With Proxychains — Metasploit
socks5 10.0.0.15 1080 socks5 172.16.1.20 1080 High risk of logging/hijacking. Use only in lab environments. Step 2: Verify the Proxy Chain Works Before launching Metasploit, test the chain with a simple tool:
socks4 127.0.0.1 9050 If you have a compromised host acting as a SOCKS proxy (via auxiliary/server/socks_proxy ), add its IP:
Once inside msfconsole , you'll see the normal prompt, but every TCP connection from Metasploit will now traverse your proxy chain. Example 1: Anonymous Port Scanning from Metasploit Instead of Nmap, use Metasploit's auxiliary/scanner/portscan/tcp : metasploit with proxychains
proxychains4 curl ifconfig.me If configured with Tor, you should see a Tor exit node IP, not your real IP.
Install and start Tor:
Routing the Matrix: How to Run Metasploit Through ProxyChains (For Anonymity & Pivoting)
sudo apt install tor -y sudo systemctl start tor Add this line to the proxy list: socks5 10
ls /etc/proxychains4.conf Edit the configuration:















