How to configure tor with proxychains to evade detection - Hacker Tune

Latest

Stay updated with bleeding edge technology

Thursday, 23 November 2017

How to configure tor with proxychains to evade detection

Add caption


The Tor network is a group of volunteer-operated servers that allows people to defend against network surveillance and help to improve their privacy and security on the Internet.

In this tutorial we are going to achieve the anonymity by using ProxyChains and Tor. ProxyChains is proxifier for linux system. It allows TCP and DNS tunneling through proxies. It supports HTTP, SOCKS4 and SOCKS5 proxy servers. It uses multiple proxies at a time, so it is called Proxy Chaining.


Install Tor on kali Linux:

sudo apt-get install tor

 
Install Proxychains on kali Linux:

In Kali Linux proxychains is already comes with pre-installed and if you don’t have, just run the below command in terminal to install it.

sudo apt-get install proxychains
 

After the successful installation of proxychains, run the below code in terminal.

sudo vim /etc/proxychains.conf



It will open the proxychains config file. Now find the strict_chain and comment the strict_chain line by adding a hash in front of it and uncomment dynamic chain.


Its easy to understand what each chain type does but let me explain

1. Dynamic Chain: It will form a chain of proxies in the order they are written into the configuration file. If a proxy server is not responding it will be skipped i.e. will not be included in the proxy chain.

2. Strict Chain: It will form a chain of proxies in the order they are written into the configuration file. If a proxy server is not responding, the whole chain will be disabled i.e. if a proxy server is not responding you will not be able to use proxychains.

3. Random Chain: It will form a chain of proxies randomly, the order of proxies in chain will be changed every time which means your IP address will be changed every time too. If a proxy server is not responding, it is skipped.

Add socks5 127.0.0.1 9050 at the end of config file.

Save the file and close it.

Start Tor Service
 
sudo service tor start
 

Let's Test It

Now that we have put a proxy between us and any traffic we send, let's test it out.

I am simply going to do an nmap scan to google.com anonymously by sending the scan through a proxy. The command would be as follows:
 
sudo proxychains nmap -sS www.google.com

If you want to open google in Firefox via proxychains, then the command is

sudo proxychains firefox www.google.com
  
To check your proxy ip, just run the below code in terminal

sudo proxychains firefox www.findmyip.org
 
 
ProxyChains with tor will make make detection much harder and it will help to stay anonymous. Also use do not tracking in your browser and use duckduckgo as your search engine to increase your anonymity level.
 
 
If you enjoyed reading this tutorial and find it useful, do share it on Facebook and Google plus.
 
 
 


 
 







No comments:

Post a Comment