Don't get caught! Hide Yourself w/ Proxychains and TOR

Поделиться
HTML-код
  • Опубликовано: 27 окт 2024

Комментарии • 365

  • @TechAmbition
    @TechAmbition Год назад +232

    man really appreciate you, no stupid intro, no stupid talks, straight topic!!!

    • @xenostim
      @xenostim 8 месяцев назад +2

      you don't mind the text-to-voice narration? it drives me absolutely crazy... j

    • @PILATESDILEMMA
      @PILATESDILEMMA 7 месяцев назад +2

      @@xenostimme too I don’t like the voice but the content is really good so I tolerate it

    • @alphathrivetribe
      @alphathrivetribe 4 месяца назад +2

      @@xenostim I like it sounds more hacker like.

  • @unknownexe-ih7wj
    @unknownexe-ih7wj Год назад +175

    Bro, I really appreciate your efforts. New videos are getting better over time.

    • @davemccombs
      @davemccombs Год назад +2

      Odd, I was just thinking it was the singular worst-produced audio track in the history of RUclips lmao

    • @279ft
      @279ft 8 месяцев назад +4

      @@davemccombsThat’s your opinion, I like this video format it’s great and very informative

  • @Rubalix
    @Rubalix Год назад +436

    Don’t be fooled. You can hide from a corporation, but you can’t hide from the government if you attract their attention.

    • @nettlex
      @nettlex Год назад +69

      depends on the government

    • @anirudhsaxena9214
      @anirudhsaxena9214 Год назад +20

      @@nettlex more specific people working over there :0

    • @quicksolution5881
      @quicksolution5881 Год назад +48

      Depends how much knowledge you have + competency of said government

    • @quicksolution5881
      @quicksolution5881 Год назад +38

      But yeah, generally speaking a good advice unless you are prepared to go full Snowden i.e. flee country...

    • @anirudhsaxena9214
      @anirudhsaxena9214 Год назад

      @@quicksolution5881 or do more smartly :0

  • @BascTechnology
    @BascTechnology Год назад +90

    there's no way my guy! U explained proxies better than any other RUclips video I've seen. i vouch for thus video.

    • @evilxking6611
      @evilxking6611 Год назад

      This is RUclips video

    • @killerx4123
      @killerx4123 9 месяцев назад

      he literally took the same script

    • @Alfred-Neuman
      @Alfred-Neuman 8 месяцев назад

      Seriously?
      This is really the best information you found?! Are you 10 yo?
      Because if you are 10 yo you should probably not play with proxychains...

    • @BascTechnology
      @BascTechnology 8 месяцев назад

      @@Alfred-Neuman he did a good job in the video foo. You definitely young, you getting butthurt over me giving dude props for making a good video. Unlike you, you don’t do shit with your life

    • @BascTechnology
      @BascTechnology 8 месяцев назад

      @@Alfred-Neuman dummy🤣🤣

  • @AC-wc5bc
    @AC-wc5bc 9 месяцев назад +12

    for me the best channel. no fake knowledge, the stuff works and i like the style of the videos.

  • @edwinfrancisco8116
    @edwinfrancisco8116 8 месяцев назад +58

    Cybersecurity undergraduate here. Your videos are the best!

  • @Yoklukbabapiro31
    @Yoklukbabapiro31 8 месяцев назад +67

    I am so excited to use this for educational purposes!

    • @cymantekfnosz3642
      @cymantekfnosz3642 7 месяцев назад +1

      😂

    • @shy4real
      @shy4real 7 месяцев назад

      @@cymantekfnosz3642 bro is definitely NOT using for educational purposes

    • @anonuser260
      @anonuser260 7 месяцев назад +1

      Good one 😂

    • @EmreBeycikk
      @EmreBeycikk 5 месяцев назад +1

      ismin ç.ok gzüel

    • @pedromiguel8418
      @pedromiguel8418 4 месяца назад +5

      That sounds malicious af 😂😂😂😂

  • @rutgerversteegden1668
    @rutgerversteegden1668 8 месяцев назад +43

    Pro tip: you shouldn't do illegal things if you don't understand what you are doing.

    • @mansurnura5033
      @mansurnura5033 5 месяцев назад +11

      Have to start somewhere

    • @SilentContact
      @SilentContact 4 месяца назад

      @@mansurnura5033 you are real af, do mistakes, it is okay. I remember trying to hack into my university's website but f*cked up everything and they banned my ip address. 😂 (do mistakes but not the worst ones, like stealing money or smt)

    • @ian562ADF52E
      @ian562ADF52E 3 месяца назад

      @@mansurnura5033 Start with ur security+ lol

    • @oentrepreneur
      @oentrepreneur 2 месяца назад

      Good advice

  • @vickyj4ng
    @vickyj4ng 8 месяцев назад +41

    Very straightforward and informative. Thanks!

    • @zakariaelmaddahi
      @zakariaelmaddahi 8 месяцев назад +1

      scammer

    • @vickyj4ng
      @vickyj4ng 8 месяцев назад +5

      ​@@zakariaelmaddahiBro what's wrong with you? Are you okay? 😂

  • @111-Czarny
    @111-Czarny Год назад +14

    I was looking for this. Thanks for uploading it again. ❤

  • @c0mpute
    @c0mpute 8 месяцев назад +4

    This video did not want to leave my recommended and I am glad I click on it, thank you.

  • @asaduzzamanjony6243
    @asaduzzamanjony6243 5 месяцев назад +2

    Clean...Simple....Easy.... Thank you man.

  • @Stonedroller
    @Stonedroller 8 месяцев назад +2

    this was the best tutorial on youtube and the funny parts were actually funny. thank you so much

  • @MYM60
    @MYM60 Год назад +6

    straight to the point. appreciate your work.

  • @SIftekharH
    @SIftekharH Год назад +16

    I tried this but my firefox is not loading , it says "Unable to Connect"
    Edit: Do i need to configure Firefox network for it to work?
    Edit 2: Got it Fixed i switched to Dynamic chain instead of strict :)

  • @MKYLMV
    @MKYLMV 8 месяцев назад +2

    thanks for clear speech i couldnt find any true information about "proxy and tor" source on youtube and other sources .Preciateitbro!

  • @lordofdeath9247
    @lordofdeath9247 8 месяцев назад +2

    i just woke up and i dont know what I am watching , but it is good

  • @belliouss6971
    @belliouss6971 8 месяцев назад +3

    very good informative vid i already knew this stuff but i spent hours to learn them your vid sums it u pretty good!

  • @Sam-nC1mf
    @Sam-nC1mf Год назад +4

    Loved the video man♥, waiting for the next one

  • @cumblemore9649
    @cumblemore9649 7 месяцев назад

    This video is great for my computer science course at university thank you 👍

  • @cyberash3910
    @cyberash3910 9 месяцев назад +4

    Well everything's cool and you are awesome in explaining. SUBBED! But how can I perform net forwarding with it. If I wanna use some payloads or get access to a computer using backdoors, I must use NAT Forwarding. Can you help me out?

  • @everythingishere5741
    @everythingishere5741 Год назад +3

    The best
    Quick and good!

  • @YeloPartyHat
    @YeloPartyHat 7 месяцев назад

    Why combine proxies and tor to begin with? Any pattern you form narrows down the list of suspects.
    By choosing proxies, you are forming a pattern.
    These patterns end up amazingly unique.

  • @Psi141
    @Psi141 2 месяца назад

    Explained it pretty well

  • @jhangirahmad1544
    @jhangirahmad1544 2 месяца назад

    Thank god!
    Now, I can scan networks without any fear

  • @c0mrad_rsa
    @c0mrad_rsa 7 месяцев назад

    you just earned yourself a new subscriber!

  • @sebastianaguillon2722
    @sebastianaguillon2722 4 месяца назад +1

    could you make a video on setting up proxychains with TAILS OS? if that's even possible

  • @ian562ADF52E
    @ian562ADF52E 3 месяца назад +2

    Great video except the part where you used Nano. I nearly threw up and had to start Vi immediately.

    • @joeschmoe3815
      @joeschmoe3815 2 месяца назад +1

      I do everything in EMACS.
      Pleb.
      This was a joke, I am sorry 😂.

  • @Parasclepius
    @Parasclepius Месяц назад +1

    Gonna go scan N Korean IP's now. Thanks!

  • @canalprosperiteIQ
    @canalprosperiteIQ 5 месяцев назад

    “So, we need to add proxies for each command we want to execute, based on what I understood from the end. How is this done, and where can we find these proxies?”

  • @BubblyShark482
    @BubblyShark482 6 месяцев назад

    OML Thankyou! This helped me get through a sub-proxy server! Life saver! I needed this to hack into my own website pe cause it had hard securities and auto hack reporting codes, helped a lot my man!

  • @AlexMercersRevenge
    @AlexMercersRevenge Год назад +9

    Hey An0n Ali, what do you think of anonymizing a kali linux virtual machine with a whonix tor gateway? I've done it myself and I can confirm that it masks the virtual machine's IP address into another country but what do you think of doing something like that? Do you think it's as good as using proxychains like the ones you talked about in this video? Thank you. :)

    • @hadrian2505
      @hadrian2505 Год назад +1

      Why can't you do both?

    • @an0n_ali
      @an0n_ali  Год назад +30

      Both approaches are effective, each with its own advantage. Using Proxychains with Tor is useful when you only need anonymity for specific tasks and tools, whereas anonymizing the entire Kali VM with Whonix is useful if you're looking for a more system wide anonymity, and want all the tools running to automatically have their traffic routed through Tor. (Ideal if you're using your machine for various tasks and want to ensure that all the traffic is anonymized by default 👾)

    • @AlexMercersRevenge
      @AlexMercersRevenge Год назад

      @@an0n_ali Good to know, TYSM for responding an0n_ali! Your seriously helping me with my infosec training. Keep up the great videos! :)

  • @ibragimatajanov1905
    @ibragimatajanov1905 7 месяцев назад

    bro thanks a lot you helped me a lot with this video bro I appreciate it very much! you are a genius

  • @ytg6663
    @ytg6663 Год назад +2

    Hello. My Question :- is Tor still relevant in 2023 for privacy purposes ??

  • @sreejith_jinachandran
    @sreejith_jinachandran 9 месяцев назад +1

    I would say initiate the traffic through a bridged tor session as our source IP.
    If it’s possible.
    So if somebody trace back how they can find out because of this bridge between our location machine and ISP..

  • @raga5470
    @raga5470 Год назад +1

    i was short and easy to understand video 🚀✨

  • @AklaAkash-u7c
    @AklaAkash-u7c Год назад +1

    really helpful. I love your videos man❤

  • @mohamedfadelmoumeni3557
    @mohamedfadelmoumeni3557 16 дней назад

    I have a question: if Proxychains is configured solely with Tor and no additional proxies, what is the benefit of using Proxychains in this scenario? It seems that it would only route requests through the Tor network, why not using tor only then

    • @golemitodelnoche
      @golemitodelnoche 12 дней назад +1

      To use external application like mozilla / burpsuite

  • @oentrepreneur
    @oentrepreneur 2 месяца назад

    Ok but how many layers of proxychains would be protecting anyone who uses this to hide themselves

  • @the_yurest
    @the_yurest 6 месяцев назад

    "proxychains bash" would remove the necessity to put "proxychains" before every command?

  • @antikoerper256
    @antikoerper256 8 месяцев назад

    Thanks so much for this!

  • @noclipkip
    @noclipkip 5 месяцев назад

    Is 'proxychains ' the same as putting 'proxychains4 '?

  • @omrisawcen
    @omrisawcen 3 месяца назад

    thank you very much

  • @alfieevanfernandez7359
    @alfieevanfernandez7359 8 месяцев назад +1

    Is this method hide me from government or this method only slow down the time being getting caught

  • @theresaigube5734
    @theresaigube5734 10 месяцев назад

    I am not comfortable with the response with my TOR STATUS.

  • @gojo1825
    @gojo1825 5 месяцев назад

    I love this channel

  • @ManishSingh-lt5nt
    @ManishSingh-lt5nt Месяц назад

    after writing proxy firefox it says "LD_PRELOAD cannot be preloaded (failed to map segment from shared object)" what to do pls help

  • @drakedougherty3981
    @drakedougherty3981 5 месяцев назад

    Are there risks associated with using TOR?

  • @p1nkpanther825
    @p1nkpanther825 11 месяцев назад +1

    This video is awesome Keep it up!

  • @bingolio
    @bingolio 4 месяца назад

    Excellent, THX

  • @Chris-bw7eb
    @Chris-bw7eb 8 месяцев назад +1

    Excellent man!

  • @DerekNhyira
    @DerekNhyira Год назад +1

    Damn MAN, great lesson!

  • @naufaleurasia.n950
    @naufaleurasia.n950 Год назад

    maybe you can make a video about social engineering? thanks

  • @WAAC-cw2nd
    @WAAC-cw2nd Год назад +1

    No matter what proxies i use 90% of the time i get "socket error or timeout"......when trying to visit any website. Could you help me out?

  • @200ley
    @200ley 7 месяцев назад

    If I use proxychains and tor like that I'm unable to use the firefox or somthing like that but why

  • @pratikanand8437
    @pratikanand8437 11 месяцев назад

    bro i have a question to you, Tell me to how to setup proxies like hacker i read one book to proxie chains are not working properly at scanning to using namp and metasploit then what i can do that issue facing time, when i start pentrestion testing to the one website via metasploit then my loccation traced any agency then what i can do that time please make this question on separeate video on. And i am big fan of your videos from india......

  • @fmrshortstm7025
    @fmrshortstm7025 Год назад +2

    Tor is active but no change in ip address im configured in a nat network vm does that interfere in any manner?

    • @ghostinc7
      @ghostinc7 Год назад +2

      Make sure you don't have an existing copy of firefox running. It won't tunnel thru tor correctly. You know it connects if you see strictchain output with command and see it for every site you go too.

    • @robethius_
      @robethius_ 5 месяцев назад +1

      @@ghostinc7 that was my issue as well thank you

  • @axellonda5638
    @axellonda5638 Год назад

    it's works for me! very nice video! 🚀✨

  • @ШухратжоновАбдулборий

    I ran into a problem. the proxy stops working immediately after being turned on and does not work with other applications, can you help me solve the problem?

  • @SiamSocietY
    @SiamSocietY 8 месяцев назад

    Sorry maybe is a dumb question. Why do i need proxychain when I can use Tor. Tor have strong Encryption than regular proxyserver.

    • @shoface1798
      @shoface1798 8 месяцев назад

      because the tor exit node’s leaves your identify vulnerable

  • @ezstocks
    @ezstocks 7 месяцев назад

    but you know that this website also knew a few things about you got me 😭😭

  • @dmitrr
    @dmitrr 8 месяцев назад

    Why do not use just tor service alone, as it makes also kind of chaining?

  • @TG_Dina1773
    @TG_Dina1773 8 месяцев назад

    Hello and thank you. But I have mistakes “I need more proxyies” and “ timeout” what I did wrong?
    I use Linux mint
    Sorry for my English

  • @Anondady
    @Anondady Месяц назад

    how do you safe changes on proxychains to the other options? if you don't answer I will assume is because you don't know the answer and that's ok. Thanks.

  • @2Yahyu2
    @2Yahyu2 2 месяца назад

    Is it possible to run Tor Browser with proxychains?

  • @FenrirDevOps
    @FenrirDevOps 11 месяцев назад +1

    Amazing content.

  • @Fesparta
    @Fesparta 7 месяцев назад

    Hello what's the difference when you set up proxies from google and using tor method?

  • @alphathrivetribe
    @alphathrivetribe 4 месяца назад

    what proxy server should I use?

  • @farhadrahman1658
    @farhadrahman1658 Год назад +3

    Brother, Mash'Allah you have given many important and useful information. Thank you.

  • @petroolenych9621
    @petroolenych9621 7 месяцев назад

    so Tor automatically connectts you to more than one proxy?

  • @captshadab
    @captshadab 3 месяца назад

    How to configure non numeric residential proxy in proxychains

  • @Agent-xg1ye
    @Agent-xg1ye 4 месяца назад

    When I open Firefox with the command proxychains Firefox it says to me that I have to make sure that Firefox is permitted to access the web. Can someone help?

  • @moviesync3131
    @moviesync3131 7 месяцев назад

    is apt the only one you use? Do you use dnf or pacman?

  • @spyrosant8632
    @spyrosant8632 8 месяцев назад +2

    bro when i conf it doesnt say anything

  • @Bot-User435
    @Bot-User435 10 месяцев назад +1

    Is proxy chains are good for brute forceing ???

  • @Survivor_0-ks7yi
    @Survivor_0-ks7yi 5 месяцев назад

    One more question
    Is there any way to see how are our request is typically going through servers. I mean can i see all the proxies that are used in the chaining process and in what order?

  • @imgod938
    @imgod938 3 месяца назад

    Thanks for the video! But I have encountered the following problem: when I type proxychains firefox command I get the error 'filed sockets our timeout' can it be because I am from Russia and we have blocked torproject and proxy 127.0.0.1:9050 is its proxy server? Someone help me please

  • @cnu0033
    @cnu0033 5 месяцев назад

    I have problem with internet connection after writing (proxychains firefox) it’s run but if i want to visit a web site told me unable connect

  • @medycznyklefedron
    @medycznyklefedron Год назад +11

    how to prevent our home network, from data hijacking?

    • @HeyItsQuantum
      @HeyItsQuantum Год назад

      Good password with special characters, numbers etc. And WPA2/WPA3

    • @od7763
      @od7763 9 месяцев назад

      And turn off wps :)

  • @qdza
    @qdza 8 месяцев назад

    this channel is so fucking good

  • @jonbikaku6133
    @jonbikaku6133 8 месяцев назад

    Are proxies even necessary after Tor? I guess it helps if the Tor nodes are compromised, but then proxies could be too?

    • @reallyweirdcat
      @reallyweirdcat 8 месяцев назад +1

      i guess the reason is that tor ips may be getting blocked in certain countries, plus proxy server ips aren't as suspicious as direct connections to tor in case you're hiding from your provider for some reason

    • @jonbikaku6133
      @jonbikaku6133 8 месяцев назад

      @@reallyweirdcat Makes sense yo!

  • @shoface1798
    @shoface1798 8 месяцев назад

    in the video you only did 2 proxies (socks4 and socks5) can i add another socks 5 proxy if i want ?

  • @ego-se2lp
    @ego-se2lp 6 месяцев назад

    please how to use proxychains with tor browser like ( proxychains tor browser ) instead of ( proxychains firefox )

  • @sommi
    @sommi 7 месяцев назад

    why would someone prefer a proxy server to a vpn? just curious. i thought vpn's take care of encrypting data sent & exchanged (unlike the proxy server) while also masking the ip address.

    • @srry-
      @srry- 7 месяцев назад

      most vpns are there just to sell your info, bu there are trusted ones like Mullvad who are known for denying giving data to the police etc.

  • @Coral_pepe
    @Coral_pepe 11 месяцев назад +1

    which pc do u use

  • @batuafk
    @batuafk 2 месяца назад

    what about proxychains + tor + obfs4

  • @kelvintan8390
    @kelvintan8390 7 месяцев назад

    I received this message from firefox Software is Preventing Firefox From Safely Connecting to This Site, Is there any part i missed or what?

  • @itachib0t749
    @itachib0t749 Год назад +1

    after configuring the proxy chains everything stops working and the browser shows that unable to connect or something went wrong .But as soon as I turn of the chains again everything starts working any solution? please ?

    • @SatoLiciousTFT
      @SatoLiciousTFT 10 месяцев назад

      same for me

    • @jamiedbighill7792
      @jamiedbighill7792 10 месяцев назад

      did u find a fix

    • @itachib0t749
      @itachib0t749 10 месяцев назад

      @@jamiedbighill7792 no I did not I tried everything which I was capable of

  • @randonmarcum5899
    @randonmarcum5899 4 месяца назад

    i get a ERROR: ld.so: object 'libproxychains.so.3' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. when i try to run it with nmap, it completes the search but im not sure if im hidden how do i fix it?

  • @Survivor_0-ks7yi
    @Survivor_0-ks7yi 5 месяцев назад

    I have a question
    What if i want to direct all my traffic through proxychains without writing proxychains again and again, is there any way to do that?

    • @alexanderlong2082
      @alexanderlong2082 5 месяцев назад

      You could alias the Proxy chain command for a shorter type or custom bind the exec command to a keybinding.

  • @rochaa06
    @rochaa06 7 месяцев назад

    In proxylist I deleted a red character because I kept having to see, is there a problem?

  • @OO9_MATRIX
    @OO9_MATRIX 4 месяца назад

    What to do if there stand package "tor" has no installation candidate

  • @SaiKamal-l4b
    @SaiKamal-l4b Месяц назад

    How to stop the tor by terminal.

  • @timecop1983Two
    @timecop1983Two 10 месяцев назад

    Thanks man I was looking everywhere but it did not work! Becuase tor was not installed

  • @galvinvoltag
    @galvinvoltag 11 месяцев назад +1

    I was having lag and this started playing on its own.
    I thought it was an ad and waited for the skip button for 40 seconds.
    I was just about to believe an ad being creative with AI voices. I think that will never gonna happen. :(
    Ironic that this video is 100 times better than an ad, it is a shame it being an ad is impossible.

    • @swifttactics2143
      @swifttactics2143 10 месяцев назад +1

      if you are watching this but still have ads on your browser, reconsider your priorities

  • @lilham9044
    @lilham9044 11 месяцев назад

    Great video thanks

  • @S_ZXV
    @S_ZXV 8 месяцев назад

    What about proxychains hydra? Will it change the ip in each attempt?

  • @moneradlby1428
    @moneradlby1428 8 месяцев назад

    Yes i have questions how this video not delete yet?

  • @fastaxW
    @fastaxW 2 месяца назад

    Can you use tor proxychains for hping3

  • @Tofarglobal
    @Tofarglobal 5 месяцев назад

    Is there a way to spoof your Mac address both on PC and termux?