Hey all. I checked the forums and Google for similar problems and I found one here but it still hasn't helped me get around something.
I've been using Kali for about 2 weeks now, and I've been having trouble getting proxychains to work. With most attempts it just shows "ProxyChains-3.1 (http://proxychains.sf.net)" and runs the command immediately, without going through the proxies given. However, when I run proxychains nmap www.mywebpage.com, it shows it going through the proxies - even though they either timeout or are denied, until it connects to 4.2.2.2:53 for DNS check, then it runs.. without masking my IP - Using just TOR it always says it's being denied. Running proxychains elinks cmyip.com doesn't do anything but pull up cmyip.com and shows my real IP. This all works fine on my other box running BackTrack 5 RC3. ****, sorry if this is confusing, I suck at explaining things. I'll post my config here. I've tried everything from using dynamic_chain and strict_chain, to using only the TOR proxy, to using lots of live proxies. I have TOR (and privoxy if it matters) installed and run it with service tor start. Thanks in advance, if you can understand this. If not, I can try again to explain. >.o For your convenience I've cut a lot of the commented stuff from the config file:
Again, any other proxychains <command> fails without even going thro0ugh the chain. Cheers.Code:# proxychains.conf VER 3.1 # dynamic_chain # #Dynamic - Each connection will be done via chained proxies # all proxies chained in the order as they appear in the list # at least one proxy must be online to play in chain # (dead proxies are skipped) # otherwise EINTR is returned to the app # #strict_chain # # Strict - Each connection will be done via chained proxies # all proxies chained in the order as they appear in the list # all proxies must be online to play in chain # otherwise EINTR is returned to the app #random_chain # # Random - Each connection will be done via random proxy # (or proxy chain, see chain_len) from the list. # this option is good to test your IDS :) # Make sense only if random_chain #chain_len = 2 # Quiet mode (no output from library) #quiet_mode # Proxy DNS requests - no leak for DNS data proxy_dns # Some timeouts in milliseconds tcp_read_time_out 19000 tcp_connect_time_out 10000 # ProxyList format # type host port [user pass] # (values separated by 'tab' or 'blank') [ProxyList] # add proxy here ... # meanwile # defaults set to "tor" socks4 127.0.0.1 9050 http #.#.#.195 8080 http #.#.#.133 8080 Thanks again, all! And hi, I'm Enks. Oh if you want the log of the only instance in which this works, here goes: # proxychains nmap www.mysiteblahblah.com ProxyChains-3.1 (http://proxychains.sf.net) Starting Nmap 6.25 ( http://nmap.org ) at 2013-04-21 05:43 EDT |DNS-request| www.mysiteblahblah.com |D-chain|-<>-127.0.0.1:9050-<>-#.#.#.195:8080-<--denied |D-chain|-<>-127.0.0.1:9050-<>-#.#.#.133:8080-<--denied |D-chain|-<>-127.0.0.1:9050-<><>-4.2.2.2:53-<><>-OK |D-chain|-<>-127.0.0.1:9050-<><>-4.2.2.2:53-<><>-OK |DNS-response| www.mysiteblahblah is #.#.#.78 Nmap scan report for www.mysiteblahblah (#.#.#.78)