Proxychains Kali Linux

Clarence Subia
Aug 29, 2022

--

In this guide, it is assumed that you have already performed an initial compromise to a target device and needs to perform pivoting to other network connected to the compromised host.

  1. Check networks or routes connected to the target machine.

2. Run autoroute from msfconsole.

3. Use socks_proxy auxiliary from msfconsole and use the existing session you have from the target machine. Take note of the version you want to use.

4. Configure your proxychains settings from your attacker machine.

5. Perform a proxychain NMAP.

--

--

Clarence Subia
Clarence Subia

Written by Clarence Subia

Network Engineer / Penetration Tester

No responses yet