![]() ![]() # in case some control-freak app checks the returned ip, and denies to # on further accesses to this ip we will send the saved DNS name to the proxy. # if the proxified app does a DNS request, we will return an IP from that range. # we use the reserved 224.x.x.x range by default, # set the class A subnet number to usefor use of the internal remote DNS mapping # Proxy DNS requests - no leak for DNS data # this option is good to test your IDS :) # (or proxy chain, see chain_len) from the list. # Random - Each connection will be done via random proxy # all proxies must be online to play in chain # Strict - Each connection will be done via chained proxies # at least one proxy must be online to play in chain ![]() # all proxies chained in the order as they appear in the list # Dynamic - Each connection will be done via chained proxies # otherwise the last appearing option will be accepted # only one option should be uncommented at time, # The option below identifies how the ProxyList is treated. # HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS. Then I edited code in /etc/nf follows: # nf VER 4 I did everything as shown in video and even after that it doesn't seems to work. I am beginner to ethical hacking and trying to route my request using proxychains and tor referring to this YouTube video link.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |