Hello All,
First i want to thank all of you for the information that is posted on here, i have learned so much and you guys are great. I have went over OTW article on proxychains a couple of times, and i still just cant seem to get them to work. I was hoping for some advise. Basically everytime proxychain trys to setup a chain it times out, it doesnt matter if the conf file is set for random,strict or dynamic. I have about 15 different ip addresses with port numbers in the conf file, is that enough? Is it timing out because the ip's are bad if so where is a good place to find usable anonymous socks proxies? for the record i have been pulling them off of here http://www.socks-proxy.net/ Thanks for any help and i apologize if i have not provided enough info.
15 Responses
Phoenix750 the admin of the hidemyass.com site says the they are using honeypot in high anon proxy's here's the prove
https://forum.hidemyass.com/index.php/topic/1782-what-means-anonymity-level-highka/
Honestly i don't think its good idea to use them.
-LiGHTNinG
So Phoenix you do in fact think that it is the proxies i am trying to use that is the problem?
so Phoenix750 is there any way to detect honeypot in proxy's
-LiGHTNinG
If proxy is PASSIVE, there is no way to detect, as it will simply log your traffic and watch what you're doing.
If it's ACTIVE, you can spot it by setting up a static webpage you control. Every X time, you should retrieve the page both under a proxed and non-proxed connection. If the two pages don't match, you can then extract the difference and see if any malicious script is injected in the page.
This is more 'spotting malicious proxy' but honeypots are not always used by the good guys..
using tor is a bad idea to because its has been compromise
-LiGHTNinG
I have to dissent on this. Tor is still good ! It just depends on HOW you use it.
Most tor attacks come from a user's mistake, not the protocol's fault. Statistical analisys can deanonimize traffic under certain conditions, but it requires a lot of work and machines in the network. The more people is scared off tor, the more this scenario is likely. But still, they won't go after you if you don't give them a reason.
just so we are clear the reason why proxychains is timing out is bad proxy servers?
Try first with a couple proxies with low ping
on a separate note isnt Tor's flaw who controls the end node in the chain? If so couldnt you tell it to use an end node from a country that you know wouldnt corroborate with the us?
That won't work. What prevents them to buy a server in every single country and install an exit node there ? Or compromise an existing one ? This way you don't have to ask for the information, you already own it.
I wouldn't use HMA if my life depended on it.
Tor on a single layer in any shape or form is a no go..
I wasnt making a statement, i was asking a question.
Proxychains is timing out from bad/slow/dead proxies. Try all the same socks first like 4/5. Try with 2 or 3 then try and link a bunch but they live and die fast(proxies)
OTW wrote a fantastic tutorial on the exact subject you are looking to cover. You can find that here.
Some of the services that he lists on that tutorial are:
Hide My Ass
SamAir Security
Proxy4Free
Hide.me
Thanks everyone and thank you Camero i have read that article and forgot all about it. My primary goal when posting this was to make sure i was using proxychains right, which seems to be the case.
Share Your Thoughts