How To Setup Proxychains In Kali Linux - #2 - Change Your IP

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hey guys hackersploit here back again with another video and welcome back to the ethical hacking course today we're going to be talking about proxy chains so this is actually going to be the second proxy chain tutorial in the previous video i talked about proxy chains what they are how they work and i introduced you guys to the proxychains.configuration file so in this video i'm going to go into some really advanced stuff when it comes to proxy change i'm going to show how to set it up i'm going to show you that it actually works live so i hope you guys are ready so let's get to it so like any other ethical hacking videos it all begins in the humble shell of the terminal so open up your terminal and let's get started so in the previous video i was using the nano editor and i'm gonna keep on using the nano editor now let me explain why you guys might be asking yourself well there's the vim editor and there's so many others why aren't i using any of those well i'm trying to keep these tutorials as beginner friendly as possible so that almost everyone can understand them and it's very easy for them to grasp the concept of editing a configuration file in the terminal so let's get started nano and we're going to access the proxychange.configuration file we're going to go to the etc or etsc and proxychains.configuration and let's open that up now in the previous video i explained why we need to uncomment the dynamic chain that's basically activating the dynamic chain now the dynamic chain will basically allow the ipa ip addresses to change in a very dynamic in a very dynamic manner and i explained that in the previous video um about how it works for strict chain is gonna it's basically gonna go through a series of ips but the basically it's easier to detect because those ips will be just repeating themselves and a random chain this is basically one of the worst ways of proxy chain anonymization and for very obvious reason random each connection will be done by a random proxy and that if your proxy it doesn't work you're basically stumped and you have to restart the process all over again so let's go all the way down now i also told you to uncomment the proxy dns requests no leak for dns data this is basically will um will prevent leaking of dns data so your if even if you're not using a custom dns that's in not in your country it'll actually it'll actually just follow the ips dns to whichever country that's in so this is very important make sure that that's active and you can do that by uncommenting as i did with the the dynamic chain up there so let's go down all the way to the example section now in the example section i told you guys to take a look at the format of the of basically how a proxy chain or a proxy fire dns works now this is the proxy fire dns this is sox5 that's what we're going to be using because it's the safest and it's the fastest really and this is the address of the proxy not nothing really to say there that's basically just the address you then have the port you guys know what ports are and right here a lot of people have been asking me what this is well basically this is the username and password examples so if you actually buy a proxy or a proxy fire or a proxy chain in most cases they'll usually give you a username and password and this is where you get to enter them so we're going to use tor and the proxy chains in in in intelligent together so they're actually going to work together so let me explain how we're going to do that so in the proxy list section here this is actually where we configure the proxies as you can see the defaults have been set to tor but it's being used in the socks4 but we don't want that but instead of removing that we're just going to use this one so go to the line just below socks4 and we're going to add socks five and you wanna hit the tab button on your keyboard and that's basically you're gonna follow the format of the command above it so it's gonna follow the format just above which is a very good format 127.0 0.0.1 and 90 50. all right now why are we using 127.0.01 firstly that's the basic door uh proxy configuration that that's where the ip is and this is basically your ipn this is how you can actually test by running this to test if the proxy chains are working so socks 5 we've actually configured and to be honest we're actually done here now i'm going to show you the proxy chains working with an example or actually i'm just going to run it live so we're going to save this file and to save the file you want to hit ctrl o and it's going to ask you if to to write to write the changes and i'm going to hit enter and it's written and to exit the nano editor hit control x all right and we're going to clear the console and finally we can begin uh checking so the first thing we're going to do is we're going to check if the tor service is running most likely it's not running so let's check door service actually it is running um well hold on all right uh so what i'm gonna do is um what i'm gonna do is is i'm going to close this terminal and i'm going to open another one and i'm going to stop it stop uh actually hold on it's service or stop all right and i've stopped it if yours is not open don't worry just skip this step and we're going to start it again service door start all right and i'm going to hit the service store start and it's it's going to start the tour service now we can actually begin with the proxy chains as i explained we're going to using we're going to be using the tor proxies with uh basically going to using the top proxies with the proxy change configuration file at least for this video uh so the way to test this is we're going to type proxy chains proxy chains we're going to use a browser i'm going to use firefox that's basically oops my typing today is pretty bad firefox you can use iceweasel and basically iceweasel is just firefox so we're going to use firefox anyway and we're going to enter a test website to test whether the proxies are working i'm going to use www.duckduckgo.com and the reason i'm using this is not anything particular i just want to also recommend this search engine to you guys i know you guys are very fond of google but duckduckgo is one of the sites or search engines that does not keep your ip addresses and track you so it's in terms of anonymity and when you're performing like who is scans on targets i would recommend dr go it just keeps you safer but anyway we're using proxy chains so all you have to do is hit enter and it's going to start proxy chains and it's going to open firefox and it's going to open www.duckduckgo.com obviously it's going to take a while because it's running through the proxy chains and just give it its time and it should start it should open up dr go and there you have it it's opened up dr.goh but you might be asking how do i know i'm anonymous or how do i know i'm safe well firstly let's look at the terminal so as you can see you're going to see um that it's basically accepted these ips and you don't have to worry about what it outputs here so to test it i'm going to check for dns leaks now how do we check for dns leaks we're basically just going to do a duct go search check for dns leaks all right and it's going to hopefully return some results that was very quick and we're going to test the dns leak test all right so let's open that up all right so as you can see it said my address is 176 58 198 from london united kingdom i can tell you for a fact that i'm not in london in united kingdom i'm well i'm really really i'm really far from here so as you can see it's actually working and if we start the standard test to test whether any dns information was leaked regarding my real location we'll see that it's probably going to give us a uk dns or it's actually given us a german dns so that's actually even better it just makes you more anonymous now you guys might also be asking how do we know this is working and my ap will be changing well to do that i'm just going to close this browser and i'm going to say service store stop or i could say service store restart to save the time all right and once that's done i'm going to clear this and i'm going to say i'm going to run the previous command the proxy jane's firefox doctorgo.com just to test that and let it start up again and there you are it should start up again depending on which proxy it's using it'll either be faster or slower if it doesn't work don't worry just give it a few seconds and it should it should work because it will go through this the series of proxy changes you can see here and some will be denied and some will work anyway it's return duct go so we can actually perform the dns search again so check for dns dns leaks all right again very fast let's check for dns leaks and we should hopefully have a different ip and there you are guys it's actually giving us an ip from prague the czech czech republic sorry if i butchered that um let's check what dns it's giving us let's see what dns it's giving us very nice it's running the test a bit slow but it's worth it whether you're performing scans or sql injection and there we are germany so this is actually pretty cool and i've actually shown you guys that it really does work if you use this method you're going to be anonymous and that's all i can really say knock yourselves out go ahead and do anything you want this is really useful for for tho for people who are complaining about scanning the nmap.scanme.nmap.org now you can actually just change your ip and keep on using their domain for educational purposes obviously anyway guys you can see that it's working i'm anonymous right now i hope you guys enjoyed this video or i hope this video helped you if we did leave a like uh please share it because a lot of other people need this information and if they can get it that will be just great uh if you have any questions the comments section you can contact me on on my kick or on any of my social media on my social networks anyway guys thank you guys so much for watching the video peace
Info
Channel: HackerSploit
Views: 284,625
Rating: 4.9365549 out of 5
Keywords: proxychains, kali Linux, how to, kali linux 2.0, tor, ethical hacking, tutorials, Anonymous, Proxy, proxychains kali linux, proxychains kali linux 2.0, proxychains tor, proxychains windows, kali linux hacking tutorials, kali linux tutorial for beginners, kali linux tutorial, kali linux wifi hack, hacking wifi password, hacking whatsapp, hacking facebook account, hack kali linux, kali linux install, kali linux wifi, how to hack, kali linux hacking tutorials facebook
Id: FtFTh-KVjsA
Channel Id: undefined
Length: 10min 59sec (659 seconds)
Published: Wed Mar 29 2017
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.