{"id":318,"date":"2006-08-25T03:40:09","date_gmt":"2006-08-25T03:40:09","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/08\/anonymous-connections-over-the-internet-using-socks-chains-proxy-proxies\/"},"modified":"2015-09-09T19:40:38","modified_gmt":"2015-09-09T11:40:38","slug":"anonymous-connections-over-the-internet-using-socks-chains-proxy-proxies","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/08\/anonymous-connections-over-the-internet-using-socks-chains-proxy-proxies\/","title":{"rendered":"Anonymous Connections Over the Internet – Using Socks Chains Proxy Proxies"},"content":{"rendered":"
Introduction<\/strong><\/p>\n This tutorial is an attempt to help you re-route all internet winsock applications in ms windows trough a socks chain, thus making your connections much more anonymous.<\/p>\n Theory<\/strong><\/p>\n The more different hops you make your data jump, the more difficult it will be to trace it back. take this route for example:<\/p>\n you –> socks1 –> socks2 –> socks3 –> … –> socksx –> target<\/p>\n People who want to trace you will have to contact x persons to ask their them for their logs. chances are one of them didn’t log… and if they logged, the ip seen by each host\/socks is the ip of the previous host\/socks in the chain.<\/p>\n This works for:<\/p>\n It doesn’t work on most irc servers since they often check for open wingates Now let’s do it<\/strong><\/p>\n 1)<\/strong> First you need to find some boxes running wingate, we look for wingates since the default installation of wingate includes a non-logging socks server on port 1080<\/p>\n Visit http:\/\/www.samair.ru\/proxy\/socks.htm<\/a> or http:\/\/www.proxyleecher.com\/socks.php<\/a> for some wide-known wingate ips, or even better: you could try to find some yourself.<\/p>\n To do this, i would suggest you use ‘proxy hunter’, available for download at http:\/\/www.proxys4all.com\/tools.shtml<\/a> be sure to look for wingates (port 23) and not for socks, as we only want wingate socks.<\/p>\n You could also use wingatescan, available for download at http:\/\/packetstormsecurity.org\/wingate-scanner\/<\/a><\/p>\n Speed is very important since we will be using multiple socks, and we don’t want our programs to time out. with the klever dipstick tool, you can find out which are the fastest ones. (get the klever dipstick program at http:\/\/klever.net\/kin\/static\/dipstick.exe<\/a>)<\/p>\n Just fire off Dipstick. Rightclick in the small green rectangular and choose Show main window. To import a list of wingates, just click on Advanced, choose Import List and select your file.<\/p>\n You can also manually ping a simple host by clicking on Manual Ping. Use those wingates with the smallest average time. *duh*<\/p>\n 2)<\/strong> Second, check if the wingates from the list are actually running :)<\/p>\n There are a lot of programs that can help you with this.<\/p>\n 3)<\/strong> Third, install a program that will intercept all outgoing networking calls.<\/p>\n\n
\nand proxies.<\/p>\n