You are on page 1of 9

PROXYCHAINS

BY
E20CSE079 RONLO
E20CSE164 SARTHAK SHARMA
What is a Proxy
System in which request sent by the host
device first goes though a proxy where
the original ip is hidden and replaced by
a proxy ip before reaching the Targeted
server. The proxy hides the ip
information of the original device
A proxychain
- Proxychain is a device that forces
every TCP Transmission Control
Protocol communication from your
system to go through
different/multiple proxies where in
every proxy the up address is replced
with another hiding the ip of the
original host device

Types of proxies
Hyper Text contol protocol:
Used for web browsing.
There are three levels of HTPP proxy:
-Highly anonymous(very high secure)
-anonymous proxy(secure)
-transperent proxy(useless)
Types of proxies
Socks(Socket secure):
Types of socks are
-SOCKS4
-SOCKS 5
(supports User digram protocol and
authentication)
Proxychaining method
Random chain- proxy connection made will be done in
Random combination of proxies in proxy list

Strict chain- All proxies in list will be used in an chained


order.

Dynamic chain- Same as Dynamic but skips dead proxies.

We recommend the used of Dynamic chain


Pivoting with Proxychain
Pivoting is a technique used by
attackers to attack protected machines
by proxying attacking original ip with an
ip of a machine which can access the
targeted intranet
Proxychain vs VPN
-Proxychains are faster than VPN's
-VPN are usually paid and there have been cases
where resale of internet habits to third parties have
occured with it.
-Proxychains will be an ideal substitute as VPN and VPN
services are being banned in several countries around
the Globe.
-Proxychain can also provide complete anominity
which VPN usually fails to provide
THANK YOU

You might also like