2023年7月20日发(作者:)
proxychains使⽤指北前⾔proxychains新的版本已经称为proxychains-ng由rofl0r托管在GitHub中维护,⼀般使⽤proxychains⽤于加速更新和下载国外的⼀些开源组件,⽐如yum和pip。proxychains使⽤⼗分简单,甚⾄都不必编译安装。proxychains ng (new generation)更新历史2017年04⽉16⽇ - 初稿扩展阅读3proxy简介ProxyChains is a UNIX program, that hooks network-related libc functions in DYNAMICALLY LINKED programs via a preloadedDLL (dlsym(), LD_PRELOAD) and redirects the connections through SOCKS4a/5 or HTTP proxies. It supports TCP only (noUDP/ICMP etc).The way it works is basically a HACK; so it is possible that it doesn't work with your program, especially when it's a script, orstarts numerous processes like background daemons or uses dlopen() to load "modules" (bug in glibc dynlinker).It should work with simple compiled (C/C++) dynamically linked programs your program doesn't work with proxychains, consider using an iptables based solution instead; this is much more ted Platforms: Linux, BSD, hains 安装配置# needs a working C compiler, preferably gccyum install gcc -y./configure --prefix=/usr --sysconfdir=/etcmake[optional] sudo make install[optional] sudo make install-config (installs )# if you dont install, you can use proxychains from the build directory like this:
./proxychains4 -f src/ telnet 80# ⼀般编辑添加socks5地址即可⽴即使⽤vim /etc/[ProxyList]# add proxy here ...# meanwile# defaults set to "tor"#socks4 127.0.0.1 9050socks5 172.28.70.26 1080# 测试[root@centos7 ~]# curl 当前 IP:116.228.53.149 来⾃于:中国 上海 上海 电信[root@centos7 ~]# proxychains4 curl [proxychains] config file found: /etc/[proxychains] preloading /usr/local/lib/[proxychains] DLL init: proxychains-ng 4.12[proxychains] Strict chain ... 172.28.70.26:1080 ... :80 ... OK当前 IP:45.79.192.22 来⾃于:美国 乔治亚州 亚特兰⼤ 配置⽂件[root@centos7 ~]# cat /etc/
# VER 4.x## HTTP, SOCKS4a, SOCKS5 tunneling proxifier with DNS.# The option below identifies how the ProxyList is treated.# only one option should be uncommented at time,# otherwise the last appearing option will be accepted##dynamic_chain## Dynamic - Each connection will be done via chained proxies# all proxies chained in the order as they appear in the list# at least one proxy must be online to play in chain# (dead proxies are skipped)# otherwise EINTR is returned to the app#strict_chain## Strict - Each connection will be done via chained proxies# all proxies chained in the order as they appear in the list# all proxies must be online to play in chain# otherwise EINTR is returned to the app##round_robin_chain## Round Robin - Each connection will be done via chained proxies# of chain_len length# all proxies chained in the order as they appear in the list# at least one proxy must be online to play in chain# (dead proxies are skipped).# the start of the current proxy chain is the proxy after the last# proxy in the previously invoked proxy chain.# if the end of the proxy chain is reached while looking for proxies# start at the beginning again.# start at the beginning again.# otherwise EINTR is returned to the app# These semantics are not guaranteed in a multithreaded environment.##random_chain## Random - Each connection will be done via random proxy# (or proxy chain, see chain_len) from the list.# this option is good to test your IDS :)# Make sense only if random_chain or round_robin_chain#chain_len = 2# Quiet mode (no output from library)#quiet_mode# Proxy DNS requests - no leak for DNS dataproxy_dns
# set the class A subnet number to use for the internal remote DNS mapping# we use the range by default,# if the proxified app does a DNS request, we will return an IP from that range.# on further accesses to this ip we will send the saved DNS name to the proxy.# in case some control-freak app checks the returned ip, and denies to
# connect, you can use another subnet, e.g. # of course you should make sure that the proxified app does not need# *real* access to this subnet.
# i.e. dont use the same subnet then in the localnet section#remote_dns_subnet 127
#remote_dns_subnet 10remote_dns_subnet 224# Some timeouts in millisecondstcp_read_time_out 15000tcp_connect_time_out 8000### Examples for localnet exclusion## localnet ranges will *not* use a proxy to connect.## Exclude connections to 192.168.1.0/24 with port 80# localnet 192.168.1.0:80/255.255.255.0## Exclude connections to 192.168.100.0/24# localnet 192.168.100.0/255.255.255.0## Exclude connections to ANYwhere with port 80# localnet 0.0.0.0:80/0.0.0.0## RFC5735 Loopback address range## if you enable this, you have to make sure remote_dns_subnet is not 127## you'll need to enable it if you want to use an application that
## connects to localhost.# localnet 127.0.0.0/255.0.0.0## RFC1918 Private Address Ranges# localnet 10.0.0.0/255.0.0.0# localnet 172.16.0.0/255.240.0.0# localnet 192.168.0.0/255.255.0.0# ProxyList format# type ip port [user pass]# (values separated by 'tab' or 'blank')## only numeric ipv4 addresses are valid### Examples:## socks5 192.168.67.78 1080 lamer secret# http 192.168.89.3 8080 justu hidden# socks4 192.168.1.49 1080# http 192.168.39.93 8080
#
## proxy types: http, socks4, socks5# ( auth types supported: "basic"-http "user/pass"-socks )#[ProxyList]# add proxy here ...# meanwile# defaults set to "tor"#socks4 127.0.0.1 9050
发布者:admin,转转请注明出处:http://www.yc00.com/web/1689813055a288274.html
评论列表(0条)