Get AI summaries of any video or article — Sign up free
learning hacking? DON'T make this mistake!! (hide yourself with Kali Linux and ProxyChains) thumbnail

learning hacking? DON'T make this mistake!! (hide yourself with Kali Linux and ProxyChains)

NetworkChuck·
5 min read

Based on NetworkChuck's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.

TL;DR

Unhidden recon can expose a public IP and trigger firewall blocks; scanning leaves traceable source information.

Briefing

Using Kali Linux without hiding can expose an attacker’s public IP and trigger blocking—so proxy chains are presented as a practical way to route scanning and browsing through multiple intermediate servers, making attribution harder. The core warning is blunt: recon scans (like Nmap) don’t just reveal information about a target; they also leave traces. Firewalls can flag the activity, and defenders can correlate requests back to the attacker’s IP—sometimes even recording a “from” address on each scan—meaning the target can report the source.

To reduce that risk in an ethical-hacking context (explicit permission only), the transcript frames a “middleman” approach. Instead of sending probes directly from the attacker to the target, traffic is sent through one proxy server, so the target sees the proxy’s IP rather than the attacker’s. But that’s not a free pass: if defenders contact law enforcement, proxy logs can identify who used the proxy. The mitigation is to chain multiple proxies—each hop becomes another layer of indirection—so defenders would need to unwind several logs across multiple systems. It’s described as not foolproof, but significantly more difficult to trace.

Implementation focuses on ProxyChains on Kali Linux. The process starts by locating and editing the configuration file (proxychains.conf), then choosing a chaining mode. “Dynamic” is emphasized: with a list of proxies, it can skip non-responsive entries and select from the set, while “random” is mentioned as another option that varies which proxy is used. The transcript also highlights proxy DNS handling: if DNS requests aren’t proxied, lookups can leak the attacker’s real IP. Enabling proxy DNS ensures even domain resolution is routed through the proxy chain.

The configuration requires listing proxies with type, IP/hostname, and port, and optionally credentials. Different proxy types are referenced, with SOCKS5 described as preferable to SOCKS4, and HTTPS/HTTP types noted as additional options. A default entry pointing to 127.0.0.1 is tied to Tor/onion routing, but Tor is skipped in the walkthrough.

To verify the setup, the transcript uses ProxyChains in front of normal commands—first launching Firefox to confirm outbound traffic is going through the configured proxy chain, then checking public IP location (“what’s my IP” and “where am I”). After that, Nmap scans are run through the chain (including a TCP connect scan against ports 80 and 443 on a target IP). The result is that each scan appears to originate from the chain’s exit points rather than the attacker’s machine.

Finally, a challenge tests the same skills in a constrained environment: three proxies must be used in a specific order to reach a web server that sits behind private IP ranges (172.31.172.32.29 mentioned). The student must scan the subnet with Nmap to find the host with port 80 open, then access the site through the proxy chain. A key hint is that hosts won’t respond to ping, so Nmap should avoid the initial host-discovery step (using options like -Pn) and rely on TCP connect scanning through ProxyChains. The winners are limited to the first five completions.

Cornell Notes

ProxyChains is used to route Kali Linux traffic through multiple proxies so scanning and browsing don’t originate from the attacker’s real public IP. The transcript warns that unhidden recon can be detected and blocked, and that defenders can trace scans back to the “from” address; even using a single proxy can fail if proxy logs are available. Chaining multiple proxies increases the difficulty of attribution by adding multiple log sources to unwind. Setup involves editing proxychains.conf, enabling proxy DNS to prevent DNS leaks, selecting a chaining mode (dynamic emphasized), and listing proxies with type/IP/port. Verification is done by checking public IP/location and running Nmap through ProxyChains; a final challenge requires using three proxies in order to reach a private web server and find an open port 80 host without relying on ping.

Why is “hiding” necessary when running tools like Nmap from Kali Linux?

Direct scanning can trigger defenses and leave attribution trails. Firewalls can flag recon activity and block it, and defenders can record the source IP for each scan request. The transcript emphasizes that defenders can report the public IP tied to the attack, which is why traffic origin matters even during reconnaissance.

How does a single proxy reduce attribution—and what limitation remains?

A single proxy acts as a middleman: the target sees the proxy server’s IP rather than the attacker’s. However, if defenders contact authorities, proxy logs can reveal who used the proxy. That means one layer of indirection helps, but it doesn’t eliminate traceability.

What is proxy chaining, and why does it make tracing harder?

Proxy chaining routes traffic through multiple proxies in sequence. If defenders trace the connection, they may only identify the first proxy, then face additional hops and additional logs. The transcript calls it non-foolproof, but “crazy difficult” because investigators would need to unwind several systems.

What configuration details matter most in proxychains.conf?

Key items include selecting a chaining mode (dynamic is highlighted), enabling proxy DNS so domain lookups don’t leak the real IP, and listing proxies using the required format: proxy type, server IP/hostname, and port (plus optional username/password for authenticated proxies). The transcript also notes that the default 127.0.0.1 entry is tied to Tor and is commented out in the walkthrough.

How can you tell whether ProxyChains is actually working?

The transcript suggests running a normal browser session through ProxyChains (e.g., proxychains firefox) and then checking the apparent public IP/location (“what’s my ip” and “where am i”). It also verifies by running Nmap through ProxyChains (e.g., a TCP connect scan against ports 80 and 443) and observing that the scan traffic follows the configured chain rather than originating directly.

What special Nmap consideration is given for the final challenge environment?

Hosts in the target group won’t respond to ping, and Nmap often uses ping-based host discovery before port scanning. The hint is to avoid that step by using -Pn (shown as -p lowercase n in the transcript context) and to use TCP connect scanning (e.g., -sT) through ProxyChains so the scan still finds the host with port 80 open.

Review Questions

  1. When would enabling proxy DNS be critical, and what leak does it prevent?
  2. In the challenge, why must Nmap avoid ping-based host discovery, and which option is suggested to do that?
  3. How does adding more proxies change the practical difficulty of attribution compared with using a single proxy?

Key Points

  1. 1

    Unhidden recon can expose a public IP and trigger firewall blocks; scanning leaves traceable source information.

  2. 2

    A single proxy hides the attacker’s IP from the target, but proxy logs can still identify the user.

  3. 3

    Proxy chaining routes traffic through multiple proxies, increasing the number of log sources needed to trace attribution.

  4. 4

    Editing proxychains.conf requires choosing a chaining mode (dynamic emphasized) and listing proxies with type, IP/port (and credentials if needed).

  5. 5

    Proxy DNS should be enabled so DNS lookups don’t leak the attacker’s real IP address.

  6. 6

    Verification can be done by running browser and Nmap commands through ProxyChains and checking the apparent public IP/location.

  7. 7

    The challenge requires using three proxies in a fixed order and scanning a private subnet for port 80 while avoiding ping-based host discovery (use -Pn).

Highlights

ProxyChains is positioned as an attribution-avoidance layer: the target sees proxy IPs instead of the attacker’s public IP.
Even with a proxy, logs can still expose the attacker—chaining multiple proxies is meant to multiply the tracing effort.
Proxy DNS is treated as a must-have setting to prevent DNS requests from leaking the real origin.
The final challenge hinges on Nmap behavior: since hosts won’t answer ping, scans must skip host discovery and go straight to TCP connect checks through the chain.

Topics

  • ProxyChains Setup
  • Nmap TCP Connect Scans
  • Proxy DNS Leak Prevention
  • Proxy Chaining
  • Ethical Hacking Permissions

Mentioned

  • Nmap
  • TCP
  • DNS
  • SOCKS
  • Tor
  • AWS