HackingPress

Cyber Security At Your Tips!

How To Setup Proxychains In Kali Linux To Remain Anonymous

In this tutorial, you will learn how to hide your IP address using proxychains and be anonymous. You can mask your IP address with many proxy servers to actually hide your IP address.

After hiding your IP address you can scan a network or a website without any fear of getting caught. Also it useful if you just want to hide your online activity.

So let’s get started.

How To Setup Proxychains In Kali Linux

I’m going to use the Kali Linux OS to setup proxychains. You can use other Linux distribution as well if you want.

First of all, open the terminal and install the tor service if you don’t have the service preinstalled. To install tor service simply run the command:

apt-get install tor

To setup proxychains on your system, you need to configure the proxychains.conf file. For that, you first need to check where this file is located. To check the location of the proxychains.conf type the command:

locate proxychains.conf

locating proxychains.conf file

You will get the location of the file. In my case, as you can see, the proxychains.conf file is inside the etc folder.

Once you find the proxychains file open the file with your favorite editor. You’ll have to modify the file content in order to set up your desired proxy servers.

So here is how to do that. I’m going to use the built-in nano text editor.

editing proxychains.conf file

There are three ways or say method with which you can configure your proxychains file. Here are the methods:

Strict Chain

By default, the strict chain option is enabled. When the strict chain is then your traffic will route through proxies in a particular order. For example, you have proxies let’s say–1,2,3,4.

Your connection will go in that order only like 1 to 2 to 3 to 4. No matter how long the connection lasts the traffic will go in a particular order only. If a proxy like 2 is down, then you’ll not be able to access the Internet because the chain has been broken.

So it is better to choose this option when you know that all the proxies that you have selected are healthy and running.

Dynamic Chain

The dynamic chain works like the strict chain but it does not require all the proxies to work. If a proxy is not working then the connection will jump to the next proxy server.

Unlike Strict chain dynamic chain don’t require all the proxy servers to be in working condition.

Random Chain

For this tutorial, we are going to use the random chain option. As the name suggests itself when using this method the order of the proxies does not matter.

Each time a request is made to a website, the traffic will be routed through random proxy servers. You can list your proxies in any order as there is no order to follow.

As said already, we are going to use the dynamic chain option. So here is how to enable the dynamic chain.

After opening the proxychains.conf file, carefully implement the step below:

STEP 1. Enabling Dynamic Chain

By default, you’ll have the strict chain enabled but we don’t want that. For our purpose, we want the dynamic chain method. So here is how you can enable dynamic chain.

1. Disable the strict chain by simply putting the hash # symbol in front of it.

enabling dynamic chain

2. Now remove the hash # symbol in front of the dynamic chain and you are done.

STEP 2. Configure Proxy Server

1. Now go at the end of the file, you’ll see something like this at the end:

[ProxyList]

# add proxy here …

# meanwhile

# defaults set to “tor”

looking at the default proxy servers

Below these lines, we will put the details of the proxy servers that we wish to use.

2. First of all, you will have to find some working proxy servers. For that, go to http://spys.one/en/socks-proxy-list/. It has a large list of free socks proxy list.

3. Select the proxy servers that you wish to use and fill the details as I did. I have chosen the Taiwan and Indonesia proxies.

inputting proxies in the proxychains.conf file

  • The first column represents the type of proxy (http or socks4 or socks5)
  • The second column is the IP of the proxy server
  • And the third column is the port that a proxy is using

Fill these details carefully and save the file. Hit CTRL+X to exit the file and type Y to save the file.

Once the file is saved, now its time to run the proxychains.

STEP 3. Running The Proxychains

1. Exit from your browser. The proxychains will not work if you try to run them without exiting your browser.

2. Enter the command–service tor start

3. Once the tor service is active you can run the next command–proxychains firefox www.google.com

This command will open www.google.com in the Firefox browser. But keep in mind that the connection will be slow probably very slow. This is because we are bouncing our request through various proxy servers. But sometimes you’ll see a screen like this.

proxy server down connection not available error

If you get this type of error that means the proxy servers that you are using are not available at the moment. Probably they are down because of heavy traffic. So to overcome this situation you need to replace your proxy servers with new ones.

opening firefox browser using proxychains

4. You can go to whatismyip.com to check your IP address. If you have done all the above steps correctly, you’ll see that your IP address is spoofed/hidden.

ip successfully changed using proxychains

Here we are using the free proxies only, you can purchase a proxy server if you want enhanced speed.

Also bear in mind that when using proxy servers, you may encounter an error like server connection failed. When you do hit errors like this you’ll have to change the proxy servers from your proxychains.conf file.

Either remove the previous proxies or add some new proxies to the list. Then try again connecting to a website and see if it works.

Rundown: How To Setup Proxychains In Kali Linux

So, this is how you anonymize yourself using proxychains. I hope you learned something new from it and this post was helpful to you.

If you have any doubt or query simply leave a comment below. Also, don’t forget to share this post with your friends.

Categories: Geek

Leave a Reply

Your email address will not be published. Required fields are marked *