

# Proxy DNS requests – no leak for DNS data #proxy\_dns Its the way around it\]. When this is off it goes through your dns and when its on it goes through the proxy dns. It's just that I need to thoroughly understand what I am doing here since the proxychains website does not clarify some things. Does the DNS resolution route through Tor as well? Sorry for the noob questions. I would like to be able to control which DNS servers I use, since you never know which DNS servers are in league with which large spy agencies. The only thing which concerned me was the Tor issue, and the issue with DNS. strict\_chain # Proxy DNS requests - no leak for DNS data #proxy\_dns tor->socks5->interweb - It goes in order from top to bottom so if you put # defaults set to "tor" socks5 \ \ socks4 127.0.0.1 9050 That would result in: YourBox->socks5->tor->interweb. # The option below identifies how the ProxyList is treated. Put the settings like this in nf and change your dns in the Network Manager. Or is Proxychains automatically configured to go through Tor first regardless of where in the Proxy List you leave the lookback IP and port 9050 setting? Also, how do I change the proxyresolv configuration so that I can choose my own DNS rather than the hardcoded level 3 Communications DNS server? How do we configure the nf file to first go through Tor, then one of the socks proxies. Here is a video if you don't like reading: ()

TOR SOCKS5 PROXY LIST MANUAL
exact order (as they appear in the list ) dynamic order (smart exclude dead proxies from chain) \* You can use it with any application, even network scanners oh yes - you can make portscan via proxy (or chained proxies) for example with Nmap scanner (proxychains nmap -sT -PO -p 80 -iR (find some webservers through proxy) Source: ()' man proxychains ' in the terminal for the manual will tell you all you need to know. Some cool features: \* Different chaining options supported random order from the list ( user defined length of chain ). Use external DNS from behind any proxy/firewall. Indeed you can even access your home LAN from outside via reverse proxy if you set it. And you want to do that with some app like telnet. Or to get out from behind restrictive firewall that filters some ports in outgoing traffic. Here is some info to get you started: When you want two (or more) different proxies in chain: like: your\_host proxy 1 (TOR) proxy 2 (HTTP or SOCKS4/5) target\_host You may need it when the only way out from your LAN is through proxy server. conf its the best way because tor blocks the end points for scanning. I use strict chain and add my socks proxies after tor in the. If you add proxies it will chain them through tor and then through the ones you've added. My question is, when you configure Prox圜hains with some socks4/5 proxies, does it still route proxychains through Tor AND the socks proxies, or does it stop using Tor and only use the socks proxies? If it stops using Tor, isn't that a security risk if the socks proxy is run by a bad-actor? How do I verify that both Tor and the socks proxy are being used together (like reading the output in the terminal)?

I am currently studying and writing notes on Prox圜hains. I'm new to Pentesting and only started studying recently.
