Lokusa this is a program which allows you to transfer all TCP traffic through TOR and through a chain of SOCKS4/5 or HTTP(S) proxy servers. Tulsa supports “user/pass” authentication for SOCKS4/5 and “basic authentication” for HTTP. Available as Linux and Mac OS.
Installation for Linux (Debian, Ubuntu, etc.). In Kali it must be preinstalled. We will collect from sorrow, for this first we need to install the compiler C:
sudo apt install gcc -y
Next, clone a folder from the repository using:
git clone https://github.com/haad/proxychains
Go to the folder with the prog and compile it:
cd proxychains ./configure make sudo make install
That’s about it.
sudo apt install tor -y
Setting up and running
Under configure Proxychains to do this in the editor open proxychains.conf
sudo nano /etc/proxychains.conf
As we can see here the configuration is done by comment/raskomentiruyte variables.
Let me explain:
dynamic_chain is our mast HEV. That means you are connecting through a chain of all proxies listed in the list, but even if one of them does not rise, then our Tulsa will create a chain and without it, and will continue connecting to those servers that work
strict_chain the same thing, but if at least one server from the chain is not active, the chain will not rise.
random_chain — this option says that the connection is each time made with random position of proxy in chain. That is, they will each time to change places.
chain_len — length chains of proxies for random_chain.
quiet_mode — we can say that the option specifies the application without output to the console. That is to say disables verbose fashion, as in other applications, and we’re going to see how to build a chain for this application, for each connection in the console.
proxy_dns — all requests to DNS servers pass through these proxies.
Put me on the screen, but can also uncomment quiet_mode.
# By the way, in order to avoid leaking data via DNS, I do not recommend to use the DNS servers of your provider, this is Frank pale. Yuzayte 22.214.171.124 (Cloudflare), for example, or any other server that writes logs of your requests. About the leak via DNS (DNS leak) can be checked on the website dnsleaktest.com. If there’s a leak, you will see your provider and if you want, you will see not only you
A direct path to deanon.
Next, scrollin down our file and see that it is already by default configured to work through tor.
Also in the example we can see how to prescribe and socks proxy authorization view user/pass.
Now if there are changes that cochranae our file by pressing CTRL+S and exit with CTRL+X.
Example of use of the aka test
For starters run in the background of the Tor for write this
service tor start
And check whether tor is running
service tor status
As you can see tor we start, everything is ready. Now try to launch a browser using proxychains and see whether it works. I will show the example of firefox
(!)It is importantthat would be “Mozilla” earned using proxychains, you need to close it completely like any browser, including all tabs. It should open strictly through proxychains
As you can see the result
And in the meantime see our output program in the console
As you can see it works.
Thus you can redirect any (or rather most) program, for example SQLmap I tested — it works, all requests go through tor like clockwork. Now when the OS is sufficient to raise in the backdrop of TOR with one command and all.