How do you make every connection in Kali go over a proxy or even better a proxy chain?
Forum Thread: Proxy
- Hot
- Active
-
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 32 Replies
19 hrs ago -
Forum Thread: 12 Ways How to Hack Any Social Network and Protect Yourself 2018 1 Replies
1 day ago -
Metasploit Error: Handler Failed to Bind 40 Replies
4 days ago -
Forum Thread: How to Know if You Are a Script Kiddie? 9 Replies
2 wks ago -
Forum Thread: How to Identify and Crack Hashes 8 Replies
2 wks ago -
Forum Thread: How to Hack School Website 8 Replies
3 wks ago -
Forum Thread: Whenever I Try "Airmon-Ng Start wlan0" There's an Error? 16 Replies
3 wks ago -
Forum Thread: How to Fix 'Failed to Detect and Mount CD-ROM' Problem When Installing Kali Linux 14 Replies
3 wks ago -
Forum Thread: Awesome Keylogging Script - BeeLogger 30 Replies
1 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 27 Replies
1 mo ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 48 Replies
1 mo ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 121 Replies
1 mo ago -
How to: Minecraft DoS'Ing with Python. 1 Replies
2 mo ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 17 Replies
2 mo ago -
Forum Thread: Tools for Beginner Hacker 3 Replies
2 mo ago -
Forum Thread: How to Embed an Android Payload in an Image? 9 Replies
3 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 46 Replies
3 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 11 Replies
3 mo ago -
Forum Thread: Fix Initramfs Problem 5 Replies
3 mo ago -
Forum Thread: Kali Wont Start, Stuck at Kali Login: 21 Replies
4 mo ago
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Manually Exploit EternalBlue on Windows Server Using MS17-010 Python Exploit
-
How To: Dox Anyone
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Create Custom Wordlists for Password Cracking Using the Mentalist
-
How To: Enumerate SMB with Enum4linux & Smbclient
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Bypass File Upload Restrictions on Web Apps to Get a Shell
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Automate Wi-Fi Hacking with Wifite2
-
How To: Hunt Down Social Media Accounts by Usernames with Sherlock
-
How To: Phish for Social Media & Other Account Passwords with BlackEye
-
How To: 4 Ways to Crack a Facebook Password & How to Protect Yourself from Them
-
How To: Hack 5 GHz Wi-Fi Networks with an Alfa Wi-Fi Adapter
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
1 Response
I've set it under network in the system box. Using tor as socks and i2p as http proxy's, I also changed some stuff in IPTABLES to drop connections not using a proxy.
However i never really feel confident enough that its forcing tools through tor, so if you setup and use proxychains, just append proxychains to the start of every command (then write a bash script to do it for you once you have it working properly everytime) Make sure you are only using a exit node or its slow as shit.
Thats how I've forced my tools to run via proxy every time any way, if anyone knows a better way they have 100% confidence isn't broadcasting their IP to the world I'd love to know.
Share Your Thoughts