DanteD Socks5 Proxy Server

From RHS Wiki
Jump to navigation Jump to search

Install

sudo apt-get install dante-server
sudo adduser proxyuser
sudo passwd proxyuser
sudo nano /etc/danted.conf

Configure

/etc/danted.conf

#logoutput: syslog
#logoutput: stderr
logoutput: /var/log/danted.log
internal: ens33 port = 1080
#external: 192.168.1.158
external: 10.0.254.66
# user.privileged: proxy
user.notprivileged: nobody
# user.libwrap: nobody
method: username none
client pass {
        from: 0.0.0.0/0 port 1-65535 to: 0.0.0.0/0
        log: connect disconnect error
}
 
pass {
    from: 0.0.0.0/0 port 1-65535 to: 0.0.0.0/0
    protocol: tcp udp
}
 
#route {                                                                        
#        from: 0.0.0.0/0 to: 0.0.0.0/0 via: 192.0.2.1 port = 1080            
#        proxyprotocol: socks_v4 socks_v5
#        method: none
#}
 
#route {                                                                        
#        from: 0.0.0.0/0 to: 8.8.8.8/32 port = domain via: direct              
#}  
 

Client

Configure proxychains

# proxychains.conf  VER 3.1
  #
  #        HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS.
  #       
  
  # The option below identifies how the ProxyList is treated.
  # only one option should be uncommented at time,
  # otherwise the last appearing option will be accepted
  #
  #dynamic_chain
  #
  # Dynamic - Each connection will be done via chained proxies
  # all proxies chained in the order as they appear in the list
  # at least one proxy must be online to play in chain
  # (dead proxies are skipped)
  # otherwise EINTR is returned to the app
  #
  strict_chain
  #
  # Strict - Each connection will be done via chained proxies
  # all proxies chained in the order as they appear in the list
  # all proxies must be online to play in chain
  # otherwise EINTR is returned to the app
  #
  #random_chain
  #
  # Random - Each connection will be done via random proxy
  # (or proxy chain, see  chain_len) from the list.
  # this option is good to test your IDS :)
  
  # Make sense only if random_chain
  #chain_len = 2
  
  # Quiet mode (no output from library)
  #quiet_mode
  
  # Proxy DNS requests - no leak for DNS data
  proxy_dns 
  
  # Some timeouts in milliseconds
  tcp_read_time_out 15000
  tcp_connect_time_out 8000
  
  # ProxyList format
  #       type  host  port [user pass]
  #       (values separated by 'tab' or 'blank')
  #
  #
  #        Examples:
  #
  #               socks5  192.168.67.78   1080    lamer   secret
  #               http    192.168.89.3    8080    justu   hidden
  #               socks4  192.168.1.49    1080
  #               http    192.168.39.93   8080    
  #               
  #
  #       proxy types: http, socks4, socks5
  #        ( auth types supported: "basic"-http  "user/pass"-socks )
  #
  [ProxyList]
  # add proxy here ...
  # meanwile
  # defaults set to "tor"
  # socks4        127.0.0.1 9050
  socks5  127.0.0.1       1111
  
  

Run commands with proxychains

sudo proxychains apt-get update

Source