You are on page 1of 8

STAYING ANONYMOUS

(PROXYCHAINS AND MACCHANGER)

I. PROXYCHAINS
Proxychains tool that forces any TCP connection made by any given application. to follow
through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types:
“user/pass” for SOCKS4/5, “basic” for HTTP.

If already installed, run this code when opening the Firefox:


$ proxychains firefox duckduckgo.com

NOTE: Check first, if the TOR service is Active, perform Step 8..

Setting-up Proxychains in Kali Linux Steps:


1. Check first your private and public Internet Protocol (IP) Address.
Private IP: $ ifconfig #(wlan0 for wireless and eth0 if wired connection)
Public IP: Open Firefox and simply search “What is my IP?”

2. Test also your DNS leak


Go to “dnsleaktest.com”

3. Go to the proxychains configuration path:


$ vi /etc/proxychains.conf
4. Uncomment “dynamic_chain” then comment the “strict_chain”

5. Uncomment also the “proxy_dns”

NOTE: Proxychains does change your IP but the Domain Name Service (DNS) will still set into
your original country, and that makes you discoverable. That is why we need to make sure that
this Proxy DNS requests line was enabled.
6. Go to the last line and add “socks5[tab]127.0.0.1 9050”

7. Check if the TOR is installed in Kali Linux


$ service tor status

If not, install it using this command:


$ apt-get install tor

8. Check if the TOR Service is active


$ service tor status

If not, start it using this command:


$ service tor start

Then check again the status:


9. Once done, try to connect to Firefox
$ proxychain firefox duckduckgo.com

NOTE: Exit first the Firefox, if opened then run the code.

10. Now then, check again the Public IP address and DNS using the procedure in Steps 1. and Step 2.

NOTE: The IP Address and DNS bonce at the same time as per configuration done lately.

ADDITIONAL: You may also use proxychains to run applications if you want to be anonymous:
$ proxychain nmap 192.168.10.10
II. MACCHANGER
Media Access Control (MAC) Addresses are unique 48-bits hardware number of a computer,
which is embedded into network card (known as Network Interface Card) during the time of
manufacturing. MAC Address is also known as Physical Address of a network device.

This is used to Data Link Layer to determine which specific user of the IP is requesting the data.

MAC Address compose of two columns:


Organizational Unique
Universal Administered Address
Identifier
(UAA)
(OUI)
00 3E 1A F1 4C 6E
 OUI – represents the vendor of the NIC
 UAA – represents the unique address of the NIC

ARP Table
Address Resolution Protocol (ARP) look-up table where they store information about what IP
addresses are associated with what MAC addresses. When trying to send a packet to an IP address,
the system will first consult this table to see if it already knows the MAC address.

To see the ARP in your system (Terminal or Command Prompt):


$ arp -a

Spoof MAC Address using MACChanger in Kali Linux Steps:


1. To See my MAC Address:
$ ifconfig

$ mcchanger -s wlan0

2. To show the MAC Vendor Addresses


$ macchanger -l


3. To give the system a random MAC Address
$ macchanger -r wlan0

If wireless, down first the wlan0 connection (Check if really down):


$ ifconfig wlan0 down

Run the Macchanger command, Then up after:


$ ifconfig wlan0 up

Then, restart the Network Manager and see again the MAC Address:
$ service network-manager restart

4. Schedule the code into crontab every reboot


$ crontab -e
@reboot sleep 600 && <path of the script>/<name of the script>.sh > /dev/null 2>&1

Open to see the code:


ADDITIONAL:
To reset it to permanent MAC Address:
$ macchanger -p wlan0

To manually change the MAC Address:


$ machanger –mac=XX:XX:XX:XX:XX:XX #where XX:XX:XX:XX:XX:XX is the MAC you want

NOTE: You may use it if you want to use the IP address of others to gain access in a private network

You might also like