proxy chaining

Unlock the Power of Online Anonymity with Proxy Chaining Explained

Table Of Contents :

Proxy chaining

Proxy chaining

What is a proxy?

A proxy helps you stay unidentified on the internet by letting you go online under a different IP address. It is usually used by hackers or security researchers to do their work by staying anonymous

What is a Proxy Server?

In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.

Suppose, a user types www.google.com in a browser. The browser opens a TCP connection to www.google.com on port 80 and sends the HTTP request over the connection and the web server then returns the response on the TCP connection as well.

Examples :

Over a normal HTTP request, the IP address of the system(user) that sends the request will be transmitted to the destination server and the destination saves it as a source IP so they could provide you with the information that the user requested. With that IP address, the server or network can gather the personal information of the system that sends the request or perhaps end up monitoring them.

Although, when you use a proxy server, it hides your unique IP Address. Instead of sending the request directly to the server, the browser first sends the request to the proxy server which then sends it further and again when the server gives a response back, it again passes through the proxy server before reaching the main user. So, if someone tries to trace the end log, they can only get to the end log of the proxy server and hence prevents your identity

What is Proxy Chaining?

It Includes forwarding traffic from one proxy server to another. It influences the proxy server and enhances the results. Proxy chaining is a way of being anonymous on the Internet or accessing information that is not accessible in your country/region.

We can stay anonymous with the use of proxy chaining because it hides the actual IP address of the user’s system with some other proxy server. Whenever anyone tries to trace back, it will be some proxy IP so they have to check with lots of processes. We will be safe with proxy chaining, add more proxies and stay anonymous.

Proxy Server vs Proxy Chains

Proxy Server will anonymize HTTP or Web connection or things one does on the internet/ web surfing because it’s an HTTP proxy. Whereas, proxy chains will anonymize everything one can do as it anonymizes socket connections operating at the application level.

How to install tor and Proxychains in Linux ?

First of all, you have to install the Tor services in your Kali Linux. Tor network in the largest anonymous network in the world which is working without any control or in other words Tor network not managed by any organization.

How to install Tor ?

In Kali Linux, we have to install the Tor service, so typing this command you can install the Tor Services in Kali Linux.

sudo apt install tor -y

Start/Stop Tor service

Start Tor Services

sudo service tor start

Stop Tor Services

sudo service tor stop

Status of Tor Services

sudo service tor status
proxy chaining

How to install ProxyChains ?

sudo apt install proxychains -y
proxy chaining

How to setup proxy chaining in Kali Linux ?

Adding Proxies

To use the proxies in proxychains you have to add the proxies in the configuration file which is located in Linux /etc/proxychains.conf. To open the file you can use your favorite text editor and open it.

sudo nano /etc/proxychains.conf
proxy chaining

If you go to the end of the file you see there socks4 127.0.0.1 9050, which means default proxychains’s traffic point through our localhost 127.0.0.1 and port 9050. And we all know port 9050 is default Tor port. if you use proxychains using Tor you have to add a line, in the end, config file which is socks5 127.0.0.1 9050.

proxy chaining

After opening the configuration file do the following changes

1. remove the hashtag at the line where the “dynamic_chain” is present.
2. keep the hashtag at the line where the “strict_chain” is present.

3. scroll down until the local IP address appears. ie:(socks4 127.0.0.1
8888) and comment on this line and add new proxies.

proxy chaining

If you go to the end of the file you see there socks4 127.0.0.1 9050, which means default proxychains’s traffic point through our localhost 127.0.0.1 and port 9050. And we all know port 9050 is default Tor port. if you use proxychains using Tor you have to add a line, in the end, config file which is socks5 127.0.0.1 9050.

proxy chaining

If you do not want to use the Tor network so you have to comment on the socks4 127.0.0.1 9050 line and below that type your proxies list.

proxy chaining

After doing all this stuffs you need to press crtl+o to save this file and ctrl+x to exit the nano editor.

usage: proxychains commands

You have to write “proxychains” before every command when you want to scan or search for something on the internet.

proxy chaining
Spread the love
Scroll to Top
www.thecyberblogs.com