Professional Documents
Culture Documents
I. PROXYCHAINS
Proxychains tool that forces any TCP connection made by any given application. to follow
through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types:
“user/pass” for SOCKS4/5, “basic” for HTTP.
NOTE: Check first, if the TOR service is Active, perform Step 8..
NOTE: Proxychains does change your IP but the Domain Name Service (DNS) will still set into
your original country, and that makes you discoverable. That is why we need to make sure that
this Proxy DNS requests line was enabled.
6. Go to the last line and add “socks5[tab]127.0.0.1 9050”
NOTE: Exit first the Firefox, if opened then run the code.
10. Now then, check again the Public IP address and DNS using the procedure in Steps 1. and Step 2.
NOTE: The IP Address and DNS bonce at the same time as per configuration done lately.
ADDITIONAL: You may also use proxychains to run applications if you want to be anonymous:
$ proxychain nmap 192.168.10.10
II. MACCHANGER
Media Access Control (MAC) Addresses are unique 48-bits hardware number of a computer,
which is embedded into network card (known as Network Interface Card) during the time of
manufacturing. MAC Address is also known as Physical Address of a network device.
This is used to Data Link Layer to determine which specific user of the IP is requesting the data.
ARP Table
Address Resolution Protocol (ARP) look-up table where they store information about what IP
addresses are associated with what MAC addresses. When trying to send a packet to an IP address,
the system will first consult this table to see if it already knows the MAC address.
$ mcchanger -s wlan0
’
3. To give the system a random MAC Address
$ macchanger -r wlan0
Then, restart the Network Manager and see again the MAC Address:
$ service network-manager restart
NOTE: You may use it if you want to use the IP address of others to gain access in a private network