Hide your IP with the Proxychains and Tor

Doing as pentester you must strive to be inconspicuous to avoid tracking your identity and block activities. The two common ways do to so are using proxy and VPN. ProxyChains is a UNIX program, that hooks network-related libc functions in dynamically linked programs via a preloaded DLL and redirects the connections through SOCKS4a/5 or HTTP proxies.

This program works only on dynamically linked programs. also both proxychains and the program to call must use the same dynamic linker (i.e. same libc)

The proxchain is a part of Kali linux suite. To start with proxychains, let’s go to a terminal and configurate the tool first:

$ proxychains config
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
proxychains: can't load process 'config'

Open /etc/proxychains4.conf in your favorite editor:

Select dynamic chain for now. And set proxy_dns to make things easier for now:

Now, is the most interesting important part.

Use Tor network

Scroll down to the end of configuration file till find ProxyList section there:

By default it use Tor network to proxy your traffic:

To make it works we should enable tor service on our machine:

$ sudo apt install tor
$ service tor start

Now, we are ready to go surfing safe. First, open WareShark to track what exactly happens and go youtube:

This is standard TCP 3-way handshake where we can see actual IP address exposed directly to the internet.

Try:

$ curl ident.me

There will be your IP address displayed.

So. let’s hide ourself:

$ proxychains firefox youtube.com

Use random chain proxy list

Another option is using dynamic chain of one or few proxy servers available in the internet or owned. First of all, turn Tor service off:

$ sudo service tor stop

Modify proxychain configuration, targets to randome_chain, set number of hops as 1 and specify list of proxy servers:

It means, each time doing request the proxy chain will contains new hop(s) randomly taken from the list:

Proxychains is ideal console tool doing any kind of brute force attack, the way to anonymize yourself quickly with tor network or your own purchased list of high secure proxy.

Remember, use all of information only for legal purpose with permit,

be an ethical,

respect privacy!

subscribe to newsletter

and receive weekly update from our blog

By submitting your information, you're giving us permission to email you. You may unsubscribe at any time.

Leave a Comment

Discover more from #cybertechtalk

Subscribe now to keep reading and get access to the full archive.

Continue reading