What is proxychains? How to configure it …

What is proxychains ❓

In computer networking, A proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.

Where’s proxy chains are series of intermediate between a client and the resource.

In simple the proxychains gives anonymity while attacking the target machine.

Video ????

Difference between proxy vs proxychains ????


Proxy are usually found on the browser. And anonymize HTTP protocols and web connection and the things you are doing on the internet.


Proxy-chains is a tool that anonymize whatever you are doing on the computer, We could add multiple IP address as bridge to get the resources.

How to configure proxy-chains ????

To configure proxychains enter this command nano /etc/proxychains4.conf

proxychains formats are in HTTP, SOCKS4a, SOCKS5. HTTP format are very old and hope you are very familiar with it.

Also we use the HTTP format to access the TOR browser etc.,

SOCKS4a is pretty old but it is good at anonymising and I recommend you to use the SOCKS5 which anonymise pretty much everything on your system.

You can uncheck the # tags to configure


Types of proxy

Currently there are four types of proxychains they are ????

  1. Dynamic chain
  2. Strict chain
  3. Round robin chain
  4. Random chain

Dynamic chain

The Dynamic chain has series of IP address and the connection goes through it, In dynamic proxy at least one proxy must be online to play in the chain.

Strict chain

All the IP address will be in a list, Each connection will be going through the order of IP address.

Round robin chain

The round robin chain has also series of IP address and at least one proxy must be online to play in the chain. If there are any dead proxy they are skipped.

If the request doesn’t work then the connection starts from the beginning.

Random chain

Using random proxy to connect to the network and gather the information requested.

How to use proxychains with tools

You can use proxy-chains with almost all scanning tools, To use this tool just add proxy-chains in front of the command.

proxychains Nmap


According to me proxychains is one of the best tool for obfuscation, But remember using public IP’s in proxychains is like you are getting caught. So, try to use a well known paid service.

Also Read: Gobuster full tutorial from noob to pro

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions or brave browser to block ads. Please support us by disabling these ads blocker.Our website is made possible by displaying Ads hope you whitelist our site. We use very minimal Ads in our site


Scroll to Top