Proxychain?

This topic contains 0 replies, has 1 voice, and was last updated by  subterra 6 months, 3 weeks ago.

  • Author
    Posts
  • #170947
     subterra 
    Participant

    I have never used proxychains before but I am trying to set it up on a test system. I don’t seem to be able to get it to work using Firefox on a Kali box. I have checked around and I seem to have it set up correctly in the config file. On most all hits on Google everyone says to run it through TOR however I was not going to run it through TOR. Besides that if you run it through TOR then you will naturally get a different IP than the one you are using to access TOR from. If I get it to work without TOR then I may run it through TOR.

    I am going to list my conf file entries so you guys can look at it and see what I may be doing wrong. Listing it with the proxys in case anyone wants to test them also. Thanks for any help!

    _____________________________________________________________________

    # proxychains.conf VER 3.1
    #
    # HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS.
    #

    # The option below identifies how the ProxyList is treated.
    # only one option should be uncommented at time,
    # otherwise the last appearing option will be accepted
    #
    dynamic_chain
    #
    # Dynamic – Each connection will be done via chained proxies
    # all proxies chained in the order as they appear in the list
    # at least one proxy must be online to play in chain
    # (dead proxies are skipped)
    # otherwise EINTR is returned to the app
    #
    strict_chain
    #
    # Strict – Each connection will be done via chained proxies
    # all proxies chained in the order as they appear in the list
    # all proxies must be online to play in chain
    # otherwise EINTR is returned to the app
    #
    #random_chain
    #
    # Random – Each connection will be done via random proxy
    # (or proxy chain, see chain_len) from the list.
    # this option is good to test your IDS 🙂

    # Make sense only if random_chain
    #chain_len = 2

    # Quiet mode (no output from library)
    #quiet_mode

    # Proxy DNS requests – no leak for DNS data
    proxy_dns

    # Some timeouts in milliseconds
    tcp_read_time_out 15000
    tcp_connect_time_out 8000

    # ProxyList format
    # type host port [user pass]
    # (values separated by ‘tab’ or ‘blank’)
    #
    #
    # Examples:
    #
    # socks5 192.168.67.78 1080 lamer secret
    # http 192.168.89.3 8080 justu hidden
    # socks4 192.168.1.49 1080
    # http 192.168.39.93 8080
    #
    #
    # proxy types: http, socks4, socks5
    # ( auth types supported: “basic”-http “user/pass”-socks )
    #
    [ProxyList]
    # add proxy here …
    # meanwile
    # defaults set to “tor”
    #socks4 127.0.0.1 9050
    socks4 186.150.207.32 1080
    #socks4 1080
    #socks4 1080
    socks5 149.56.15.22 1080
    socks5 103.126.104.2 1080
    socks5 150.129.114.194 1080
    http 139.59.101.223 8080
    http 188.226.141.127 8080
    http 150.109.197.229 8080
    https 150.109.197.229 8080
    https 119.15.154.163 8080

You must be logged in to reply to this topic.

Copyright ©2019 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?