Presentation is loading. Please wait.

Presentation is loading. Please wait.

FOOTPRINTING PROXY A proxy server is essentially a middle computer that sits between the attacker and the Victim. To mask your ip under a proxy server.

Similar presentations


Presentation on theme: "FOOTPRINTING PROXY A proxy server is essentially a middle computer that sits between the attacker and the Victim. To mask your ip under a proxy server."— Presentation transcript:

1 FOOTPRINTING PROXY A proxy server is essentially a middle computer that sits between the attacker and the Victim. To mask your ip under a proxy server to show that you live in a different country and to make yourself untraceable

2 FOOTPRINTING PROXY

3 FOOTPRINTING PROXY Normally when you open a website, your PC sends your IP address to the website, so that it may then send the webpage to your computer. With a proxy, your information is being sent to the proxy first, and then the proxy is pulling the website for you, then forwarding it to you. This way, on the websites end, they see the IP address of the proxy you used, and not yours. 117.119.22.21 111.121.14.65

4 FOOTPRINTING PROXY DIRECT ATTACK / NO PROXY LOGGED PROXY Using proxy chaining

5 FOOTPRINTING PROXY Using proxy chaining server IRAN NORTH COREA CUBA INTERNET CAFE

6 FOOTPRINTING Why attackers use proxy ? To hide the source IP address so that an attacker can hack without any legal corollary. To mask the actual source of the attack by impersonating a fake source address of the proxy. To remotely access intranets and other website resources that are normally off limits. To interrupt all the requests sent by an attacker and transmit them to a third destination, hence victims will only be able to identify the proxy server address. Attackers chain multiple proxy server to avoid detection To hide the source IP address so that an attacker can hack without any legal corollary. To mask the actual source of the attack by impersonating a fake source address of the proxy. To remotely access intranets and other website resources that are normally off limits. To interrupt all the requests sent by an attacker and transmit them to a third destination, hence victims will only be able to identify the proxy server address. Attackers chain multiple proxy server to avoid detection

7 FOOTPRINTING PROXY https://www.anonymizer.com / When you type a Web address into the Anonymizer.com address bar, Anonymizer.com retrieves the page you requested and displays it. Your computer’s IP address isn’t logged; the server’s address is. https://hideme/proxy www.hidemyass.com/proxy

8 FOOTPRINTING Proxy tools Proxy workbench Proxifier Proxy switcher SocksChain TOR(The Onion Routing)

9 FOOTPRINTING Proxy tool- Logged Proxy switcher Easy way to change proxy settings on the fly. Full support of password protected servers Hide your IP address from the web sites you visit. Automatic proxy server switching for improved anonymous surfing

10 FOOTPRINTING Proxy tool- Chaining Proxifier Bypass firewall restrictions. Secure privacy by hiding your IP address Work through a chain of proxy servers using different protocols. Full IPv6 support Proxy protocols : SOCKS v4, SOCKS v4A, SOCKS v5, HTTPS and HTTP

11 FOOTPRINTING Free Proxy ip list www. xroxy.com www.Freeproxylist.net proxylist.hidemyass.com


Download ppt "FOOTPRINTING PROXY A proxy server is essentially a middle computer that sits between the attacker and the Victim. To mask your ip under a proxy server."

Similar presentations


Ads by Google