Proxychains – A step to anonymity so that you don’t leave your trails and authorities don’t run after you. Kali Linux or any other Linux of you choice and TOR will help us become anonymous.

Kali Linux + TOR + Proxychains will let us be anonymous if you do the rest properly. So let us just start, follow the below steps

Start your Kali Linux Operating System.

Fire up your Kali Linux Operating System
Fire up your Kali Linux Operating System

Run the terminal and the following commands to ensure that TOR , Proxychains are running

Check if TOR is running by the commands above.
Check if TOR is running by the commands above.

Now we need to configure the proxychains file in /etc/proxychains.conf . In Terminal or by file manager or any way edit the mentioned file.

Edit the Proxychains.conf file in your favourite editor gedit leafpad nano vim  or any other
Edit the Proxychains.conf file in your favourite editor gedit leafpad nano vim or any other

Edit the File to enable Dynamic Chains and comment out Strict chains. We will later discuss what are these.

Enable Dynamic Chains and Remove the hash in front.

Remove  "#" from the Dynamic chains line to un-comment and enable Dynamic Chain
Remove “#” from the Dynamic chains line to un-comment and enable Dynamic Chain

Now Disable Strict chains by commenting the line – place a # in front

comment out by # i front of Strict chain
comment out by # i front of Strict chain

Enable Proxy Chains for DNS Request, if you don’t you can easily still be traced , so this is very important you enable DNS Requests to be behind proxy as well.

remove # to enable DNS Queries Proxy
remove # to enable DNS Queries Proxy

Now comes the Proxies, we will use the TOR proxy which we installed in first step.
you can use the choice of your proxy be it SOCKS 4 or SOCKS5 or whatever you want, we will be here using TOR, which runs on port 9050. Edit the file like below and save this and close.

Configure Proxy List, we are using the TOR Proxy here SOCKS5 127.0.0.1 9050
Configure Proxy List, we are using the TOR Proxy here SOCKS5 127.0.0.1 9050

Now next part is configuring the default DNS Resolver else we face error . Edit the file – /usr/lib/proxychains3/proxyresolv and than creat a link, in terminal type the below commands

Now edit proxyresolv file to enable DNS Query behind a proxy and DNS Resolver of your choice
Now edit proxyresolv file to enable DNS Query behind a proxy and DNS Resolver of your choice

Here in the DNS address type the DNS you like to use, I would use Cloudflare 1.1.1.1 , you may chose any, Open dns or google DNS 8.8.8.8 , you choice, by the way clouflare DNS is really working excellent on all the fronts, my suggestion. After editing Save the file.

I am using here Cloudflare 1.1.1.1 DNS Resolver
I am using here Cloudflare 1.1.1.1 DNS Resolver

Create a link for the file above in case some distribution load the resources from a different location and we don’t want errors, type the below command in terminal

We are done with the setup part now lets check.
I will just post a pic here to show it’s working.
And restart TOR and check status if running.
In terminal type the following Command to execute you application

start firefox with proxychains start firefox or namp or whatever you like with proxychains placed before the command.
start firefox with proxychains
start firefox with proxychains
See we are in Germany but actually I am not, Proxy working the way it should

Restarted tor and see the location changed again.

This was brief and setting up proxychains. We will discuss more into this thing to make it real though to be tracked and cover more details, there are multiple ways to track a user and we will cover each one of them in upcoming articles, I will try updating the article later.

What Do You Think on This ? Say Here