Proxychains

Proxychains 翻译过来是代理链,是Linux和Unix下的命令行代理工具

代理和代理链是有区别的

  • 代理:通过http连接或者web代理在浏览器来进行一些浏览、访问
  • 代理链:代理链基本代理正在执行的整个程序的活动链

简单来说,代理链代理的更彻底,相对于代理来说匿名性更好

用法:

proxychains command 直接在有关网络连接的命令前加proxychains即可

配置文件位于/etc/proxychains

# proxychains.conf  VER 3.1
#
#        HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS.
#    

# The option below identifies how the ProxyList is treated.
# only one option should be uncommented at time,
# otherwise the last appearing option will be accepted
#
dynamic_chain    # 动态链,每个网络连接都通过代理
#
# Dynamic - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# at least one proxy must be online to play in chain
# (dead proxies are skipped)
# otherwise EINTR is returned to the app
#
#strict_chain
#
# Strict - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# all proxies must be online to play in chain
# otherwise EINTR is returned to the app
#
#random_chain
#
# Random - Each connection will be done via random proxy
# (or proxy chain, see  chain_len) from the list.
# this option is good to test your IDS :)

# Make sense only if random_chain
#chain_len = 2

# Quiet mode (no output from library)
#quiet_mode

# Proxy DNS requests - no leak for DNS data
proxy_dns # 防止DNS数据泄露

# Some timeouts in milliseconds
tcp_read_time_out 15000
tcp_connect_time_out 8000

# ProxyList format
#       type  host  port [user pass]
#       (values separated by 'tab' or 'blank')
#
#
#        Examples:
#
#                socks5    192.168.67.78    1080    lamer    secret
#        http    192.168.89.3    8080    justu    hidden
#         socks4    192.168.1.49    1080
#            http    192.168.39.93    8080    
#        
#
#       proxy types: http, socks4, socks5
#        ( auth types supported: "basic"-http  "user/pass"-socks )
#
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks4     127.0.0.1 9050
socks5  192.168.136.1 1080    # 代理类型    IP    端口

至于那个防止DNS数据泄露,是这样的,尽管你使用动态代理,每隔三到五分钟切换代理,全球跳IP,因为你的DNS没有代理,所以你的DNS还是位于你所在的地区,所以使用代理DNS可以提高匿名性

可以做个例子:

我现在注释proxy_dns,也就是不启用DNS代理,然后代理整个Firefox浏览器

proxychains firefox

报错处理:如果报错提示找不到libproxychains.so.3库,使用find命令查找

因为该代理工具是apt安装的,不是root专用的,所以一般会在/usr/

find /usr/ -name libproxychains.so.3 -print

最后找到是在/usr/lib/x86_64-linux-gnu/libproxychains.so.3

然后接着修改/usr/lib/proxychains3/proxyresolv配置文件

把LD_PRELOAD路径改一下就可以了

检查一下IP,嗯,成功代理了

我先后使用两个网站检查了DNS leak

可以看到,DNS基本是本国/本地区的

然后关闭浏览器,修改配置文件,启用proxy_dns

再来检查一下DNS leak

成功代理DNS

Macchanger

一个命令行工具,更改Mac地址

Mac地址前三位是制造商,局域网是基于Mac地址寻址

macchanger -a eth0    # 更改临时mac地址(随机)
macchanger -p eth0    # 更改永久mac地址

wget

wget 克隆网页

wget -mk site

待补充....

标签: 命令行工具

添加新评论