Fork me on GitHub

Linux之ProxyChains终端代理软件

ProxyChains终端代理软件

ProxyChains介绍

官网地址
Github地址
About proxychains tool:
* It’s a proxifier.
* Latest version: 3.1
* Dedicated OS: Linux and other Unices.
* Allows TCP and DNS tunneling through proxies.
* Supports HTTP, SOCKS4 and SOCKS5 proxy servers.
* Different proxy types can be mixed in the same chain.
* Proxy chain: user-defined list of proxies chained together.

Usability :
* Run any program through proxy server.
* Access the Internet from behind a restrictive firewall.
* Hide your IP
* Run SSH, telnet, wget, ftp, apt, vnc, nmap through proxy servers.
* Access Intranets (192.168../10...*) from outside through reverse proxy

ProxyChains部署实践

环境说明

1
2
3
4
# cat /etc/redhat-release
CentOS Linux release 7.4.1708 (Core)
# uname -r
3.10.0-693.el7.x86_64

部署实践

1
2
3
4
5
6
# wget https://github.com/haad/proxychains/archive/proxychains-4.2.0.tar.gz
# tar -zxf proxychains-4.2.0.tar.gz
# cd proxychains-proxychains-4.2.0/
# cat README # 安装及配置说明
# ./configure
# make && make install

使用方法说明

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
When to use it ?
1) When the only way to get "outside" from your LAN is through proxy server.
2) To get out from behind restrictive firewall which filters outgoing ports.
3) To use two (or more) proxies in chain:
like: your_host <--> proxy1 <--> proxy2 <--> target_host
4) To "proxify" some program with no proxy support built-in (like telnet)
5) Access intranet from outside via proxy.
5) To use DNS behind proxy.

Some cool features:

* This program can mix different proxy types in the same chain
like: your_host <-->socks5 <--> http <--> socks4 <--> target_host
* Different chaining options supported
random order from the list ( user defined length of chain ).
exact order (as they appear in the list )
dynamic order (smart exclude dead proxies from chain)
* You can use it with any TCP client application, even network scanners
yes, yes - you can make portscan via proxy (or chained proxies)
for example with Nmap scanner by fyodor (www.insecire.org/nmap).
proxychains nmap -sT -PO -p 80 -iR (find some webservers through proxy)
* You can use it with servers, like squid, sendmail, or whatever.
* DNS resolving through proxy.


Configuration:
--------------

proxychains looks for config file in following order:
1) file listed in environment variable ${PROXYCHAINS_CONF_FILE} or
provided as a -f argument to proxychains script or binary.
2) ./proxychains.conf
3) $(HOME)/.proxychains/proxychains.conf
4) /etc/proxychains.conf **

**see more in /etc/proxychains.conf

Usage Example:

$ proxychains telnet targethost.com

in this example it will run telnet through proxy(or chained proxies)
specified by proxychains.conf

Usage Example:

$ proxychains -f /etc/proxychains-other.conf targethost2.com

in this example it will use different configuration file then proxychains.conf
to connect to targethost2.com host.

Usage Example:

$ proxyresolv targethost.com

in this example it will resolve targethost.com through proxy(or chained proxies)
specified by proxychains.conf

总结

1、需要找到稳定快速的代理IP
2、proxychains只会代理TCP连接,而ping使用的是ICMP

参考资料

https://github.com/haad/proxychains

======================================================
希望各位朋友支持一下

本文作者:dongsheng
本文地址https://mds1455975151.github.io/archives/99c00eae.html
版权声明:转载请注明出处!

坚持技术分享,您的支持将鼓励我继续创作!