Table Of Contents :
Proxy chaining


What is a proxy?
A proxy helps you stay unidentified on the internet by letting you go online under a different IP address. It is usually used by hackers or security researchers to do their work by staying anonymous
What is a Proxy Server?
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
Suppose, a user types www.google.com in a browser. The browser opens a TCP connection to www.google.com on port 80 and sends the HTTP request over the connection and the web server then returns the response on the TCP connection as well.
Examples :
Over a normal HTTP request, the IP address of the system(user) that sends the request will be transmitted to the destination server and the destination saves it as a source IP so they could provide you with the information that the user requested. With that IP address, the server or network can gather the personal information of the system that sends the request or perhaps end up monitoring them.
Although, when you use a proxy server, it hides your unique IP Address. Instead of sending the request directly to the server, the browser first sends the request to the proxy server which then sends it further and again when the server gives a response back, it again passes through the proxy server before reaching the main user. So, if someone tries to trace the end log, they can only get to the end log of the proxy server and hence prevents your identity
What is Proxy Chaining?
It Includes forwarding traffic from one proxy server to another. It influences the proxy server and enhances the results. Proxy chaining is a way of being anonymous on the Internet or accessing information that is not accessible in your country/region.
We can stay anonymous with the use of proxy chaining because it hides the actual IP address of the userās system with some other proxy server. Whenever anyone tries to trace back, it will be some proxy IP so they have to check with lots of processes. We will be safe with proxy chaining, add more proxies and stay anonymous.
Proxy Server vs Proxy Chains
Proxy Server will anonymize HTTP or Web connection or things one does on the internet/ web surfing because itās an HTTP proxy. Whereas, proxy chains will anonymize everything one can do as it anonymizes socket connections operating at the application level.
How to install tor and Proxychains in Linux ?
First of all, you have to install the Tor services in your Kali Linux. Tor network in the largest anonymous network in the world which is working without any control or in other words Tor network not managed by any organization.
How to install Tor ?
In Kali Linux, we have to install the Tor service, so typing this command you can install the Tor Services in Kali Linux.
sudo apt install tor -y
Start/Stop Tor service
Start Tor Services
sudo service tor start
Stop Tor Services
sudo service tor stop
Status of Tor Services
sudo service tor status


How to install ProxyChains ?
sudo apt install proxychains -y


How to setup proxy chaining in Kali Linux ?
Adding Proxies
To use the proxies in proxychains you have to add the proxies in the configuration file which is located in Linux /etc/proxychains.conf. To open the file you can use your favorite text editor and open it.
sudo nano /etc/proxychains.conf


If you go to the end of the file you see there socks4 127.0.0.1 9050, which means default proxychainsās traffic point through our localhost 127.0.0.1 and port 9050. And we all know port 9050 is default Tor port. if you use proxychains using Tor you have to add a line, in the end, config file which is socks5 127.0.0.1 9050.


After opening the configuration file do the following changes
1. remove the hashtag at the line where the ādynamic_chainā is present.
2. keep the hashtag at the line where the āstrict_chainā is present.
3. scroll down until the local IP address appears. ie:(socks4 127.0.0.1
8888) and comment on this line and add new proxies.


If you go to the end of the file you see there socks4 127.0.0.1 9050, which means default proxychainsās traffic point through our localhost 127.0.0.1 and port 9050. And we all know port 9050 is default Tor port. if you use proxychains using Tor you have to add a line, in the end, config file which is socks5 127.0.0.1 9050.


If you do not want to use the Tor network so you have to comment on the socks4 127.0.0.1 9050 line and below that type your proxies list.


After doing all this stuffs you need to press crtl+o to save this file and ctrl+x to exit the nano editor.
usage: proxychains commands
You have to write āproxychainsā before every command when you want to scan or search for something on the internet.

