Proxychains Kali Linux
Aug 29, 2022
In this guide, it is assumed that you have already performed an initial compromise to a target device and needs to perform pivoting to other network connected to the compromised host.
- Check networks or routes connected to the target machine.
2. Run autoroute from msfconsole.
3. Use socks_proxy auxiliary from msfconsole and use the existing session you have from the target machine. Take note of the version you want to use.
4. Configure your proxychains settings from your attacker machine.
5. Perform a proxychain NMAP.