SSH Tunnel & proxychains - Random IP's

THC-F0r4all

New Member
Hallo,
Ich wollte in Proxychains einträge erstellen, damit immer eine zufällige IP genommen wird.
Aber irgendwie kann das Programm immer nur mit der ersten IP in der Liste arbeiten.

Kann mir eventuell jemand erklären woran das liegen könnte?

Fehler:
|R-chain|-<>-127.0.0.1:5353-<--timeout
|R-chain|-<>-127.0.0.1:5151-<--timeout
|R-chain|-<>-127.0.0.1:5454-<--timeout
|R-chain|-<>-127.0.0.1:5282-<><>-XXX.XXX.XXX.XXX:53-<><>-OK

wthide.jpg


# proxychains.conf VER 3.1
#
# HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS.
#
# The option below identifies how the ProxyList is treated.
# only one option should be uncommented at time,
# otherwise the last appearing option will be accepted
#
#dynamic_chain
#
# Dynamic - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# at least one proxy must be online to play in chain
# (dead proxies are skipped)
# otherwise EINTR is returned to the app
#
#strict_chain
#
# Strict - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# all proxies must be online to play in chain
# otherwise EINTR is returned to the app
#
random_chain
#
# Random - Each connection will be done via random proxy
# (or proxy chain, see chain_len) from the list.
# this option is good to test your IDS :)

# Make sense only if random_chain
#chain_len = 2

# Quiet mode (no output from library)
#quiet_mode

# Proxy DNS requests - no leak for DNS data
proxy_dns

# Some timeouts in milliseconds
tcp_read_time_out 15000
tcp_connect_time_out 8000

# ProxyList format
# type host port [user pass]
# (values separated by 'tab' or 'blank')
#
#
# Examples:
#
# socks5 192.168.67.78 1080 lamer secret
# http 192.168.89.3 8080 justu hidden
# socks4 192.168.1.49 1080
# http 192.168.39.93 8080
#
#
# proxy types: http, socks4, socks5
# ( auth types supported: "basic"-http "user/pass"-socks )
#
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks5 127.0.0.1 5282
socks5 127.0.0.1 5353
socks5 127.0.0.1 5151
socks5 127.0.0.1 5454
 
kenne den client nicht. sicher das die tunnel auch funktionieren? hast du es getestet? kompiliere proxychains am besten. die version aus den repos ist veraltet meistens.
 
Back
Top