default tor conf in proxychain is in socks4 can i change it to socks5 ?
this is recomended to do ?
Forum Thread: Proxychain with Tor
- Hot
- Active
-
Forum Thread: How to Hack Online Android Games !!? 18 Replies
6 hrs ago -
Forum Thread: Hack Instagram Account Using BruteForce 196 Replies
6 hrs ago -
Forum Thread: How to Hack a Website to Edit It 19 Replies
4 days ago -
Forum Thread: Android Doesn't Connect Back to Metasploit with App Payload? 18 Replies
5 days ago -
Forum Thread: Hacking Facebook,Twitter,Instagram Account Passwords with BruteForce 156 Replies
5 days ago -
Forum Thread: Kali Linux WiFi Problem? 41 Replies
1 wk ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 173 Replies
1 wk ago -
Forum Thread: How to Start Listening Connections on Metaslpoit (WINDOWS) 8 Replies
1 wk ago -
Forum Thread: Grab Target's Webcam by Link 4 Replies
1 wk ago -
How to: HACK Android Device with TermuX on Android | Part #2 - Over WLAN Hotspot [Ultimate Guide] 24 Replies
1 wk ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 41 Replies
1 wk ago -
Forum Thread: No Wireless Extensions in Linux Debian 3 Replies
2 wks ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 6 Replies
2 wks ago -
Forum Thread: Bruteforce Password Cracker (ghoster_brute) 6 Replies
2 wks ago -
Forum Thread: Txpower Adjustment? 17 Replies
2 wks ago -
Forum Thread: How to Controll Multiple Devices Using a Meterpreter ? 4 Replies
3 wks ago -
Forum Thread: Delete Infected Apk from Victim Phone Remotely 1 Replies
3 wks ago -
How to: Install Metasploit Framework on Android | Part #1 - in TermuX 81 Replies
3 wks ago -
Forum Thread: The Most Anonymous Reconnaissance Technique? 1 Replies
3 wks ago -
Forum Thread: Tp-Link wn8200nd 2 Replies
3 wks ago
-
How To: Null Byte's Hacker Guide to Buying an ESP32 Camera Module That's Right for Your Project
-
How To: Perform Keystroke Injection Attacks Over Wi-Fi with Your Smartphone
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Phish for Social Media & Other Account Passwords with BlackEye
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
Hack Like a Pro: How to Crack Passwords, Part 4 (Creating a Custom Wordlist with Crunch)
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2019
-
How To: Get an Internet Connection in the Middle of Nowhere to Hack Remotely
-
How To: Hack Android Using Kali (Remotely)
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
Hack Like a Pro: How to Get Facebook Credentials Without Hacking Facebook
-
How To: Hunt Down Social Media Accounts by Usernames with Sherlock
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Easily Detect CVEs with Nmap Scripts
-
How To: Load Kali Linux on the Raspberry Pi 4 for the Ultimate Miniature Hacking Station
3 Responses
Found it with a simple search :/
https://null-byte.wonderhowto.com/how-to/hack-like-pro-evade-detection-using-proxychains-0154619/
this is not what i asked.. i need to know which protacol to use socks5 or socks4 for greater Anonymity
I think generally speaking socks5 is more "anonymous" than socks4. This is my understanding, I am very new to kali though. I try to find socks5 proxies when I am looking.
Share Your Thoughts