Ethical Overflow - A new focus on Cyber Security

Ethical Hacking - Overview

Ethical Hacking-Proxy

A proxy server is essentialy a middle computer that sits between the attacker and the victim.

To mask your ip under a proxy server to show that you live in a diffrent country and to make yourself untraceable.

When you open a website, your pc sends your ip address to the website,so that it may then send the webpage to your computer. with a proxy, your information is being sent to the proxy first and then the proxy is pulling the website for you, then forwarding it to you. This way,on the website end, they
see the ip address of the proxy you used, and not yours.


Why attacker use proxy.?

-To hide the source ip address so that an attacker can hack without any legal corollary.
-To mask the actual source of the attack by impersonating a fake source address of the proxy.
-To remotly access intranets and other website resource that are normally off limits.
-To interrupt all the request sent by an attacker and transmit them to a third destination, victim will only be able to identify the proxy server address.
-Attackers chain multiple proxy server to avoid detection.

Proxy:- To hide your location by using These websites.



Proxy Tools

Proxy switcher

-Easy way to change proxy setting on the fly.

-Hide your ip address from the websites you visit.

-Automatic proxy server switching for improved anonymous surfing.

-Full support of password protected server.


-Bypass firwall restriction.

-Secure privacy by hiding your IP address.

-Work through a chian of proxy server using different protocols.

-Full IPV6 support.

-Proxy prolocols: socks V4, socks V5,HTTP,HTTPS.

Socks chain

-Sockschain is a program that allows to work with any Internet service through a chain of SOCKS or HTTP proxies to hide the real IP-address. SocksChain can function as a usual SOCKS-server that transmits queries through a chain of proxies. SocksChain can be used with client programs that do not support the SOCKS protocol, but work with one TCP-connection, such as TELNET, HTTP, IRC... (FTP uses 2 connections). And your IP-address will not be seen in the server's logs or mail headers;

TOR(The Onion Routing)

-Onion routing is like an advanced form of proxy routing. Instead of routing through a single unprotected server, it uses a network of nodes that constantly¬†encrypt your data packets¬†at every step. Only at the end of this “chain” of onion nodes does your data become decrypted and sent to the final destination. In fact, only this “exit node” has the power to decrypt your message, so no other node can even see what you’re sending.

Free Proxy IP List