Поиск по блогу

вторник, 6 мая 2014 г.

Как запустить Proxychains and Tor и посмотреть на это в Telnet и w3m

Видео "Kail Linux : T0r And Proxychains" я понял не сразу, а после того, как проосмотрел похожие... Proxychains может обойтись двумя ссылками на socks4 spcks5 TOR. Здесь только два ролика, а еще небольшие фрагманты справки по Telnet и w3m. В первом ролике показано, как Nmap сканирует порты..., впечатляет.

Ссылки и первоисточники

Мануал из из моей сборки Kali (Debian) почти не отличается от того, что есть в сети

In [1]:
%load /usr/share/doc/proxychains/README
In []:
ProxyChains ver 3.1 README
======================

This is Unix version only.

How to mess with sources - How to Install : read INSTALL !!!!!!

This program forces any tcp connection made by any given tcp client
to follow through proxy (or proxy chain). It is a kind of proxifier.
It acts like sockscap / permeo / eborder driver ( intercepts TCP calls )
It is FREE.

This version (3.x) introduces support for DNS resolving through proxy 
it supports SOCKS4, SOCKS5 and HTTP CONNECT proxy servers.
Auth-types: socks - "user/pass" , http - "basic".

When to use it ?
1) When the only way to get "outside" from your LAN is through proxy server.
2) To get out from behind restrictive firewall which filters outgoing ports.
3) To use two (or more) proxies in chain:
 like: your_host <--> proxy1 <--> proxy2 <--> target_host
4) To "proxify" some program with no proxy support built-in (like telnet)
5) Access intranet from outside via proxy.
5) To use DNS behind proxy.

Some cool features:

* This program can mix different proxy types in the same chain
 like: your_host <-->socks5 <--> http <--> socks4 <--> target_host
* Different chaining options supported
 random order from the list ( user defined length of chain ).
 exact order  (as they appear in the list )
 dynamic order (smart exclude dead proxies from chain)
* You can use it with any TCP client application, even network scanners
 yes, yes - you can make portscan via proxy (or chained proxies)
 for example with Nmap scanner by fyodor (www.insecire.org/nmap).
 proxychains nmap -sT -PO -p 80 -iR  (find some webservers through proxy)
* You can use it with servers, like squid, sendmail, or whatever.
* DNS resolving through proxy.

Configuration:
proxychains looks for config file in following order:
1) ./proxychains.conf
2) $(HOME)/.proxychains/proxychains.conf
3) /etc/proxychains.conf  **

**see more in /etc/proxychains.conf

Usage Example:

 bash$ proxychains telnet targethost.com

in this example it will run telnet through proxy(or chained proxies)
specified by proxychains.conf

Usage Example:

 bash$ proxyresolv targethost.com

in this example it will resolve targethost.com through proxy(or chained proxies)
specified by proxychains.conf

NOTE: 
to run suid/sgid programs(like ssh) through proxychains you have to be root

w3m установлен в Kali, вот краткая справка

In []:
root@kali:~/Desktop/ipython notebook/happyhacking# w3m
w3m version w3m/0.5.3+cvs-1.1055, options lang=en,m17n,image,color,ansi-color,mouse,gpm,menu,cookie,ssl,ssl-verify,external-uri-loader,w3mmailer,nntp,gopher,ipv6,alarm,mark,migemo
usage: w3m [options] [URL or filename]
options:
    -t tab           set tab width
    -r               ignore backspace effect
    -l line          # of preserved line (default 10000)
    -I charset       document charset
    -O charset       display/output charset
    -B               load bookmark
    -bookmark file   specify bookmark file
    -T type          specify content-type
    -m               internet message mode
    -v               visual startup mode
    -M               monochrome display
    -N               open URL of command line on each new tab
    -F               automatically render frame
    -cols width      specify column width (used with -dump)
    -ppc count       specify the number of pixels per character (4.0...32.0)
    -ppl count       specify the number of pixels per line (4.0...64.0)
    -dump            dump formatted page into stdout
    -dump_head       dump response of HEAD request into stdout
    -dump_source     dump page source into stdout
    -dump_both       dump HEAD and source into stdout
    -dump_extra      dump HEAD, source, and extra information into stdout
    -post file       use POST method with file content
    -header string   insert string as a header
    +<num>           goto <num> line
    -num             show line number
    -no-proxy        don't use proxy
    -4               IPv4 only (-o dns_order=4)
    -6               IPv6 only (-o dns_order=6)
    -no-mouse        don't use mouse
    -cookie          use cookie (-no-cookie: don't use cookie)
    -graph           use DEC special graphics for border of table and menu
    -no-graph        use ACII character for border of table and menu
    -s               squeeze multiple blank lines
    -W               toggle wrap search mode
    -X               don't use termcap init/deinit
    -title[=TERM]    set buffer name to terminal title string
    -o opt=value     assign value to config option
    -show-option     print all config options
    -config file     specify config file
    -help            print this usage message
    -version         print w3m version
    -reqlog          write request logfile
    -debug           DO NOT USE

Надо и telnet изучать, в Linux утилита имеет больше опций, чем в Windows

In []:
root@kali:~/Desktop/ipython notebook/happyhacking# telnet
telnet> help
Commands may be abbreviated.  Commands are:

close    close current connection
logout   forcibly logout remote user and close the connection
display  display operating parameters
mode     try to enter line or character mode ('mode ?' for more)
open     connect to a site
quit     exit telnet
send     transmit special characters ('send ?' for more)
set      set operating parameters ('set ?' for more)
unset    unset operating parameters ('unset ?' for more)
status   print status information
toggle   toggle operating parameters ('toggle ?' for more)
slc      set treatment of special characters

z        suspend telnet
environ  change environment variables ('environ ?' for more)
telnet> 


Посты чуть ниже также могут вас заинтересовать

Комментариев нет:

Отправить комментарий