<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent posts to Help with Proxychains4: Unable to Connect to Burp Suite (Port 8080)</title><link>https://sourceforge.net/p/proxychains/discussion/644747/thread/c484cd312d/</link><description>Recent posts to Help with Proxychains4: Unable to Connect to Burp Suite (Port 8080)</description><atom:link href="https://sourceforge.net/p/proxychains/discussion/644747/thread/c484cd312d/feed.rss" rel="self"/><language>en</language><lastBuildDate>Sun, 16 Mar 2025 02:39:17 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/proxychains/discussion/644747/thread/c484cd312d/feed.rss" rel="self" type="application/rss+xml"/><item><title>Help with Proxychains4: Unable to Connect to Burp Suite (Port 8080)</title><link>https://sourceforge.net/p/proxychains/discussion/644747/thread/c484cd312d/?limit=25#253d</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hello, Proxychains4 developers. I need your assistance.&lt;/p&gt;
&lt;p&gt;I'm trying to use Proxychains4 to anonymize the requests made by my tool, TurboSearch, since SOCKS5 allows me to mask DNS resolutions. I'm also using Burp Suite, a tool to intercept and analyze HTTP/S traffic, aiming to send TurboSearch's findings directly to it.&lt;/p&gt;
&lt;p&gt;For context, TurboSearch is an automated URL discovery tool widely used in security testing to identify possible API endpoints or vulnerable paths on a server. It sends HTTP(S) requests to a specified target using a wordlist (e.g., /api/login, /admin, etc.). My goal is to execute TurboSearch with Proxychains4, ensuring that requests are routed through the Tor network for anonymity, while the findings are sent to Burp Suite.&lt;/p&gt;
&lt;p&gt;Here is my current Proxychains4 configuration (with comments and blank lines removed for simplicity):&lt;/p&gt;
&lt;p&gt;strict_chain&lt;br/&gt;
proxy_dns&lt;br/&gt;
remote_dns_subnet 224&lt;br/&gt;
tcp_read_time_out 15000&lt;br/&gt;
tcp_connect_time_out 8000&lt;br/&gt;
&lt;span&gt;[ProxyList]&lt;/span&gt;&lt;br/&gt;
socks5 127.0.0.1 9050&lt;br/&gt;
I confirmed that both Tor and Burp Suite are active and listening on their respective ports (9050 and 8080) using the following command:&lt;/p&gt;
&lt;p&gt;netstat -platun | grep -E "8080|9050"&lt;br/&gt;
Command output:&lt;/p&gt;
&lt;p&gt;(Not all processes could be identified, non-owned process info&lt;br/&gt;
 will not be shown, you would have to be root to see it all.)&lt;br/&gt;
tcp        0      0 127.0.0.1:9050          0.0.0.0:&lt;em&gt;               LISTEN      -                 &lt;br/&gt;
tcp6       0      0 127.0.0.1:8080          :::&lt;/em&gt;                    LISTEN      3323/java&lt;br/&gt;
With this setup, I successfully executed TurboSearch using Proxychains4. Here’s the command and its corresponding output:&lt;/p&gt;
&lt;p&gt;proxychains4 turbosearch -I -t &lt;a href="https://api.client.com" rel="nofollow"&gt;https://api.client.com&lt;/a&gt; -w /usr/share/seclists/Discovery/Web-Content/api/api-endpoints.txt --method get,post,put,patch -D --random-agent&lt;br/&gt;
Explanation of TurboSearch options:&lt;/p&gt;
&lt;p&gt;-I: Enables interactive mode, displaying detailed information about the requests and responses during execution.&lt;br/&gt;
-t &lt;a href="https://api.client.com:" rel="nofollow"&gt;https://api.client.com:&lt;/a&gt; Sets the target URL where TurboSearch will send requests.&lt;br/&gt;
-w /usr/share/seclists/Discovery/Web-Content/api/api-endpoints.txt: Specifies the path to the wordlist containing possible endpoints (e.g., /login, /admin).&lt;br/&gt;
--method get,post,put,patch: Defines the HTTP methods to use (GET, POST, PUT, PATCH).&lt;br/&gt;
-D: Activates "Double Path" mode, where TurboSearch tests concatenated paths like /api/api/login for possible vulnerabilities.&lt;br/&gt;
--random-agent: Makes TurboSearch use randomized User-Agents in requests to make traffic harder to identify.&lt;br/&gt;
--report-to &lt;a href="http://127.0.0.1:8080" rel="nofollow"&gt;http://127.0.0.1:8080&lt;/a&gt; (when added): Sends the findings to Burp Suite, configured to listen on port 8080.&lt;br/&gt;
Partial output without --report-to:&lt;/p&gt;
&lt;p&gt;&lt;span&gt;[proxychains]&lt;/span&gt; config file found: /etc/proxychains4.conf&lt;br/&gt;
&lt;span&gt;[proxychains]&lt;/span&gt; Strict chain  ...  127.0.0.1:9050  ...  api.client.com:443  ...  OK&lt;br/&gt;
&lt;span&gt;[+]&lt;/span&gt; Connectivity checker&lt;br/&gt;
&lt;span&gt;[+]&lt;/span&gt; Connection test against &lt;a href="https://api.client.com" rel="nofollow"&gt;https://api.client.com&lt;/a&gt; OK! (CODE:403|SIZE:335)&lt;br/&gt;
At this stage, everything works perfectly. Proxychains4 routes TurboSearch's requests through the Tor network, and scans run without any issues.&lt;/p&gt;
&lt;p&gt;The problem:&lt;/p&gt;
&lt;p&gt;When I include the --report-to &lt;a href="http://127.0.0.1:8080" rel="nofollow"&gt;http://127.0.0.1:8080&lt;/a&gt; option in the TurboSearch command to send the findings to Burp Suite, Proxychains4 fails the connectivity check. Here's the updated command:&lt;/p&gt;
&lt;p&gt;proxychains4 turbosearch -I -t &lt;a href="https://api.client.com" rel="nofollow"&gt;https://api.client.com&lt;/a&gt; -w /usr/share/seclists/Discovery/Web-Content/api/api-endpoints.txt --method get,post,put,patch -D --random-agent --report-to &lt;a href="http://127.0.0.1:8080" rel="nofollow"&gt;http://127.0.0.1:8080&lt;/a&gt;&lt;br/&gt;
Partial output:&lt;/p&gt;
&lt;p&gt;&lt;span&gt;[proxychains]&lt;/span&gt; Strict chain  ...  127.0.0.1:9050  ...  127.0.0.1:8080 &amp;lt;--socket error or timeout!&lt;br/&gt;
&lt;span&gt;[!]&lt;/span&gt; Error connecting to url &lt;a href="https://api.client.com" rel="nofollow"&gt;https://api.client.com&lt;/a&gt; using report to proxy &lt;a href="http://127.0.0.1:8080" rel="nofollow"&gt;http://127.0.0.1:8080&lt;/a&gt;&lt;br/&gt;
&lt;span&gt;[!]&lt;/span&gt; Error: HTTPSConnectionPool(host='api.client.com', port=443): Max retries exceeded with url: / (Caused by ProxyError('Unable to connect to proxy', NewConnectionError('&amp;lt;urllib3.connection.httpsconnection object="" at="" 0x7fe1f6f9cb90=""&amp;gt;: Failed to establish a new connection: &lt;span&gt;[Errno 111]&lt;/span&gt; Connection refused')))&lt;br/&gt;
My interpretation of the issue:&amp;lt;/urllib3.connection.httpsconnection&amp;gt;&lt;/p&gt;
&lt;p&gt;I suspect the problem lies in the Proxychains4 configuration, as it seems unable to connect to Burp Suite on port 8080. Here are my thoughts:&lt;/p&gt;
&lt;p&gt;strict_chain is enabled, which forces all connections to go through the configured proxy chain in the specified order. This includes routing local traffic (127.0.0.1:8080) through the Tor network (127.0.0.1:9050). This behavior doesn't make sense for localhost connections like those to Burp Suite.&lt;/p&gt;
&lt;p&gt;dynamic_chain, another Proxychains4 option, allows connections to bypass non-responsive proxies and proceed with the remaining proxies in the chain. If enabled, the configuration would look like this:&lt;/p&gt;
&lt;p&gt;dynamic_chain&lt;br/&gt;
proxy_dns&lt;br/&gt;
remote_dns_subnet 224&lt;br/&gt;
tcp_read_time_out 15000&lt;br/&gt;
tcp_connect_time_out 8000&lt;br/&gt;
&lt;span&gt;[ProxyList]&lt;/span&gt;&lt;br/&gt;
socks5 127.0.0.1 9050&lt;br/&gt;
Although strict_chain seems like the likely cause, I don’t fully understand how dynamic_chain would resolve the issue, as the problem appears specific to Proxychains4 failing to reach Burp Suite on localhost.&lt;/p&gt;
&lt;p&gt;Specific questions:&lt;/p&gt;
&lt;p&gt;Is this behavior expected when using strict_chain?&lt;br/&gt;
Is there a way to ensure that local connections (e.g., to Burp Suite) are not routed through the Tor network unnecessarily?&lt;br/&gt;
Can Proxychains4 be configured differently to handle this situation?&lt;br/&gt;
If I’m overlooking something crucial, it might be because I’ve been struggling with this all day. Any guidance or suggestions would be greatly appreciated. Thank you so much!&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ricardo RT</dc:creator><pubDate>Sun, 16 Mar 2025 02:39:17 -0000</pubDate><guid>https://sourceforge.net6da2e17b49bef805536ed865e7d81828e07114d1</guid></item></channel></rss>