Questions tagged [proxychains]

32 questions
1
vote
1 answer

Error on Proxychains + Tor

I'm trying to connect through Proxychains and nc to a website but I get this error: myip.gelma.net:23: forward host lookup failed: Unknown host Previously, I was reciving this error: |DNS-request| myip.gelma.net:23 …
1
vote
3 answers

I can't execute commands through proxychains

I am trying to execute a ping throught proxychains, after create SSH tunnel, but the response of the petition is Destination Host Unreachable. Concretly, I want to do a lab about pivoting. The attacker machine have visibility over A machine, but not…
1
vote
1 answer

DNS leak with proxychains and firefox

When using firefox with proxychains - (default configuration file with tor: socks4 127.0.0.1 9050) and checking on dnsleaktest.com, the original lookup returns the proxied IP, but when performing an extended search it shows the original…
Gabrielius
  • 67
  • 2
  • 9
1
vote
1 answer

How proxychains works

I am accessing the Internet using my ISP's proxy that blocks many services like netcat. So I installed proxychains and now I can use netcat. I did not add any external proxy IP to the proxychains configuration file. I just added my ISP proxy on it.…
1
vote
1 answer

Proxychains dosen't work, DNS leak test shows location

I've been trying to use Proxy Chains with Tor but when I launch Firefox with them a DNS Leak test will show exactly where I live. I'm on Linux Mint and I'm using the stranded Firefox, not the Tor browser or something like that. I configured the…
user136916
  • 11
  • 1
  • 2
1
vote
2 answers

What's wrong with RSA host key mismatch when using git?

I was pushing codes to github from a repo via a proxy (socks5) proxychains git push -uv origin master Warning: the RSA host key for 'github.com' differs from the key for the IP address '224.0.0.1' Offending key for IP in…
dotslash
  • 387
  • 3
  • 4
  • 13
1
vote
0 answers

VPN chain in one machine without VM natively

Is it any way to make VPN chain in one machine (MAC or WIN) without VM natively (L2TP/IPsec)? I need this for obtain an extra layer of security. For example - if one VPN turns off I still have encryption in another chain (maybe this is not the best…
ideloxew
  • 497
  • 1
  • 5
  • 16
0
votes
1 answer

Run Responder using proxychains on a remote network

Is it possible to run Responder as a flag in the proxychains program when I do some penetration testing activities, such as nmap and crackmapexec in the enumeration process? Responder command example : sudo proxychains responder -i 192.168.0.111 -I…
0
votes
0 answers

Chain apache web server acting like reverse proxys using proxychains

I've configure multiple apache web servers so they filter the request and if they have a specific request_uri the request would be redirect to a c2 server. I do that with the next line in the apache conf files ProxyPassMatch "^/thisisthepath$"…
Paula
  • 5
  • 2
0
votes
1 answer

does Nmap automatically use proxychains if configured?

I have configured my proxy chains in /etc/proxychains.conf. Then when just run nmap or even nc without the proxychains prefix, it automatically uses the proxy chains and routes the traffic through the proxies. I have verified that there are no alias…
JackDVD
  • 11
  • 2
0
votes
3 answers

What’s the point in using proxychains for an nmap scan when you could use Tor?

I always hear on YouTube and other places on the internet that Tor is the best option to stay anonymous. Tor is used by many activists, journalists etc. hiding from oppressive governments and so on. Not a VPN nor a proxy would guarantee the same…
0
votes
2 answers

Hiding client IP from a VPN server

VPNs can often be useful for obscuring personably identifying information (IP, geolocation, etc.) from remote destination servers. Traffic is routed through a VPN server and forwarded to the destination. As far as the remote destination servers are…
voices
  • 1,649
  • 7
  • 22
  • 36
0
votes
1 answer

Unknown Requests on URL Web Filter Proxy

While trying to work on incident investigation, I am seeing continuous https requests from website cdn.syndication.twimg.com:443/widgets/timelines/paged/ callback=__twttr.callbacks.tl domain=www.kali.org These requests are continuous and are…
Vaibhav
  • 5
  • 4
0
votes
0 answers

How to identify additional resources when pivoting

I'm currently looking into pivoting when performing network penetration tests, but I'm having issues with reconnaissance. Given the scenario I have full control over a server, which is publicly available and connected to an internal, non-routable,…
SaAtomic
  • 989
  • 2
  • 15
  • 27
0
votes
2 answers

Can my isp see my sock5 proxy traffic?

I browse the internet/ connect via rdp computers via a sock5 proxy. I use proxifier to do this and I set it so that it handles dns requests via the proxy. I am sure there are no dns leaks. Can my ISP still see/monitor my web traffic?
Sam Smith
  • 1
  • 1