Linux

How to Setup ProxyChains in Linux || Fully Anonymous & Hide on Internet

ProxyChains and Tor can be used to compose multiple proxies and provide anonymity, making it difficult to track your actual IP address. As a result, ProxyChains hides your real IP address through multiple proxy servers. Keep in mind that if you use multiple proxies, your internet connection will slow down.

Also Read : How To Access Inspect & Developer Tool On Mobile Browsers

What is ProxyChains?

Proxychains is a UNIX program that allows us to hide our IP address by redirecting network traffic. It delivers our TCP traffic through various proxies, including TOR, SOCKS, and HTTP.

What is ProxyChains

  • TCP test tools like Nmap are compatible.
  • Allows all TCP connection to be transmitted online through a series of configurable proxies.
  • Tor network is used automatically.
  • Within the list, it is possible to combine and match different types of proxy.
  • Proxychains can also be used to prevent firewalls, IDS, and IPS detection.



Be Anonymous Online

Therefore, in this article we will talk about the simple, fast and effective way of anonymity online. Following this real IP address will be very difficult to find by anyone in the world, we just need to complete the article completely to get an expert opinion.

The idea is simple but powerful. We will use Tor and Proxy-chains together. First we run Tor and run our proxy chains. By doing these services like Google TorCheck etc they will get the IP address of our hosting servers and those proxyserver also do not have our real IP address, they have the IP address of our Tor. Let’s do it. For the first time we need to configure proxy-chains and we need to learn their basics.


Install Tor & Proxychains in Linux

First, you need to install Tor utilities on your Kali Linux. Tor network is the largest anonymous network in the world that operates without control or in other words the Tor network is not managed by any organization.

Install & Setup Proxychains

First, update the Linux system with the latest episodes and applications. With this we open the terminal and type:

sudo apt update && sudo apt upgrade 



To set up proxy chains, you will first need to install the proxy-chains tool in Linux. Therefore, follow the instructions below, which can help you to set up proxy chains.

apt-get install proxychains 

ProxyChains install



After installing proxy-chains, you will need to install tor. Let’s install tor in your Kali Linux for that follow the below command.

apt-get install tor 

Configure ProxyChains :-

After installing the proxychains & tor service, we will now set up the proxychains for that, open your end and follow the command below.

nano /etc/proxychains.conf 

As you can see below, there are three types of proxy chains.

  • dynamic_chain
  • strict_chain
  • random_chain

We will use a flexible chain. Therefore, we need to add “#” to strict_chain and remove “#” from dynamic_chain.

ProxyChains



 

In this section, remove the “#” from the dynamic_chain.

ProxyChains

 

We will now write socks5 127.0.0.1 9050 on the last line of the representative list. Let’s save with Ctrl + X pass Y and Enter.

ProxyChains

 



Before starting proxy-chains, we will first need tor services. Therefore, open your terminal and follow the instructions below.

service tor start   service tor status  

ProxyChains

We will now open your end and launch Firefox with proxy-chains. Follow the instructions below.

proxychains firefox 

ProxyChains

Also Read : ExifTool – Chack Meta Data Of Images Using Linux & Termux

To verify your current location, we need to check the DNS leak test, or you can check google location. We have marked the current location below the image.



By using this method not only web filtering we can do almost all tasks. As with the following command we can use it for nmap scanning:

proxychains nmap -Pn google.com 

 

Open proxychains All Time

proxychains bash

 

All of this is about the clever way of anonymity in the online world. Here we had used Tor, but Tor checkers did not catch us. The Internet will have the IP of our proxy server and the proxy server will receive the IP of our Tor network. That way we can browse the Internet anonymously.

SUMAM

Hello, I'm SUMAN from India. I’m currently working on Cyber Ethical Hacking. I’m currently learning more about Hacking, Web Design, Android ROM, Mod Hacking App
Subscribe
Notify of
guest
1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Khadar
Khadar
5 months ago

I dont understand

Back to top button
1
0
Would love your thoughts, please comment.x
()
x