@@Alfred-Neuman he did a good job in the video foo. You definitely young, you getting butthurt over me giving dude props for making a good video. Unlike you, you don’t do shit with your life
@@mansurnura5033 you are real af, do mistakes, it is okay. I remember trying to hack into my university's website but f*cked up everything and they banned my ip address. 😂 (do mistakes but not the worst ones, like stealing money or smt)
I tried this but my firefox is not loading , it says "Unable to Connect" Edit: Do i need to configure Firefox network for it to work? Edit 2: Got it Fixed i switched to Dynamic chain instead of strict :)
Well everything's cool and you are awesome in explaining. SUBBED! But how can I perform net forwarding with it. If I wanna use some payloads or get access to a computer using backdoors, I must use NAT Forwarding. Can you help me out?
Why combine proxies and tor to begin with? Any pattern you form narrows down the list of suspects. By choosing proxies, you are forming a pattern. These patterns end up amazingly unique.
“So, we need to add proxies for each command we want to execute, based on what I understood from the end. How is this done, and where can we find these proxies?”
OML Thankyou! This helped me get through a sub-proxy server! Life saver! I needed this to hack into my own website pe cause it had hard securities and auto hack reporting codes, helped a lot my man!
Hey An0n Ali, what do you think of anonymizing a kali linux virtual machine with a whonix tor gateway? I've done it myself and I can confirm that it masks the virtual machine's IP address into another country but what do you think of doing something like that? Do you think it's as good as using proxychains like the ones you talked about in this video? Thank you. :)
Both approaches are effective, each with its own advantage. Using Proxychains with Tor is useful when you only need anonymity for specific tasks and tools, whereas anonymizing the entire Kali VM with Whonix is useful if you're looking for a more system wide anonymity, and want all the tools running to automatically have their traffic routed through Tor. (Ideal if you're using your machine for various tasks and want to ensure that all the traffic is anonymized by default 👾)
I would say initiate the traffic through a bridged tor session as our source IP. If it’s possible. So if somebody trace back how they can find out because of this bridge between our location machine and ISP..
I have a question: if Proxychains is configured solely with Tor and no additional proxies, what is the benefit of using Proxychains in this scenario? It seems that it would only route requests through the Tor network, why not using tor only then
bro i have a question to you, Tell me to how to setup proxies like hacker i read one book to proxie chains are not working properly at scanning to using namp and metasploit then what i can do that issue facing time, when i start pentrestion testing to the one website via metasploit then my loccation traced any agency then what i can do that time please make this question on separeate video on. And i am big fan of your videos from india......
Make sure you don't have an existing copy of firefox running. It won't tunnel thru tor correctly. You know it connects if you see strictchain output with command and see it for every site you go too.
I ran into a problem. the proxy stops working immediately after being turned on and does not work with other applications, can you help me solve the problem?
how do you safe changes on proxychains to the other options? if you don't answer I will assume is because you don't know the answer and that's ok. Thanks.
When I open Firefox with the command proxychains Firefox it says to me that I have to make sure that Firefox is permitted to access the web. Can someone help?
One more question Is there any way to see how are our request is typically going through servers. I mean can i see all the proxies that are used in the chaining process and in what order?
Thanks for the video! But I have encountered the following problem: when I type proxychains firefox command I get the error 'filed sockets our timeout' can it be because I am from Russia and we have blocked torproject and proxy 127.0.0.1:9050 is its proxy server? Someone help me please
i guess the reason is that tor ips may be getting blocked in certain countries, plus proxy server ips aren't as suspicious as direct connections to tor in case you're hiding from your provider for some reason
why would someone prefer a proxy server to a vpn? just curious. i thought vpn's take care of encrypting data sent & exchanged (unlike the proxy server) while also masking the ip address.
after configuring the proxy chains everything stops working and the browser shows that unable to connect or something went wrong .But as soon as I turn of the chains again everything starts working any solution? please ?
i get a ERROR: ld.so: object 'libproxychains.so.3' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. when i try to run it with nmap, it completes the search but im not sure if im hidden how do i fix it?
I have a question What if i want to direct all my traffic through proxychains without writing proxychains again and again, is there any way to do that?
I was having lag and this started playing on its own. I thought it was an ad and waited for the skip button for 40 seconds. I was just about to believe an ad being creative with AI voices. I think that will never gonna happen. :( Ironic that this video is 100 times better than an ad, it is a shame it being an ad is impossible.
man really appreciate you, no stupid intro, no stupid talks, straight topic!!!
you don't mind the text-to-voice narration? it drives me absolutely crazy... j
@@xenostimme too I don’t like the voice but the content is really good so I tolerate it
@@xenostim I like it sounds more hacker like.
Bro, I really appreciate your efforts. New videos are getting better over time.
Odd, I was just thinking it was the singular worst-produced audio track in the history of RUclips lmao
@@davemccombsThat’s your opinion, I like this video format it’s great and very informative
Don’t be fooled. You can hide from a corporation, but you can’t hide from the government if you attract their attention.
depends on the government
@@nettlex more specific people working over there :0
Depends how much knowledge you have + competency of said government
But yeah, generally speaking a good advice unless you are prepared to go full Snowden i.e. flee country...
@@quicksolution5881 or do more smartly :0
there's no way my guy! U explained proxies better than any other RUclips video I've seen. i vouch for thus video.
This is RUclips video
he literally took the same script
Seriously?
This is really the best information you found?! Are you 10 yo?
Because if you are 10 yo you should probably not play with proxychains...
@@Alfred-Neuman he did a good job in the video foo. You definitely young, you getting butthurt over me giving dude props for making a good video. Unlike you, you don’t do shit with your life
@@Alfred-Neuman dummy🤣🤣
for me the best channel. no fake knowledge, the stuff works and i like the style of the videos.
Cybersecurity undergraduate here. Your videos are the best!
I am so excited to use this for educational purposes!
😂
@@cymantekfnosz3642 bro is definitely NOT using for educational purposes
Good one 😂
ismin ç.ok gzüel
That sounds malicious af 😂😂😂😂
Pro tip: you shouldn't do illegal things if you don't understand what you are doing.
Have to start somewhere
@@mansurnura5033 you are real af, do mistakes, it is okay. I remember trying to hack into my university's website but f*cked up everything and they banned my ip address. 😂 (do mistakes but not the worst ones, like stealing money or smt)
@@mansurnura5033 Start with ur security+ lol
Good advice
Very straightforward and informative. Thanks!
scammer
@@zakariaelmaddahiBro what's wrong with you? Are you okay? 😂
I was looking for this. Thanks for uploading it again. ❤
This video did not want to leave my recommended and I am glad I click on it, thank you.
Clean...Simple....Easy.... Thank you man.
this was the best tutorial on youtube and the funny parts were actually funny. thank you so much
straight to the point. appreciate your work.
I tried this but my firefox is not loading , it says "Unable to Connect"
Edit: Do i need to configure Firefox network for it to work?
Edit 2: Got it Fixed i switched to Dynamic chain instead of strict :)
Ask chat gpt
thanks for clear speech i couldnt find any true information about "proxy and tor" source on youtube and other sources .Preciateitbro!
i just woke up and i dont know what I am watching , but it is good
very good informative vid i already knew this stuff but i spent hours to learn them your vid sums it u pretty good!
Loved the video man♥, waiting for the next one
This video is great for my computer science course at university thank you 👍
Well everything's cool and you are awesome in explaining. SUBBED! But how can I perform net forwarding with it. If I wanna use some payloads or get access to a computer using backdoors, I must use NAT Forwarding. Can you help me out?
The best
Quick and good!
Why combine proxies and tor to begin with? Any pattern you form narrows down the list of suspects.
By choosing proxies, you are forming a pattern.
These patterns end up amazingly unique.
Explained it pretty well
Thank god!
Now, I can scan networks without any fear
you just earned yourself a new subscriber!
could you make a video on setting up proxychains with TAILS OS? if that's even possible
Great video except the part where you used Nano. I nearly threw up and had to start Vi immediately.
I do everything in EMACS.
Pleb.
This was a joke, I am sorry 😂.
Gonna go scan N Korean IP's now. Thanks!
“So, we need to add proxies for each command we want to execute, based on what I understood from the end. How is this done, and where can we find these proxies?”
OML Thankyou! This helped me get through a sub-proxy server! Life saver! I needed this to hack into my own website pe cause it had hard securities and auto hack reporting codes, helped a lot my man!
Hey An0n Ali, what do you think of anonymizing a kali linux virtual machine with a whonix tor gateway? I've done it myself and I can confirm that it masks the virtual machine's IP address into another country but what do you think of doing something like that? Do you think it's as good as using proxychains like the ones you talked about in this video? Thank you. :)
Why can't you do both?
Both approaches are effective, each with its own advantage. Using Proxychains with Tor is useful when you only need anonymity for specific tasks and tools, whereas anonymizing the entire Kali VM with Whonix is useful if you're looking for a more system wide anonymity, and want all the tools running to automatically have their traffic routed through Tor. (Ideal if you're using your machine for various tasks and want to ensure that all the traffic is anonymized by default 👾)
@@an0n_ali Good to know, TYSM for responding an0n_ali! Your seriously helping me with my infosec training. Keep up the great videos! :)
bro thanks a lot you helped me a lot with this video bro I appreciate it very much! you are a genius
Hello. My Question :- is Tor still relevant in 2023 for privacy purposes ??
I would say initiate the traffic through a bridged tor session as our source IP.
If it’s possible.
So if somebody trace back how they can find out because of this bridge between our location machine and ISP..
i was short and easy to understand video 🚀✨
really helpful. I love your videos man❤
I have a question: if Proxychains is configured solely with Tor and no additional proxies, what is the benefit of using Proxychains in this scenario? It seems that it would only route requests through the Tor network, why not using tor only then
To use external application like mozilla / burpsuite
Ok but how many layers of proxychains would be protecting anyone who uses this to hide themselves
"proxychains bash" would remove the necessity to put "proxychains" before every command?
Thanks so much for this!
Is 'proxychains ' the same as putting 'proxychains4 '?
thank you very much
Is this method hide me from government or this method only slow down the time being getting caught
I am not comfortable with the response with my TOR STATUS.
I love this channel
after writing proxy firefox it says "LD_PRELOAD cannot be preloaded (failed to map segment from shared object)" what to do pls help
Are there risks associated with using TOR?
This video is awesome Keep it up!
Excellent, THX
Excellent man!
Damn MAN, great lesson!
maybe you can make a video about social engineering? thanks
No matter what proxies i use 90% of the time i get "socket error or timeout"......when trying to visit any website. Could you help me out?
If I use proxychains and tor like that I'm unable to use the firefox or somthing like that but why
bro i have a question to you, Tell me to how to setup proxies like hacker i read one book to proxie chains are not working properly at scanning to using namp and metasploit then what i can do that issue facing time, when i start pentrestion testing to the one website via metasploit then my loccation traced any agency then what i can do that time please make this question on separeate video on. And i am big fan of your videos from india......
Tor is active but no change in ip address im configured in a nat network vm does that interfere in any manner?
Make sure you don't have an existing copy of firefox running. It won't tunnel thru tor correctly. You know it connects if you see strictchain output with command and see it for every site you go too.
@@ghostinc7 that was my issue as well thank you
it's works for me! very nice video! 🚀✨
I ran into a problem. the proxy stops working immediately after being turned on and does not work with other applications, can you help me solve the problem?
Sorry maybe is a dumb question. Why do i need proxychain when I can use Tor. Tor have strong Encryption than regular proxyserver.
because the tor exit node’s leaves your identify vulnerable
but you know that this website also knew a few things about you got me 😭😭
Why do not use just tor service alone, as it makes also kind of chaining?
Hello and thank you. But I have mistakes “I need more proxyies” and “ timeout” what I did wrong?
I use Linux mint
Sorry for my English
how do you safe changes on proxychains to the other options? if you don't answer I will assume is because you don't know the answer and that's ok. Thanks.
Is it possible to run Tor Browser with proxychains?
Amazing content.
Hello what's the difference when you set up proxies from google and using tor method?
what proxy server should I use?
Brother, Mash'Allah you have given many important and useful information. Thank you.
so Tor automatically connectts you to more than one proxy?
How to configure non numeric residential proxy in proxychains
When I open Firefox with the command proxychains Firefox it says to me that I have to make sure that Firefox is permitted to access the web. Can someone help?
is apt the only one you use? Do you use dnf or pacman?
bro when i conf it doesnt say anything
Is proxy chains are good for brute forceing ???
yes
One more question
Is there any way to see how are our request is typically going through servers. I mean can i see all the proxies that are used in the chaining process and in what order?
Thanks for the video! But I have encountered the following problem: when I type proxychains firefox command I get the error 'filed sockets our timeout' can it be because I am from Russia and we have blocked torproject and proxy 127.0.0.1:9050 is its proxy server? Someone help me please
I have problem with internet connection after writing (proxychains firefox) it’s run but if i want to visit a web site told me unable connect
how to prevent our home network, from data hijacking?
Good password with special characters, numbers etc. And WPA2/WPA3
And turn off wps :)
this channel is so fucking good
Are proxies even necessary after Tor? I guess it helps if the Tor nodes are compromised, but then proxies could be too?
i guess the reason is that tor ips may be getting blocked in certain countries, plus proxy server ips aren't as suspicious as direct connections to tor in case you're hiding from your provider for some reason
@@reallyweirdcat Makes sense yo!
in the video you only did 2 proxies (socks4 and socks5) can i add another socks 5 proxy if i want ?
please how to use proxychains with tor browser like ( proxychains tor browser ) instead of ( proxychains firefox )
why would someone prefer a proxy server to a vpn? just curious. i thought vpn's take care of encrypting data sent & exchanged (unlike the proxy server) while also masking the ip address.
most vpns are there just to sell your info, bu there are trusted ones like Mullvad who are known for denying giving data to the police etc.
which pc do u use
what about proxychains + tor + obfs4
I received this message from firefox Software is Preventing Firefox From Safely Connecting to This Site, Is there any part i missed or what?
after configuring the proxy chains everything stops working and the browser shows that unable to connect or something went wrong .But as soon as I turn of the chains again everything starts working any solution? please ?
same for me
did u find a fix
@@jamiedbighill7792 no I did not I tried everything which I was capable of
i get a ERROR: ld.so: object 'libproxychains.so.3' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. when i try to run it with nmap, it completes the search but im not sure if im hidden how do i fix it?
I have a question
What if i want to direct all my traffic through proxychains without writing proxychains again and again, is there any way to do that?
You could alias the Proxy chain command for a shorter type or custom bind the exec command to a keybinding.
In proxylist I deleted a red character because I kept having to see, is there a problem?
What to do if there stand package "tor" has no installation candidate
How to stop the tor by terminal.
Thanks man I was looking everywhere but it did not work! Becuase tor was not installed
I was having lag and this started playing on its own.
I thought it was an ad and waited for the skip button for 40 seconds.
I was just about to believe an ad being creative with AI voices. I think that will never gonna happen. :(
Ironic that this video is 100 times better than an ad, it is a shame it being an ad is impossible.
if you are watching this but still have ads on your browser, reconsider your priorities
Great video thanks
What about proxychains hydra? Will it change the ip in each attempt?
Yes i have questions how this video not delete yet?
Can you use tor proxychains for hping3
Is there a way to spoof your Mac address both on PC and termux?