The World of Proxy

Today I learned about proxychains and how to use them to remain anonymous online.

Future Learn

I learned how to access the proxychain file in Kali Linux by typing the following command:


nano /etc/proxychains.conf


Once inside the file I could edit it with nano (a text editor). I learned about three different types of proxychains which are:


  1. Dynamic Chain
  2. Strict Chain
  3. Random Chain

Dynamic chains are the preferable option because from what I understand it is the most stable. Using dynamic gives you the ability to go from ABCD to your desired destination without adhering to a specific order like strict chains do. If you have a strict chain you will only be able to access sites on the internet by going through ABCD in that specific order. If B is down then you're stuck and the proxychain cannot continue.

However, with dynamic chains, if B is down it would go A, skip over B, and then go on to C and D and it will have no problems. Even if C was down as well it would go A and D with no problems and will reach the desired destination. As long as one single proxy is functional it's going to work without any specific order attached to it. Cool huh?

I also thought that random chains were pretty interesting as well. With random chains you can specify a list of IP addresses and it will randomly choose proxies from that list in a random order. Each time we use this option these proxychains will look very different to your intended target. In turn it will make it that much harder to track our traffic from where it orginated from. Nice huh?

I learned about the importance of using socks5 proxies over socks4 and HTTP. Socks5 has the ability to anonymize all sorts of traffic over the other two options. HTTP is not really safe and socks4 doesn't support a lot of options. So whenever and however you can, always try to choose socks5.

I also learned about the importance of using Proxy DNS Requests. It is very, VERY important NOT to have any DNS leaks. Even though someone can't get your particular IP address they can get the IP address of the DNS server that you are using and then track you down. That's a big no-no! You do not want that happening because your local DNS server will be discovered and that information can be used in order to figure out your personal IP address. And then once that's discovered then your physical address will be discovered as well and...well...you get the idea.

You should definitely use a proxy DNS. It might slow you down a bit but without it you will be practically wide open and NOT anonymous. It will be a matter of time before "they find you." This reminds me of a clip from the movie "The Last of the Mohicans" where Hawkeye tells Cora Munro the following:

Hahahahaha! Sorry...I couldn't help myself with that one. Can you picture the FBI or a Cyber Crime Unit saying that?

So using the nano text editor to edit the proxychain file I make sure to use one of the three chain options discussed above by deleting or un-deleting the hash sign which looks like this "#". Your computer system will ignore the chain if it has a hash before it and it will take it into consideration if it does NOT have a hash before it. For example:


#dynamic chain-------your computer will ignore this.

dynamic chain--------your computer will consider this.


Once I added those changes I save the file by pressing the keys "CTRL and the letter O" at the same time. Then I exit out of the nano text editor by pressing the "CTRL + X" keys and I'm back to my regular Kali Linux screen.

Pretty neat huh? Since I've accomplished what I set out to do today and I learned something interesting about proxychains you know what that means...it's time for the Woohoo Dance!

Darth Vader Dance