "'#' 2ermany $ '':'*:'" check ".**+.%#."+* "'#' -ussian 0ederation $ '':'*:'! check $".#$."!+.** "'#' 3enya $ '':'*:' check *'*. &."++.*+" *& China + '':'*:"$ check *""."" .#&."$& "'#' 3orea, -epu.lic of $ '':'*:** check !".*'*.*""."' "'#' /kraine $ '':'*:!* check "*"."%."*+." "'#' China $ '':'*:!! check *'%." $.#%."'+ "'#' Canada $ '':'*:$+ check

cualquier aplicacin mediante ProxyChains


24//5inux, hackti)ismoanonimato, anonymous, aplicaciones anonimas, proxy, ProxyChains, Tor

Personal 6ork *'"* .y 2hostco 7oy en d8a garanti9ar el anonimato a la hora de na)egar por internet no supone demasiadas dificultades, una .uena configuraci:n de Tor en los na)egadores o simplemente descargarse el Tor ;rowser ;undle suele ser suficiente para la mayor8a de usuarios. 5a cosa cam.ia un poco cuando se trata de <anonimizar= el resto de aplicaciones y aun>ue a mi siempre me ha gustado Torsocks, hoy )amos a )er otra opci:n llamada Proxychains: una herramienta que obliga a cualquier conexin TCP realizada por un programa determinado, a ejecutarse mediante proxys como TO o cualquier otro proxy !OC"!#, !OC"!$ o %TTP &!' que elijamos. ?e esa manera podr8amos encadenar )arios proxys seguidos ( permite TCP and ?4( tunneling) o con(igurarlo para trabajar con la red tor >ue es lo >ue )amos a hacer hoy: @l primer paso es tener instalado Tor, )idalia, y un proxy *eb como polipo o pri+oxy .

(on programas >ue estAn disponi.les en todas las distros as8 >ue no me detengo en este paso.. B continuaci:n instalamos ProxyChains desde la terminal o centro de software respecti)o (en mi caso CB(T*)

Bhora s:lo nos >ueda con(igurar ProxyChains para que (uncione con Tor, para ello editamos el archi+o ,etc,proxychains-con( aDadiendole las siguientes lineas al final: . de(aults set to /tor0 soc1s# 234-5-5-2 65$5 podemos utili9ar nano o cual>uier otro editor como root. sudo nano ,etc,proxychains-con(

7a tenemos ProxyChains con(igurado, ahora para que (uncione tenemos que acti+ar Tor, lo cual podemos hacer lan9ando la 2/I Eidalia y pulsando en nue)a identidad

Para asegurarnos que ProxyChains realmente (unciona, podemos ejecutar curl i(con(ig-me desde la terminal y )eremos la ip >ue tenemos asignada

@n cuanto a la sintaxis de eFecuci:n de ProxyChains ser8a proxychains 8aplicacin par9metros: ;n ejemplo con nmap escaneando puertos:

Gtro d8a )eremos como hacer una cadena de proxys, pero por ahora a dis(rutar del (in de semana amigos< 0uente H /p /.untu

http://lamiradadelreplicante.com/*'"*/"'/"!/con)ierteIenIanonimaIcual>uierIaplicacionImedianteI proxychains/

You might also like