Exploit-DB updates

Monday, June 13, 2011

Anonymous nmap scans

This is an extremely simple tutorial on how you can use "proxychains" to anonymize your nmap scans, or to trip the IDS/Firewalls with multiple IPs to mask which one you really are. First, proceed to the following link to download the proxychains package.

http://prdownloads.sourceforge.net/proxychains/proxychains-3.1.tar.gz?download

Now we need to extract it's contents with the "tar" command so that we can configure it and compile it.

~ $ tar -xvzf proxychains-3.1.tar.gz

That will extract it to your root directory, now we will "cd" into that directory and configure it, then compile it.

cd ./proxychains-3.1
./configure
make install

Now you'll have proxychains configured for you system and have compiled a binary. Before you can use it you must configure it, unless you're using tor, which is it's default setting - socks5 127.0.0.1 9050.

nano proxychains.conf

At this point you will want to scroll down to the bottom of the file, which is where you will configure which proxies and what type they are. You can find proxies at one of the following links at the bottom of this site.

For example the default should look like this;
#        Examples:
#
#               socks5  192.168.67.78   1080    lamer   secret
#               http    192.168.89.3    8080    justu   hidden
#               socks4  192.168.1.49    1080
#               http    192.168.39.93   8080
#
#
#       proxy types: http, socks4, socks5
#        ( auth types supported: "basic"-http  "user/pass"-socks )
#
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks4  127.0.0.1 9050

So, if you're using tor than you can just leave it, or add more proxies in the chain. Say I wanted to add an http proxy to the chain, I would edit the config file like so.

#        Examples:
#
#               socks5  192.168.67.78   1080    lamer   secret
#               http    192.168.89.3    8080    justu   hidden
#               socks4  192.168.1.49    1080
#               http    192.168.39.93   8080
#
#
#       proxy types: http, socks4, socks5
#        ( auth types supported: "basic"-http  "user/pass"-socks )
#
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks4  127.0.0.1 9050
http 189.47.194.196 8080 

Now, you're ready to use it. You can run a tool through proxychains like this;

./proxychains nmap 199.66.1.11

And that about wraps it up for this quick how-to on anonymizing nmap scans.

No comments:

Post a Comment