Monday 24 August 2009

HOW TO USE PROXY

"PROXY" is simply a server which will act as a servant for your system. I shall give a non tech simple example for you, imagine you have house for which your looking for a tenant for that, but you feel that you doesn't want to bring an unknown person to stay, so your looking for a letting agency to find one, now the letting agency will give the add and try to find the tenant for your house. when he finds the tenant for your house the tenant will only contact the letting agency and not you but your indirectly connected to each other through the letting agency which is simply PROXY in our field.

so, the system will be connected to the proxy server and when you request for the connection establishment, the proxy server will do the request to the original server in favor of you. Now according to the designated server you are not connected to it but actually you are through proxy.


In what way does proxy help??


* Every one say proxy is used when your trying to hack someone but still it can be traced out. So proxy nothing to do with hackers alone. Hacker beware of this.

* Few proxy server will not allow to run particular application in it, for example it allow hppt but not ftp. It allow only to connect particular port number and we can also limit the number of users to connect the proxy, so DOS attack is limited by this way.

* Most of the user who watch online movies will know about megaupload.com, And you may have come across this message your time period of 72 mit is over try watching it after a 50 mit or some thing like this.
now when u reach 72nd mit you just need to configure your proxy settings and start to use the same page from megaupload by refreshing and scroll the video to 73rd mit and u can enjoy watching it.


The free proxy servers are listed below


IP ADDRESS
PORT NO

COUNTRY
LAST UPDATE
2009-08-25

67.69.254.254
80

Canada
2009-08-25

118.98.232.202
8080

Indonesia
2009-08-25

201.55.32.230
3128

Brazil
2009-08-25

196.202.117.50
8080

Egypt
2009-08-25

128.208.2.139
3128

United States
2009-08-25

189.123.125.147
3128

Brazil
2009-08-25

67.69.254.247
80

Canada
2009-08-25

60.190.139.10
80

China
2009-08-25

63.251.57.112
3128

United States
2009-08-25

222.92.116.39
80

China
2009-08-25

78.129.201.55
3128

Great Britain (UK)
2009-08-25

61.172.249.94
80

China
2009-08-25

200.174.85.195
3128

Brazil
2009-08-25




Setting up proxy




1) open browser go to tools tab-> options -> advance ->network ->connection settings->


2) Manual proxy setting


3)Type any of the ip address and its corresponding port number and apply


4) Now your connected check you Ip address before and after doing this in (www.whatismyip.com)

Any prob in setting plz be free to ask and don't forget to comment.

3 comments:

  1. Very good posting friend and I want you write something about how to catch the proxy server users online and that will be a good posting also. Waiting for your that posting.
    With Thanks
    urproblemmysolution.blogspot.com

    ReplyDelete
  2. Thanks mate... do you mean to traceback the system if they are trying to penetrate other system???
    In that case here is the logic, the remote system will come to know who is connected to them and that system will be the proxy. Now the proxy server will have the log where it can tell us who used him for connecting the remote end server or the victim by interlinking the timestamp in the logfile we can come to conclution who had atually tried to attack the victim. In this case you have to get the help from proxy server company to do so.

    I you want to find the person who is using proxy just by seeing their IP address is just a random guess. Actually you will know the IP address which reach you, just take a note of it and do "whois lookup" you will find the location and company to which this ip address is registered. Now u need any of the ISP help usually ISP will have a set of proxy server's IP you can verify it or google for the list oof proxy address an need to match manually.May be just call the company directly to which the ip is registered and ask them. You can get those company detail from "whois" lookup.
    This is only my prediction but I am not sure with leagal rights about calling the company and asking them directly.

    ReplyDelete
  3. Dear Ranger,
    Thanks for your suggestion and I know all these things which you have told and I know also the legal procedures as I have to do all those things during the course of investigation but the problem is that most them does not provide the necessary informations as it depends on country wide treaties and so all of you are requested to write the tricks here how to catch the online proxy server users and how to trace their real IP addresses during online may when they r attacking or chatting with them. So do something for the country men not for the criminals or crackers. I hope you the intelligent guys will do that and help the administration to find out the attackers and think one day they may destroy your country and the system.
    Thanks
    urproblemmysolution.blogspot.com

    ReplyDelete

Conformio-Online Compliance Tool Multiple Vulnerabilities

# Exploit Title: Conformio-Online Compliance Tool Multiple Vulnerabilities. # Discovered Date: 16/11/2017 # Exploit Author: Ramikan # Websi...