- Kali Linux:An Ethical Hacker's Cookbook(Second Edition)
- Himanshu Sharma
- 109字
- 2021-06-24 15:59:18
How to do it...
Proxychains is already installed in Kali. However, we need a list of proxies in its configuration file that we want to use:
- To do that, we open the config file of proxychains in a text editor with this command:
leafpad /etc/proxychains.conf
The following screenshot shows the output of the preceding command:

We can add all the proxies we want in the place highlighted in the previous screenshot and then save. Proxychains also allows us to use dynamic chain or random chain while connection to proxyservers.
- In the config file, uncomment dynamic_chain or random_chain. The following screenshot shows the output of the preceding command:

推薦閱讀
- 曝光:Linux企業運維實戰
- 嵌入式應用程序設計綜合教程(微課版)
- 嵌入式Linux驅動程序和系統開發實例精講
- Windows Vista融會貫通
- 巧學活用Windows 7
- Kali Linux 2018:Windows Penetration Testing
- 一學就會:Windows Vista應用完全自學手冊
- Linux內核設計的藝術:圖解Linux操作系統架構設計與實現原理
- Fedora 12 Linux應用基礎
- Web Penetration Testing with Kali Linux(Third Edition)
- 嵌入式微系統
- VMware Horizon Mirage Essentials
- CSS揭秘
- 鴻蒙入門:HarmonyOS應用開發
- Windows 8完全自學手冊