Antes de tudo você tem que ter o Tor e o Proxychains instalados na sua maquina.
Debian e derivados:
Fedora:
Arch Linux:
Depois disso você vai entrar no como root no seu terminal e abrir o arquivo de configuração do Proxychains. Siga os seguintes passos:
Vai estar como na figura a cima.Agora você tem que descomentar a linha dynamic_chain,comentar a linha strict_chain e no final do arquivo adicionar: socks5 127.0.0.1 9050.
Vai ficar algo parecido com isso:
Antes de terminal você vai ter que rodar o seguinte comando: service tor start . Esse comando vai iniciar o Tor.
Agora é só você dar esse comando: proxychains iceweasel meuip.com e pronto você já estará anonimo na web!!
Debian e derivados:
Código:
sudo apt-get install tor proxychains
Código:
sudo yum install tor proxychains
Código:
sudo pacman -S install tor proxychains
Depois disso você vai entrar no como root no seu terminal e abrir o arquivo de configuração do Proxychains. Siga os seguintes passos:
Código:
root@TheDark:~# nano /etc/proxychains.conf
Código:
# proxychains.conf VER 3.1
Código:
# # HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS. # # The option below identifies how the ProxyList is treated. # only one option should be uncommented at time, # otherwise the last appearing option will be accepted # # dynamic_chain # # Dynamic - Each connection will be done via chained proxies # all proxies chained in the order as they appear in the list # at least one proxy must be online to play in chain # (dead proxies are skipped) # otherwise EINTR is returned to the app # strict_chain # # Strict - Each connection will be done via chained proxies # all proxies chained in the order as they appear in the list # all proxies must be online to play in chain # otherwise EINTR is returned to the app # #random_chain # # Random - Each connection will be done via random proxy # (or proxy chain, see chain_len) from the list. # this option is good to test your IDS :) # Make sense only if random_chain #chain_len = 2 # Quiet mode (no output from library) #quiet_mode # Proxy DNS requests - no leak for DNS data proxy_dns # Some timeouts in milliseconds tcp_read_time_out 15000 tcp_connect_time_out 8000 # ProxyList format # type host port [user pass] # (values separated by 'tab' or 'blank') # # # Examples: # # # # # proxy types: http, socks4, socks5 # ( auth types supported: "basic"-http "user/pass"-socks ) # [ProxyList] # add proxy here ... # meanwile # defaults set to "tor" socks4 127.0.0.1 9050
Vai ficar algo parecido com isso:
Código:
root@TheDark:~# nano /etc/proxychains.conf
Código:
root@TheDark:~# nano /etc/proxychains.conf # proxychains.conf VER 3.1 # # HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS. # # The option below identifies how the ProxyList is treated. # only one option should be uncommented at time, # otherwise the last appearing option will be accepted # dynamic_chain # # Dynamic - Each connection will be done via chained proxies # all proxies chained in the order as they appear in the list # at least one proxy must be online to play in chain # (dead proxies are skipped) # otherwise EINTR is returned to the app # # strict_chain # # Strict - Each connection will be done via chained proxies # all proxies chained in the order as they appear in the list # all proxies must be online to play in chain # otherwise EINTR is returned to the app # #random_chain # # Random - Each connection will be done via random proxy # (or proxy chain, see chain_len) from the list. # this option is good to test your IDS :) # Make sense only if random_chain #chain_len = 2 # Quiet mode (no output from library) #quiet_mode # Proxy DNS requests - no leak for DNS data proxy_dns # Some timeouts in milliseconds tcp_read_time_out 15000 tcp_connect_time_out 8000 # ProxyList format # type host port [user pass] # (values separated by 'tab' or 'blank') # # # Examples: # # # # # proxy types: http, socks4, socks5 # ( auth types supported: "basic"-http "user/pass"-socks ) # [ProxyList] # add proxy here ... # meanwile # defaults set to "tor" socks4 127.0.0.1 9050 socks5 127.0.0.1 9050
Antes de terminal você vai ter que rodar o seguinte comando: service tor start . Esse comando vai iniciar o Tor.
Agora é só você dar esse comando: proxychains iceweasel meuip.com e pronto você já estará anonimo na web!!
Comment