Anonymity with ProxyChains

Leaking Everywhere

To make sure that I am not leaking any DNS lookups to third parties, I'll use a clever site called DNSleaktest.com [15].

Visit the site in Firefox (with proxying enabled), and then run the Standard test (Figure 9). If you are connected to a VPN and some servers displayed aren't associated with that VPN service, then you have a DNS leak.

Figure 9: Wow, a clear connection – without DNS leakage.

Conclusion

ProxyChains is an anonymity tool that can operate with or without the Tor network. If you get stuck, a top troubleshooting tip is to make sure your laptop's system clock is precisely set. The simplest way to set the system clock is to just install the ntpdate package and manually run the update command. The following example shows a global NTP server pool, but you can adjust the command to your region if needed:

$ apt install -y ntpdate
$ ntpdate -v pool.ntp.org

I hope that you have been suitably impressed with the undeniably sophisticated ProxyChains and the remarkable Tor network. Setting up ProxyChains is simple and painless, with a useful outcome that other software struggles to get close to.

There are many applications that you can push through a proxy chain using TCP-based traffic or via the Tor network. I'd suggest practicing with a variety of packages.

As a reminder, you should use your newly found knowledge ethically and wisely.

The Author

Chris Binnie is a Cloud Native Security consultant and coauthor of the book Cloud Native Security: https://www.amazon.com/Cloud-Native-Security-Chris-Binnie/dp/1119782236

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Socks 5

    Socks is a universal proxy protocol for TCP and UDP that allows internal hosts to securely pass the firewall and authenticates users. This article describes the latest version of the Socks proxy protocol and shows how to implement it.

  • Tor and Privoxy

    Internet users typically reveal their IP addresses, and this lets companies compile a profile of your Internet activities. Tor and Privoxy can help protect your privacy.

  • Java Anonymous Proxy

    Many Websites log IP addresses and access times to identify users. If you don’t want to wind up as data in someone’s market research, the Java Anonymous Proxy will keep your surfing secret.

  • Squid Bridge

    Caching proxies remember web pages and serve them up locally, saving both money and time. The most intelligent members of this family also remove dangerous content and provide transparent bridging.

  • SSH Tunneling on Android for Secure Web Browsing
comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News