Ethical Hacking Tutorials -What is Proxy?
A Proxy Server is essentially a middle Computer that sites between the Attacker and the Victim.
How to use Proxy?
To mask your IP under a proxy server to show that you live in a different country and to make yourself untraceable.
Normally when you open a website, then your PC/Mobile sends your IP address to the website, so that it may then send the webpage to your Computer.
With proxy information is being sent to the proxy first, and then the prosy is pulling the website for you, then forwarding it to you. This way, on the website end, they see the IP address of the proxy you used, and not yours.
Why Attackers use a Proxy?
- To hide the source IP address so that an attacker can hack without any legal corollary.
- To mask the actual source of the attack by impersonating a fake source address of the proxy.
- To remotely access intranets and other website resources that are normally off limits.
- To interrupt all the request sent by an attacker and transmit them to a third destination, hence victim will only be able to identify the proxy server address.
- Attackers chain multiple proxy servers to avoid detection.
Here are some Proxy Website List
Here are Some Tools to Change Proxy
Proxy Switcher
- The easy way to change the proxy setting on the fly.
- Full support of password protected servers.
- Hide your IP address from the websites you visit.
- Automatic proxy server switching for improved surfing
- Bypass Firewall restrictions.
- Secure privacy by hiding your IP address Work through a chain of proxy servers using different protocols.
- Full IPv6
- Proxy protocols: SOCKS v4. SOCKS v5, HTTPS and HTTP
TOR(The Onion Routing)
Anonymizer
Best Free Proxy IP List Website
- Hacking with Android - Become a True Android Hacker
- Ethical Hacking Tutorials - What is Viruses?
- What is Phishing Attack?
No comments:
Post a Comment