Proxychain?

Viewing 0 reply threads
  • Author
    Posts
    • #170947
      subterra
      Participant

      I have never used proxychains before but I am trying to set it up on a test system. I don’t seem to be able to get it to work using Firefox on a Kali box. I have checked around and I seem to have it set up correctly in the config file. On most all hits on Google everyone says to run it through TOR however I was not going to run it through TOR. Besides that if you run it through TOR then you will naturally get a different IP than the one you are using to access TOR from. If I get it to work without TOR then I may run it through TOR.

      I am going to list my conf file entries so you guys can look at it and see what I may be doing wrong. Listing it with the proxys in case anyone wants to test them also. Thanks for any help!

      _____________________________________________________________________

      # proxychains.conf VER 3.1
      #
      # HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS.
      #

      # The option below identifies how the ProxyList is treated.
      # only one option should be uncommented at time,
      # otherwise the last appearing option will be accepted
      #
      dynamic_chain
      #
      # Dynamic – Each connection will be done via chained proxies
      # all proxies chained in the order as they appear in the list
      # at least one proxy must be online to play in chain
      # (dead proxies are skipped)
      # otherwise EINTR is returned to the app
      #
      strict_chain
      #
      # Strict – Each connection will be done via chained proxies
      # all proxies chained in the order as they appear in the list
      # all proxies must be online to play in chain
      # otherwise EINTR is returned to the app
      #
      #random_chain
      #
      # Random – Each connection will be done via random proxy
      # (or proxy chain, see chain_len) from the list.
      # this option is good to test your IDS 🙂

      # Make sense only if random_chain
      #chain_len = 2

      # Quiet mode (no output from library)
      #quiet_mode

      # Proxy DNS requests – no leak for DNS data
      proxy_dns

      # Some timeouts in milliseconds
      tcp_read_time_out 15000
      tcp_connect_time_out 8000

      # ProxyList format
      # type host port [user pass]
      # (values separated by ‘tab’ or ‘blank’)
      #
      #
      # Examples:
      #
      # socks5 192.168.67.78 1080 lamer secret
      # http 192.168.89.3 8080 justu hidden
      # socks4 192.168.1.49 1080
      # http 192.168.39.93 8080
      #
      #
      # proxy types: http, socks4, socks5
      # ( auth types supported: “basic”-http “user/pass”-socks )
      #
      [ProxyList]
      # add proxy here …
      # meanwile
      # defaults set to “tor”
      #socks4 127.0.0.1 9050
      socks4 186.150.207.32 1080
      #socks4 1080
      #socks4 1080
      socks5 149.56.15.22 1080
      socks5 103.126.104.2 1080
      socks5 150.129.114.194 1080
      http 139.59.101.223 8080
      http 188.226.141.127 8080
      http 150.109.197.229 8080
      https 150.109.197.229 8080
      https 119.15.154.163 8080

Viewing 0 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2020 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?