EDITED:

Link below is not working anymore. To install Proxychains, you can install it directly using brew

infidel:~ goo$ brew install proxychains-ng

Here is the step-by-step solution to get it works:

Setup a working directory, I’m using ~/build-temp/

infidel:~ goo$ mkdir build-temp
infidel:~ goo$ cd build-temp

Download Proxychains from here (you may using wget or via the browser) and extract

infidel:build-temp goo$ tar xzvf proxychains-3.1.tar.gz

Download the patch file for Proxychains here (thanks to chrootlabs guy)

infidel:build-temp goo$ wget http://chrootlabs.org/bgt/proxychains-3.1_osx.diff

Patch the Proxychains

infidel:build-temp goo$ patch -p1 <proxychains-3.1_osx.diff

Install the Proxychains

infidel:build-temp goo$ cd proxychains-3.1
infidel:proxychains-3.1 goo$ ./configure --PREFIX=/opt/local
infidel:proxychains-3.1 goo$ cd proxychains
infidel:proxychains goo$ make
infidel:proxychains goo$ sudo make install

Create symbolic links to make it run from anywhere

infidel:proxychains goo$ mkdir ~/.libs
infidel:proxychains goo$ mkdir ~/.proxychains
infidel:proxychains goo$ ln -s /opt/local/lib/libproxychains.3.0.0.dylib ~/.libs/
infidel:proxychains goo$ ln -s /opt/local/etc/proxychains.conf ~/.proxychains/

Now comment out the proxy_dns option in proxychains.conf file (this causes trouble)

infidel:proxychains goo$ sudo nano ~/.proxychains/proxychains.conf

Proxychains should works now, you may test it using lynx

infidel:~ goo$ proxychains lynx ipchicken.com

source: http://touhou.ru/?act=showpost&pid=511

About the Author modpr0be

Thomas Gregory (modpr0be) saat ini adalah direktur dan pemilik PT Spentera, sebuah perusahaan yang fokus dalam bidang penetration test, incident response, intrusion analysis and forensic investigation. Saya sering memberikan konsultasi tentang strategi keamanan kepada investor, mitra, dan pelanggan. Di sela-sela pekerjaannya, penulis memberikan materi dalam bentuk pelatihan dan kontribusi komunitas dalam bentuk seminar, workshop, dan diskusi dengan berbagai topik seperti teknik peretasan, teknik eksploitasi, dan analisis intrusi. Saya juga berkontribusi untuk repositori eksploit Metasploit Framework sebagai pengembang kode eksploit. Saat ini saya memegang sertifikasi dari Offensive Security Certified Professional (OSCP), Offensive Security Certified Expert (OSCE), ISO/IEC ISMS 27001: 2013 Lead Auditor/Auditor, GIAC Certified Intrusion Analyst (GCIA), dan Offensive Security Exploitation Expert (OSEE). Jika ingin menghubungi saya dapat melalui email di tom at spentera dot id.

Tinggalkan Balasan

Please log in using one of these methods to post your comment:

Logo WordPress.com

You are commenting using your WordPress.com account. Logout /  Ubah )

Foto Google

You are commenting using your Google account. Logout /  Ubah )

Gambar Twitter

You are commenting using your Twitter account. Logout /  Ubah )

Foto Facebook

You are commenting using your Facebook account. Logout /  Ubah )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d blogger menyukai ini: