TOR AND PROXYCHAINS


With the intention of attain total secrecy while scanning a host, proxychains is as excellent like it gets for the reason that it utilizes Tor as well as Privoxy toward tunnel the Nmap scan. In further words, you provide for an app to proxychains, in that case Nmap, plus it utilizes Tor intended for the scan. ProxyChains permits you to make use of SSH, Telnet, VNC, FTP as well as additional network app from following HTTP(HTTPS) as well as SOCKS(4/5) proxy servers. Proxychains permits TCP along with DNS tunneling from side to side proxies. Be conscious that Proxychains simply tunnels TCP plus DNS; in further words, keep away from utilizing UDP and host discovering all the way through ICMP (ping).

How to use proxychains.

Ok this is a basic tutorial. (Needs TOR to run.)
Now if you don’t know already proxychains allows tunneling TCP or DNS trough proxies. It supports HTTP, socks4 and socks5 proxy servers that can be chained together.
Proxychains is used to:
-hide your ip
-run programs trough proxy servers
-acces your home network from the outside trought reverse proxy.
Ok now Backtrack already has it installed so we are going to skip that part and go the the configuration.
To configure Proxychains just open a terminal and type in : “nano /etc/proxychains.conf” as you can see we have some features about how the program chains proxies:
-dynamic_chain: takes the proxies in the order you added them and skips dead proxies.
-random_chain: takes the proxies from the list in a random order.
-strict_chain: takes the proxies in the order you added them like the dynamic_chain except this chaining option does not skip dead proxies.

Ok after you pick up the chain option you need to add proxies, if you scrool down proxychains.conf you will find something like this :

# ProxyList format
# type host port [user pass]
# (values separated by ‘tab’ or ‘blank’)

This tells you how the proxies should be added to the list, you can separate type from host and the rest just by adding a black space or by hitting the “tab” key.

Than you will see the proxylist where we can add our proxies:

[ProxyList]
# add proxy here …
# meanwile
# defaults set to “tor”
socks4 127.0.0.1 9050

Ok after the last line “socks4 127.0.0.1 9050″ (do not DELETE that!) we add our proxies. We can find those with a simple search on google.
After we finished our configuration, we save the file. Now it’s time to run the program.

“root@bt: proxyresolv targethost.com” (this command is used to resolve host names via proxy or tor)

“root@bt: proxychains firefox site.com” (this command tells the proxychains program that after he passed trough the proxies you added in the proxychains.conf file to connect to the “site.com” via firefox)

“root@bt: proxychains telnet target” (same as previous definition, only this time it connects trought telnet to the target)

Well as I specified at the beginning it is a basic tutorial. Hope you like it!
P.S. Sorry if I didn’t type all the words correct, I was in a hurry.

0 comments:

Post a Comment