Proxy Chain

oxide
11 years ago

0

<center>#Proxy Chain[/center]  



[center]###What is proxy Chain</center>  


Proxy chain is Using many proxies at same time so if anyone tried to get your Ip he got redirected to the other proxy :D in this tutorial we will use 3 programs  

[*][Tor](https://www.torproject.org/)  
[*][AnonymoX](https://addons.mozilla.org/en-US/firefox/addon/anonymox/?src=ss)  
[*][HotSpot Shield](http://www.hotspotshield.com/) or any another proxy  

Now Download tor after you end downloading it and installing it download on it the add-on AnonymoX  

After Tor and AnonymoX are install download hotspot Shield  

ok now since we have everything downloaded it's time to connect them together  

1- go to Tor ( Make sure your IP is changed )  

2- Turn in AnonymoX  

3- Turn on your Proxy  

And you are done with this now you can browse internet safe and anonymous  

if any data is incorrect be sure to let me know as i am relaying this fro ma friend im going to try later and i cant take credit

28replies
15voices
307views
Nate Ricketts [Drekzi]
11 years ago

0

Thanks for the info man!!!!

oxide
11 years ago

0

anytime man i hope it works well

Nate Ricketts [Drekzi]
11 years ago

0

So far it’s great

DaGr8Kornolio
11 years ago

0

It must be terribly slow… Do you surf the net in text mode? The last time I used Tor it was a pain. Also, Tor already works using multiple proxy simultaneously…

I’m not sure that using proxy is completely secure… What if someone in the chain eavesdrop the traffic? There is nothing that prevent the government or the mafia (is it different?) to start their own servers? Of course they must be able to trace you in every proxy to find you… But they can still see the traffic… Unless you also use a VPN…

There is also those studies that shows that it’s possible to monitor PNP network by publishing fake stuff (I red this a long time ago…). It is kinda scary… I might unplug my PC one day and start doing some ASCII ART.

DaGr8

Honey Boo Boo [Ski900]
11 years ago

0

What the fuck is the internet?

oxide
11 years ago

0

lol u guys are funny

Honey Boo Boo [Ski900]
11 years ago

0

tee hee! Great info though, thanks!

? [djsimon21]
11 years ago

0

Thanks for the post @oxide

Gninja
11 years ago

0

Nice post :) I personally would say that if you dont use a VPN then it just means your slowing the person down trying to find you.

DaGr8Kornolio
11 years ago

0

@gninja : Are you saying that it’s better not to use a VPN? If you use a VPN all your communication will be encrypted. This way no router or proxy will be able to know what you are doing… It’s a good thing? What is the best defense?

anon.father
11 years ago

0

hello guys iam starting a hackers group and looking for members

oxide
11 years ago

0

nice to meet you father

Sean [sheep1101]
11 years ago

0

reading through the discussion, i’m lost. Do i need the add-ons or can i use tor and take it as secure already.

Scott [scopes20]
11 years ago

0

Tor on its own has become less secure from the government as they now have Tor exit nodes, but if you do what Oxide said you will be pretty secure.

Sean [sheep1101]
11 years ago

0

thanks for the tip!

oxide
11 years ago

0

only thing with this is that tor severly will slow you down and expose you data to exit nodes as well as using anonymx will cap you at a certain bandwith usage per day for the standard service using their free vpn so weigh your options

Sean [sheep1101]
11 years ago

0

i notaced that on a basic Wifi this method is pretty useless, After all the Bandwidth caps, it’s not optional for a short term out in the open hack or browser. this would be good on a 10meg bandwidth.

is there any other tricks without cutting 85% bandwith?

oxide
11 years ago | edited 11 years ago

0

ya pay for a vpn or hack a wifi access point and drop it to a modified client bridge using ddwrt or openwrt

3rdHorseMan
11 years ago

0

Nice and very helpful tutorial. I never knew about the add on Anonymox. I appreciate it. Stay anonymous and Stay SECURE my friends.

oxide
11 years ago

0

ya right in this country they know what size my shits are before i flush lol but good luck

3rdHorseMan
11 years ago

0

oxide , why post this tutorial if your so afraid ?

oxide
11 years ago

0

who said im afraid perhaps i dont need to use tor like i said i have otehr ways i modify a linksys router to a ddwrt client bridge

than i use a cracked wifi key when i go black

so i dont have any thing that ties to me theres a difference between afraid and knowing better some of the code and shit i grab on black sessions in the past i would never use a home connection or anything like that but since i went legit i dont really use this style but i have no problem showing you guys how to hack a wifi network you own and set up a linksys or dlink router with a modified firmware that allows you to have ethernet to a device over wifi and plug in 4 ports including the wan port on the router

Aleks [Hashcode]
11 years ago

0

Thats a nice tutorial :) its very nice oxide.

Keindra
11 years ago

0

Nice tutorial!
Finally, now i know how to have a proxy chain.

CoreTeL
11 years ago | edited 11 years ago

0

who said im afraid perhaps i dont need to use tor like i said i have otehr ways i modify a linksys router to a ddwrt client bridge

than i use a cracked wifi key when i go black

so i dont have any thing that ties to me theres a difference between afraid and knowing better some of the code and shit i grab on black sessions in the past i would never use a home connection or anything like that but since i went legit i dont really use this style but i have no problem showing you guys how to hack a wifi network you own and set up a linksys or dlink router with a modified firmware that allows you to have ethernet to a device over wifi and plug in 4 ports including the wan port on the router

I am very interested if you could share a tutorial or have some time to discuss on jabber..

Now regarding the post
I came accross recently with this: https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN
Worth reading

I think proxies are very easy to be traced (public ones much easier) i mean if you do soomething serius the combination of tor+PublicProxy will definatly send you in jail…afterall traffic through proxy is not even encrypted..
Imo TOr+Vpn when the vpn is the exit node could increase privacy (only if the vpn provider is 100% safe,anonymous payments,etc)
it could prevent you being traced by pcs used as exit nodes set by the feds..

e.g.
First post nice to meet you all

gudgip
11 years ago | edited 11 years ago

0

Isn’t tor a ‘proxy’ chain on itself? :-)

I prefer I2P though.. http://www.i2p2.de/ There are rumours that some onion servers are controlled by higher instances.

Pinkponyprincess
11 years ago

0

Paranoia is our friend gudgip, i was anonymous online before Snowden made it cool, another method to consider is to"hide in the open" , using multiple emails and fake names on all sites you use, run a tor exit node , run a public WiFi hotspot. No traffic will ever be linked to your name specific . I would also recommend a mac address changer, www.fakenamegenerator.com , www.guerrillamail.com, TOR , spotflux(dont use spotflux in its own ) and finally of the top of my head www.hidemyass.com(also not to be used on its own). And remember to clear history and cookies on all browsers you use. I could go on but the most important thing is to be paranoid. I will check out I2P now…

gudgip
11 years ago

0

Yay, I like friends ;-) I am only anonymous online when I feel the need for it. I personally don’t like hidemyass.com at all, it’s slow and I’d like to see their logs. I2P and tor, maybe chained if you don’t mind to browse slow (if you use irssi and lynx, there shouldn’t be any problem).

I still prefer the good old backdoor chain on several cracked servers actually. You have full control of the logs and it’s easy to automate a chain. If you chain some backdoors with I2P and/or tor you won’t get caught easily. Except for some human errors.

You must be logged in to reply to this discussion. Login
1 of 29

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.

Dismiss