INTERNET PROXY CHAINS

Welcome back soda nation

Today we will be using a Russian proxy server to browse the internet and we will learn how that is done.

Before I start, I want to point out that there are multiple types of proxies. One of the more popular, anonymous proxies is Tor. Although Tor is effective in anonymizing your traffic from Google and other commercial tracking, it is not effective in anonymizing your traffic from law enforcement, especially the NSA.

How Proxies Work

As you know, whenever you visit (or hack) a website or server over the Internet, your unique Interpret Protocol (IP) address travels with you. It would then be very easy to trace the source of an attack by simply tracing the source IP address.

Hackers, though, often use proxies to hide or obscure their IP address. In this way, they send their traffic to an intermediary proxy, who then sends the traffic on to the destination, replacing the source IP address with its own. In this way, the malicious traffic appears to be coming from the proxy and not the original sender.

Step 1: Fire Up Kali

To get started, fire up Kali Linux. If don't already have Kali, you can download it 

Step 2: Go to Proxychains

Next, let's go to proxychains. Type:

[kali > proxychains]

When you do so, it shows you the simple proxychains syntax. Basically, after setting up proxychains, all you need to do is precede the command you want to run with the command "proxychains" and all of your Internet traffic will go through your chosen proxy. As we will see later in this tutorial, if we want to browse the Web with our browser, we can simply start our browser by preceding it with proxychains, such as:

[Kali > proxychains iceweasel]

In order to set up proxychains to hide our IP address, we will need to select a proxy. There are many sites on the Web with lists of free and paid proxies. Some of these include, but are not limited to:

• Hide My Ass!

• SamAir Security

• Proxy4Free

• Hide.me

Let's try using SamAir Security. When we navigate there, we can see their list of free proxies.

Step 4: Configure Proxychains

Now that we have a list of potential anonymous proxies, we have to configure proxychains to use it. Like nearly all Linux/Unix applications, configuration is done by a plain text file. These files are generally found in the /etc directory. In this case, the configuration file for proxychains is found at:

[/etc/proxychains.conf]

We can open it with any text editor, but I will use Leafpad here.

[kali > leafpad /etc/proxychains.conf]

This opens the configuration file for proxychains as seen below. Near the bottom of the file is the critical part. Here is where we tell proxychains which proxy to use.

To disable Tor, simply put a comment mark (#) before line #64.


Now, to use one of our Russian proxies, we simply need to add the type of proxy (http) and the IP address and port for that proxy.

Then, save the proxychain.conf file and close i

Step 5: Send Traffic Through Pro

Lastly, if we want to send our HTTP traffic while browsing the Web through that Russian proxy, we simply open our Iceweasel browser by typin


[kali > proxychains icewease


Now, all of our traffic will go through the proxy and will appear to be coming from that proxy should anyone inspect the traffic.l]g:xyt.

I hope you found this interesting if you do don't forget to follow our socials for more tips like this

Post a Comment

0 Comments