Proxychains: redirect traffic through TOR

Proxychains: redirect traffic through TOR

Lokusa this is a program which allows you to transfer all TCP traffic through TOR and through a chain of SOCKS4/5 or HTTP(S) proxy servers. Tulsa supports “user/pass” authentication for SOCKS4/5 and “basic authentication” for HTTP. Available as Linux and Mac OS.


Installation for Linux (Debian, Ubuntu, etc.). In Kali it must be preinstalled. We will collect from sorrow, for this first we need to install the compiler C:

sudo apt install gcc -y

Next, clone a folder from the repository using:

git clone

Go to the folder with the prog and compile it:

cd proxychains
./configure make
sudo make install

That’s about it.

Put vector


sudo apt install tor -y

It’s simple.

Setting up and running

Under configure Proxychains to do this in the editor open proxychains.conf

sudo nano /etc/proxychains.conf

As we can see here the configuration is done by comment/raskomentiruyte variables.

Let me explain:
dynamic_chain is our mast HEV. That means you are connecting through a chain of all proxies listed in the list, but even if one of them does not rise, then our Tulsa will create a chain and without it, and will continue connecting to those servers that work

strict_chain the same thing, but if at least one server from the chain is not active, the chain will not rise.
random_chain — this option says that the connection is each time made with random position of proxy in chain. That is, they will each time to change places.
chain_len — length chains of proxies for random_chain.
quiet_mode — we can say that the option specifies the application without output to the console. That is to say disables verbose fashion, as in other applications, and we’re going to see how to build a chain for this application, for each connection in the console.
proxy_dns — all requests to DNS servers pass through these proxies.
Put me on the screen, but can also uncomment quiet_mode.

# By the way, in order to avoid leaking data via DNS, I do not recommend to use the DNS servers of your provider, this is Frank pale. Yuzayte (Cloudflare), for example, or any other server that writes logs of your requests. About the leak via DNS (DNS leak) can be checked on the website If there’s a leak, you will see your provider and if you want, you will see not only you

A direct path to deanon.

Next, scrollin down our file and see that it is already by default configured to work through tor.

Also in the example we can see how to prescribe and socks proxy authorization view user/pass.
Nothing complicated.
Now if there are changes that cochranae our file by pressing CTRL+S and exit with CTRL+X.

Example of use of the aka test

For starters run in the background of the Tor for write this

service tor start

And check whether tor is running

service tor status

As you can see tor we start, everything is ready. Now try to launch a browser using proxychains and see whether it works. I will show the example of firefox

proxychains firefox

(!)It is importantthat would be “Mozilla” earned using proxychains, you need to close it completely like any browser, including all tabs. It should open strictly through proxychains

As you can see the result

And in the meantime see our output program in the console

As you can see it works.


Thus you can redirect any (or rather most) program, for example SQLmap I tested — it works, all requests go through tor like clockwork. Now when the OS is sufficient to raise in the backdrop of TOR with one command and all.



0 0 vote
Article Rating
Notify of
Inline Feedbacks
View all comments

Do NOT follow this link or you will be banned from the site!
Would love your thoughts, please comment.x

Spelling error report

The following text will be sent to our editors: