• XSS.stack #1 – первый литературный журнал от юзеров форума

proxychains не работает, есть идеи?

DarckSol

(L1) cache
Пользователь
Регистрация
17.03.2008
Сообщения
894
Реакции
182
proxychains4 firefox www.google.com
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... www.google.com:80 [proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
<--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... contile.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... content-signature-2.cdn.mozilla.net:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... push.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... firefox.settings.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... firefox.settings.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... www.google.com:80 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... contile.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... content-signature-2.cdn.mozilla.net:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... firefox.settings.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... firefox.settings.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... www.google.com:80 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... push.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... www.google.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... push.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... www.google.com:443 <--socket error or timeout!
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... push.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... safebrowsing.googleapis.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... push.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... push.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... contile.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... contile.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... push.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... push.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... safebrowsing.googleapis.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... push.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... push.services.mozilla.com:443 <--socket error or timeout!
[proxychains] Dynamic chain ... 127.0.0.1:9150 ... safebrowsing.googleapis.com:443 <--socket error or timeout!

/etc/tor/torrc
## Configuration file for a typical Tor user
## Last updated 9 October 2013 for Tor 0.2.5.2-alpha.
## (may or may not work for much older or much newer versions of Tor.)
##
## Lines that begin with "## " try to explain what's going on. Lines
## that begin with just "#" are disabled commands: you can enable them
## by removing the "#" symbol.
##
## See 'man tor', or https://www.torproject.org/docs/tor-manual.html,
## for more options you can use in this file.
##
## Tor will look for this file in various places based on your platform:
## https://www.torproject.org/docs/faq#torrc

## Tor opens a socks proxy on port 9050 by default -- even if you don't
## configure one below. Set "SocksPort 0" if you plan to run Tor only
## as a relay, and not make any local application connections yourself.
#SocksPort 9050 # Default: Bind to localhost:9050 for local connections.
#SocksPort 192.168.0.1:9100 # Bind to this address:port too.

## Entry policies to allow/deny SOCKS requests based on IP address.
## First entry that matches wins. If no SocksPolicy is set, we accept
## all (and only) requests that reach a SocksPort. Untrusted users who
## can access your SocksPort may be able to learn about the connections
## you make.
#SocksPolicy accept 192.168.0.0/16
#SocksPolicy reject *

## Logs go to stdout at level "notice" unless redirected by something
## else, like one of the below lines. You can have as many Log lines as
## you want.
##
## We advise using "notice" in most cases, since anything more verbose
## may provide sensitive information to an attacker who obtains the logs.
##
## Send all messages of level 'notice' or higher to /var/log/tor/notices.log
#Log notice file /var/log/tor/notices.log
## Send every possible message to /var/log/tor/debug.log
#Log debug file /var/log/tor/debug.log
## Use the system log instead of Tor's logfiles
#Log notice syslog
## To send all messages to stderr:
#Log debug stderr

## Uncomment this to start the process in the background... or use
## --runasdaemon 1 on the command line. This is ignored on Windows;
## see the FAQ entry if you want Tor to run as an NT service.
#RunAsDaemon 1

## The directory for keeping all the keys/etc. By default, we store
## things in $HOME/.tor on Unix, and in Application Data\tor on Windows.
#DataDirectory /var/lib/tor

## The port on which Tor will listen for local connections from Tor
## controller applications, as documented in control-spec.txt.
#ControlPort 9051
## If you enable the controlport, be sure to enable one of these
## authentication methods, to prevent attackers from accessing it.
#HashedControlPassword 16:872860B76453A77D60CA2BB8C1A7042072093276A3D701AD684053EC4C
#CookieAuthentication 1

############### This section is just for location-hidden services ###

## Once you have configured a hidden service, you can look at the
## contents of the file ".../hidden_service/hostname" for the address
## to tell people.
##
## HiddenServicePort x y:z says to redirect requests on port x to the
## address y:z.

#HiddenServiceDir /var/lib/tor/hidden_service/
#HiddenServicePort 80 127.0.0.1:80

#HiddenServiceDir /var/lib/tor/other_hidden_service/
#HiddenServicePort 80 127.0.0.1:80
#HiddenServicePort 22 127.0.0.1:22

################ This section is just for relays #####################
#
## See https://www.torproject.org/docs/tor-doc-relay for details.

## Required: what port to advertise for incoming Tor connections.
#ORPort 9001
## If you want to listen on a port other than the one advertised in
## ORPort (e.g. to advertise 443 but bind to 9090), you can do it as
## follows. You'll need to do ipchains or other port forwarding
## yourself to make this work.
#ORPort 443 NoListen
#ORPort 127.0.0.1:9090 NoAdvertise

## The IP address or full DNS name for incoming connections to your
## relay. Leave commented out and Tor will guess.
#Address noname.example.com

## If you have multiple network interfaces, you can specify one for
## outgoing traffic to use.
# OutboundBindAddress 10.0.0.5

## A handle for your relay, so people don't have to refer to it by key.
#Nickname ididnteditheconfig

## Define these to limit how much relayed traffic you will allow. Your
## own traffic is still unthrottled. Note that RelayBandwidthRate must
## be at least 20 KB.
## Note that units for these config options are bytes per second, not bits
## per second, and that prefixes are binary prefixes, i.e. 2^10, 2^20, etc.
#RelayBandwidthRate 100 KB # Throttle traffic to 100KB/s (800Kbps)
#RelayBandwidthBurst 200 KB # But allow bursts up to 200KB/s (1600Kbps)

## Use these to restrict the maximum traffic per day, week, or month.
## Note that this threshold applies separately to sent and received bytes,
## not to their sum: setting "4 GB" may allow up to 8 GB total before
## hibernating.
##
## Set a maximum of 4 gigabytes each way per period.
#AccountingMax 4 GB
## Each period starts daily at midnight (AccountingMax is per day)
#AccountingStart day 00:00
## Each period starts on the 3rd of the month at 15:00 (AccountingMax
## is per month)
#AccountingStart month 3 15:00

## Administrative contact information for this relay or bridge. This line
## can be used to contact you if your relay or bridge is misconfigured or
## something else goes wrong. Note that we archive and publish all
## descriptors containing these lines and that Google indexes them, so
## spammers might also collect them. You may want to obscure the fact that
## it's an email address and/or generate a new address for this purpose.
#ContactInfo Random Person <nobody AT example dot com>
## You might also include your PGP or GPG fingerprint if you have one:
#ContactInfo 0xFFFFFFFF Random Person <nobody AT example dot com>

## Uncomment this to mirror directory information for others. Please do
## if you have enough bandwidth.
#DirPort 9030 # what port to advertise for directory connections
## If you want to listen on a port other than the one advertised in
## DirPort (e.g. to advertise 80 but bind to 9091), you can do it as
## follows. below too. You'll need to do ipchains or other port
## forwarding yourself to make this work.
#DirPort 80 NoListen
#DirPort 127.0.0.1:9091 NoAdvertise
## Uncomment to return an arbitrary blob of html on your DirPort. Now you
## can explain what Tor is if anybody wonders why your IP address is
## contacting them. See contrib/tor-exit-notice.html in Tor's source
## distribution for a sample.
#DirPortFrontPage /etc/tor/tor-exit-notice.html

## Uncomment this if you run more than one Tor relay, and add the identity
## key fingerprint of each Tor relay you control, even if they're on
## different networks. You declare it here so Tor clients can avoid
## using more than one of your relays in a single circuit. See
## https://www.torproject.org/docs/faq#MultipleRelays
## However, you should never include a bridge's fingerprint here, as it would
## break its concealability and potentionally reveal its IP/TCP address.
#MyFamily $keyid,$keyid,...

## A comma-separated list of exit policies. They're considered first
## to last, and the first match wins. If you want to _replace_
## the default exit policy, end this with either a reject *:* or an
## accept *:*. Otherwise, you're _augmenting_ (prepending to) the
## default exit policy. Leave commented to just use the default, which is
## described in the man page or at
## https://www.torproject.org/documentation.html
##
## Look at https://www.torproject.org/faq-abuse.html#TypicalAbuses
## for issues you might encounter if you use the default exit policy.
##
## If certain IPs and ports are blocked externally, e.g. by your firewall,
## you should update your exit policy to reflect this -- otherwise Tor
## users will be told that those destinations are down.
##
## For security, by default Tor rejects connections to private (local)
## networks, including to your public IP address. See the man page entry
## for ExitPolicyRejectPrivate if you want to allow "exit enclaving".
##
#ExitPolicy accept *:6660-6667,reject *:* # allow irc ports but no more
#ExitPolicy accept *:119 # accept nntp as well as default exit policy
#ExitPolicy reject *:* # no exits allowed

## Bridge relays (or "bridges") are Tor relays that aren't listed in the
## main directory. Since there is no complete public list of them, even an
## ISP that filters connections to all the known Tor relays probably
## won't be able to block all the bridges. Also, websites won't treat you
## differently because they won't know you're running Tor. If you can
## be a real relay, please do; but if not, be a bridge!
#BridgeRelay 1
## By default, Tor will advertise your bridge to users through various
## mechanisms like https://bridges.torproject.org/. If you want to run
## a private bridge, for example because you'll give out your bridge
## address manually to your friends, uncomment this line:
#PublishServerDescriptor 0
SOCKSPort 9150 PreferSOCKSNoAuth

AutomapHostsOnResolve 1

DNSPort 53530

TransPort 9040

/etc/proxychains4.conf

# proxychains.conf VER 4.x
#
# HTTP, SOCKS4a, SOCKS5 tunneling proxifier with DNS.


# The option below identifies how the ProxyList is treated.
# only one option should be uncommented at time,
# otherwise the last appearing option will be accepted
#
dynamic_chain
#
# Dynamic - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# at least one proxy must be online to play in chain
# (dead proxies are skipped)
# otherwise EINTR is returned to the app
#
#strict_chain
#
# Strict - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# all proxies must be online to play in chain
# otherwise EINTR is returned to the app
#
#round_robin_chain
#
# Round Robin - Each connection will be done via chained proxies
# of chain_len length
# all proxies chained in the order as they appear in the list
# at least one proxy must be online to play in chain
# (dead proxies are skipped).
# the start of the current proxy chain is the proxy after the last
# proxy in the previously invoked proxy chain.
# if the end of the proxy chain is reached while looking for proxies
# start at the beginning again.
# otherwise EINTR is returned to the app
# These semantics are not guaranteed in a multithreaded environment.
#
#random_chain
#
# Random - Each connection will be done via random proxy
# (or proxy chain, see chain_len) from the list.
# this option is good to test your IDS :)

# Make sense only if random_chain or round_robin_chain
#chain_len = 2

# Quiet mode (no output from library)
#quiet_mode

## Proxy DNS requests - no leak for DNS data
# (disable all of the 3 items below to not proxy your DNS requests)

# method 1. this uses the proxychains4 style method to do remote dns:
# a thread is spawned that serves DNS requests and hands down an ip
# assigned from an internal list (via remote_dns_subnet).
# this is the easiest (setup-wise) and fastest method, however on
# systems with buggy libcs and very complex software like webbrowsers
# this might not work and/or cause crashes.
proxy_dns

# method 2. use the old proxyresolv script to proxy DNS requests
# in proxychains 3.1 style. requires `proxyresolv` in $PATH
# plus a dynamically linked `dig` binary.
# this is a lot slower than `proxy_dns`, doesn't support .onion URLs,
# but might be more compatible with complex software like webbrowsers.
#proxy_dns_old

# method 3. use proxychains4-daemon process to serve remote DNS requests.
# this is similar to the threaded `proxy_dns` method, however it requires
# that proxychains4-daemon is already running on the specified address.
# on the plus side it doesn't do malloc/threads so it should be quite
# compatible with complex, async-unsafe software.
# note that if you don't start proxychains4-daemon before using this,
# the process will simply hang.
#proxy_dns_daemon 127.0.0.1:1053

# set the class A subnet number to use for the internal remote DNS mapping
# we use the reserved 224.x.x.x range by default,
# if the proxified app does a DNS request, we will return an IP from that range.
# on further accesses to this ip we will send the saved DNS name to the proxy.
# in case some control-freak app checks the returned ip, and denies to
# connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x.
# of course you should make sure that the proxified app does not need
# *real* access to this subnet.
# i.e. dont use the same subnet then in the localnet section
#remote_dns_subnet 127
#remote_dns_subnet 10
#remote_dns_subnet 224

# Some timeouts in milliseconds
#tcp_read_time_out 15000
#tcp_connect_time_out 8000

### Examples for localnet exclusion
## localnet ranges will *not* use a proxy to connect.
## note that localnet works only when plain IP addresses are passed to the app,
## the hostname resolves via /etc/hosts, or proxy_dns is disabled or proxy_dns_old used.

## Exclude connections to 192.168.1.0/24 with port 80
# localnet 192.168.1.0:80/255.255.255.0

## Exclude connections to 192.168.100.0/24
# localnet 192.168.100.0/255.255.255.0

## Exclude connections to ANYwhere with port 80
# localnet 0.0.0.0:80/0.0.0.0
# localnet [::]:80/0

## RFC6890 Loopback address range
## if you enable this, you have to make sure remote_dns_subnet is not 127
## you'll need to enable it if you want to use an application that
## connects to localhost.
# localnet 127.0.0.0/255.0.0.0
# localnet ::1/128

## RFC1918 Private Address Ranges
# localnet 10.0.0.0/255.0.0.0
# localnet 172.16.0.0/255.240.0.0
# localnet 192.168.0.0/255.255.0.0

### Examples for dnat
## Trying to proxy connections to destinations which are dnatted,
## will result in proxying connections to the new given destinations.
## Whenever I connect to 1.1.1.1 on port 1234 actually connect to 1.1.1.2 on port 443
# dnat 1.1.1.1:1234 1.1.1.2:443

## Whenever I connect to 1.1.1.1 on port 443 actually connect to 1.1.1.2 on port 443
## (no need to write :443 again)
# dnat 1.1.1.2:443 1.1.1.2

## No matter what port I connect to on 1.1.1.1 port actually connect to 1.1.1.2 on port 443
# dnat 1.1.1.1 1.1.1.2:443

## Always, instead of connecting to 1.1.1.1, connect to 1.1.1.2
# dnat 1.1.1.1 1.1.1.2

# ProxyList format
# type ip port [user pass]
# (values separated by 'tab' or 'blank')
#
# only numeric ipv4 addresses are valid
#
#
# Examples:
#
# socks5 192.168.67.78 1080 lamer secret
# http 192.168.89.3 8080 justu hidden
# socks4 192.168.1.49 1080
# http 192.168.39.93 8080
#
#
# proxy types: http, socks4, socks5, raw
# * raw: The traffic is simply forwarded to the proxy without modification.
# ( auth types supported: "basic"-http "user/pass"-socks )
#
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks4 127.0.0.1 9150
socks5 127.0.0.1 9150
 
/etc/tor/torrc


/etc/proxychains4.conf
Если работает curl а ff не работает то замени proxychain на Proxybound или добавь прокси в настройках ff
Если curl не работает, удали строку socks4 127.0.0.1 9150 из файла proxychains4.conf
 
Может, проблема на поверхности и тебе просто провайдер блокирует доступ в ТОР?
О таком тоже думал, но у меня лампа работает на андроеде через TorProxy(ToS)
 
Последнее редактирование:
nmap 127.0.0.1 -p9050
Starting Nmap 7.80 ( https://nmap.org ) at 2023-12-14 10:20 MSK
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000087s latency).

PORT STATE SERVICE
9050/tcp open tor-socks

proxychains4 curl ipinfo.io/ip
[proxychains] config file found: /etc/proxychains.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.14
[proxychains] Dynamic chain ... 127.0.0.1:9050 ... ipinfo.io:80 <--socket error or timeout!
curl: (7) Couldn't connect to server

Тор не принимает / не пропускает запросы за себя..(

Запустил ручками ТОР:
Dec 14 10:22:04.608 [notice] Tor 0.4.2.7 running on Linux with Libevent 2.1.11-stable, OpenSSL 1.1.1f, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.4.4.
Dec 14 10:22:04.608 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Dec 14 10:22:04.608 [notice] Read configuration file "/etc/tor/torrc".
Dec 14 10:22:04.609 [notice] Opening Socks listener on 127.0.0.1:9050
Dec 14 10:22:04.609 [notice] Opened Socks listener on 127.0.0.1:9050
Dec 14 10:22:04.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Dec 14 10:22:04.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Dec 14 10:22:04.000 [notice] Bootstrapped 0% (starting): Starting
Dec 14 10:22:04.000 [notice] Starting with guard context "default"
Dec 14 10:22:05.000 [notice] Bootstrapped 5% (conn): Connecting to a relay

Но без результата...((
proxychains4 curl http://ipinfo.io/ip
[proxychains] config file found: /etc/proxychains.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.14
[proxychains] Dynamic chain ... 127.0.0.1:9050 ... ipinfo.io:80 <--socket error or timeout!
curl: (7) Couldn't connect to server
 
proxychains пропускает некоторый трафик, не рекомендую им пользоваться.
подробнее здесь: https://xss.pro/threads/96698/

а конкретно по твоему вопросу - скорее всего просто тор тормозит.


Если работает curl а ff не работает то замени proxychain на Proxybound или добавь прокси в настройках ff
не знал про такой софт, спасибо.
  • No leaks over udp/icmp/etc... (INET & INET6)
- возможно, в нём исправлены некоторые проблемы proxychains.

однако...
How it works:
Proxybound hook libc functions like connect(), dynamic loader facilities are used, namely dl_sym() and LD_PRELOAD thus dynamically linked programs are required.
хукать сетевые функции - фигня, точно так же трафик будет протекать.
 
proxychains пропускает некоторый трафик, не рекомендую им пользоваться.
подробнее здесь: https://xss.pro/threads/96698/

а конкретно по твоему вопросу - скорее всего просто тор тормозит.



не знал про такой софт, спасибо.

- возможно, в нём исправлены некоторые проблемы proxychains.

однако...

хукать сетевые функции - фигня, точно так же трафик будет протекать.
Чтобы не протекало, на хосте перед собой держат тор (openwrt vm), выкинув в lan просто порт 9050 и ничего не протекат.
(При условии что вы не торифицируете lan интерфейс)
 
Спасибо, альтернатива рабочая есть?
проксировать трафик через впн, или подключаться к сети через виртуальную машину.
 
Чтобы не протекало, на хосте перед собой держат тор (openwrt vm), выкинув в lan просто порт 9050 и ничего не протекат.
(При условии что вы не торифицируете lan интерфейс)
Витруалку запили, образ развернул, а как там тор запустить и пробросить порт?
Порт открыл, висит как Open, nmap видит, но конекта нет(
Может Мануал есть?
 
Последнее редактирование:
Есть еще такая штука https://github.com/hmgle/graftcp, в отличие от proxychains позволяет работать статически слинкованным программал, например на GO
 
Витруалку запили, образ развернул, а как там тор запустить и пробросить порт?
Порт открыл, висит как Open, nmap видит, но конекта нет(
Может Мануал есть?
Выключи интернет в сегменте lan, подключись по ssh, настрой torrc (SocksPort 192.168.0.1:9050 и обрати внимание на SocksPolicy)
Выключи вебсервер и dhcp и всё настрой ручками, потом сделай снапшот и откатывайся если что.
А чтобы чесна чесна не протекло, возьми и установи туда агент opensnitch (мониторить сможешь из другой виртуалки) и прочие агенты по вкусу и tor через jail запускай.
Лучше конечно не снапшоты, а собирать образ свой преднастроенный и обязательно чтобы система была в squash, тогда в любой не понятной ситуации просто ребутишь и дальше работаешь.
 
Последнее редактирование:
Выключи интернет в сегменте lan, подключись по ssh, настрой torrc (SocksPort 192.168.0.1:9050 и обрати внимание на SocksPolicy)
Выключи вебсервер и dhcp и всё настрой ручками, потом сделай снапшот и откатывайся если что.
А чтобы чесна чесна не протекло, возьми и установи туда агент opensnitch (мониторить сможешь из другой виртуалки) и прочие агенты по вкусу и tor через jail запускай.
Лучше конечно не снапшоты, а собирать образ свой преднастроенный и обязательно чтобы система была в squash, тогда в любой не понятной ситуации просто ребутишь и дальше работаешь.

Не получилось заставить Тor пропускать через себя что то... конект не проходит,....
Результат не достигнут(((
 
Не получилось заставить Тor пропускать через себя что то... конект не проходит,....
Результат не достигнут(((

Поставь whonix (gateway + workstation) в виртуалках, и смотри как там сделано.

Разумеется можно и что-то свое поставить, в качестве воркстейшена,

тут старый пример (правда кое что устарело, в нынешнем whonix чуть иначе)

Но не забывай про доки , гдето тут https://www.whonix.org/wiki/Multiple_Whonix-Workstation например,
там как минимум надо подстроить DHCP (на уровне узла виртуализации) чтоб ипы выдавало корректно.

PS: и конечно же читать https://xss.pro/threads/102566/
 
Последнее редактирование:
Есть еще такая штука https://github.com/hmgle/graftcp, в отличие от proxychains позволяет работать статически слинкованным программал, например на GO

graftcp can trace or modify any given program's connect by ptrace(2), so it is workable for any program.
о, вот это уже лучше, чем LD_PRELOAD.
но, имхо, всё равно какие-то сетевые функции могут не перехватиться. лучше всего запускать недоверенный софт в виртуалке, подключенной к впн.
 
Немного не в тему, как использовать несколько разных прокси проксичейна одновременно, не последовательно а одновременно, типа мультипотока
 
Пожалуйста, обратите внимание, что пользователь заблокирован


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх