温馨提示×

温馨提示×

您好,登录后才能下订单哦!

密码登录×
登录注册×
其他方式登录
点击 登录注册 即表示同意《亿速云用户服务条款》

proxychains安装和配置

发布时间:2020-07-11 14:11:05 来源:网络 阅读:11067 作者:莎吧啦 栏目:安全技术

1,proxychains安装和配置

#cd /opt

# git clone https://github.com/haad/proxychains

# cd proxychains/

# ./configure --sysconfdir=/usr/local/etc

[root@localhost proxychains]# ./configure --sysconfdir=/usr/local/etc

Linux

done, now run make && make install

# make && make install

[root@localhost proxychains]# make && make install

make: Nothing to be done for `all'.

install -d //usr/local/bin //usr/local/lib //usr/local/etc //usr/local/include

install -D -m 755 proxychains4 //usr/local/bin/

install -D -m 644 libproxychains4.so //usr/local/lib/

#cp /opt/proxychains/src/proxychains.conf   /usr/local/etc/

# vim /usr/local/etc/proxychains.conf 

# proxychains.conf VER 4

#

# HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS.

#


# The option below identifies how the ProxyList is treated.

# only one option should be uncommented at time,

# otherwise the last appearing option will be accepted

#

#dynamic_chain

#

# Dynamic - Each connection will be done via chained proxies

# all proxies chained in the order as they appear in the list

# at least one proxy must be online to play in chain

# (dead proxies are skipped)

# otherwise EINTR is returned to the app

#

strict_chain

#

# Strict - Each connection will be done via chained proxies

# all proxies chained in the order as they appear in the list

# all proxies must be online to play in chain

# otherwise EINTR is returned to the app

#

#random_chain

#

# Random - Each connection will be done via random proxy

# (or proxy chain, see chain_len) from the list.

# this option is good to test your IDS :)


# Make sense only if random_chain

#chain_len = 2


# Quiet mode (no output from library)

#quiet_mode


# Proxy DNS requests - no leak for DNS data

proxy_dns


# set the class A subnet number to usefor use of the internal remote DNS mapping

# we use the reserved 224.x.x.x range by default,

# if the proxified app does a DNS request, we will return an IP from that range.

# on further accesses to this ip we will send the saved DNS name to the proxy.

# in case some control-freak app checks the returned ip, and denies to

# connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x.

# of course you should make sure that the proxified app does not need

# *real* access to this subnet.

# i.e. dont use the same subnet then in the localnet section

#remote_dns_subnet 127

#remote_dns_subnet 10

remote_dns_subnet 224


# Some timeouts in milliseconds

tcp_read_time_out 15000

tcp_connect_time_out 8000


# By default enable localnet for loopback address ranges

# RFC5735 Loopback address range

localnet 192.168.5.14/255.255.255.0

# RFC1918 Private Address Ranges

# localnet 10.0.0.0/255.0.0.0

# localnet 172.16.0.0/255.240.0.0

# localnet 192.168.0.0/255.255.0.0



# Example for localnet exclusion

## Exclude connections to 192.168.1.0/24 with port 80

# localnet 192.168.1.0:80/255.255.255.0


## Exclude connections to 192.168.100.0/24

# localnet 192.168.100.0/255.255.255.0


## Exclude connections to ANYwhere with port 80

# localnet 0.0.0.0:80/0.0.0.0


# ProxyList format

# type host port [user pass]

# (values separated by 'tab' or 'blank')

#

#

# Examples:

#

# socks5 192.168.67.78 1080 lamer secret

# http 192.168.89.3 8080 justu hidden

# socks4 192.168.1.49 1080

# http 192.168.39.93 8080

#

#

# proxy types: http, socks4, socks5

# ( auth types supported: "basic"-http "user/pass"-socks )

#

[ProxyList]

# add proxy here ...

# meanwile

# defaults set to "tor"

#socks4 127.0.0.1 9050


socks4 192.168.5.4 elisa 122541


2,proxychains的使用

# proxychains4 netstat -lntp


[root@localhost src]# proxychains4 netstat -lntp

[proxychains] config file found: /opt/proxychains/src/proxychains.conf

[proxychains] preloading /usr/local/lib/libproxychains4.so

[proxychains] DLL init

Active Internet connections (only servers)



向AI问一下细节

免责声明:本站发布的内容(图片、视频和文字)以原创、转载和分享为主,文章观点不代表本网站立场,如果涉及侵权请联系站长邮箱:is@yisu.com进行举报,并提供相关证据,一经查实,将立刻删除涉嫌侵权内容。

AI