HACKLOG 1×05 – Cos’è un Proxy Server, tipi di Proxy e dove trovarli (Guida Linux Privacy Anonymous)
Articles,  Blog

HACKLOG 1×05 – Cos’è un Proxy Server, tipi di Proxy e dove trovarli (Guida Linux Privacy Anonymous)

The intent of a cyber criminal is
to hide its public IP address – What makes it so recognizable
on the Internet network – while for what Local will not be too many problems because
He will have already “cleaned up” its MAC Address and then every message on the
not incastrerà internal network; how do you know, the local IP is assigned by a router
and this is not enough to recognize who the owner of a computer: the only element
able to guarantee it is the MAC Address. It must be said that the cyber-crime expert
almost certainly will not work ever from home His nor somewhere close network:
despite the precautions knows that you have to hide every trace
that makes him relatable to some hypothetical the offense, including the connection that will use
“Latch” during his attack sessions. Here then you can rely to a
of the oldest tools of information technology: Proxy. Proxies (technically open proxies) are essentially
server – just called proxy servers – That can perform various operations,
between: Provide anonymous surfing
Make a copy of web pages Make a filtering in software,
acting as a kind of firewall It should be considered that the proxy today
are less and less used for navigation incognito, replaced by more methods
effective; however they remain useful in certain occasions – especially in the programming – and
it is therefore important to know them. What makes the proxy is essentially asking
between the client and the server, doing so from “via” between the two resources. As already mentioned there are different types
proxy that vary in purpose of use and design. Although it is very interesting to understand
so they are used intelligently in server infrastructure, in our case
we will only explain the differences involving navigation in anonymity. As it is now, proxy
HTTP / HTTPS are able to filter the information navigating within the protocol
HTTP and its secure HTTPS form. Long story short (for now) we say that
HTTP is a thought communication protocol to interpret information at the level of
World Wide Web. It is by far the most popular protocol
it is found in two forms: HTTP (without encryption)
HTTPS (SSL or TLS encryption) Returning to the HTTP proxy is good to consider
which they are the most popular and easy to find because servers should only handle this
Protocol and hence optimize better machines to do just this kind of work. Compared to SOCKS (which we will see shortly) are
generally more reactive but obviously limited to their protocol. These proxy types are further subdivided
into subcategories of “quality.” Although agencies that distribute these
Proxy use their own “yardstick” Convention is to define them in turn in 3
levels: Non-anonymous proxy: not disguise the address
original IP and usually add a single string to the header (the information
sent in packets) to the server that receives it. Proxy anonymous: disguise the IP address
but alternate headers to the server that receives it. Proxy elite: disguise the IP address and
do not alter the headers. The advantage of using a proxy with support
the SOCKS4 protocol instead of HTTP / HTTPS being able to redirect any information
based TCP. This means in essence that
They can filter out only the services of the World Wide Web – that of nature are also based
on the TCP – but the entire range of protocols that supports this type of service. You can find a variation called
SOCKS4A. Substantially identical to the previous one,
SOCKS5 can redirect information Also on the UDP protocol, making the facts
the safest. The SOCKS5 protocol has also allowed
owners of the proxy to enable a system inner authentication and support to
IPv6. This allows you to use the SOCKS5 proxy
with any type of software to use the Internet connection as programs
mail, chat, p2p etc … It is the direct evolution of SOCKS4 protocol. The Web Proxy are real websites
that does not require any configuration or particular tool inside the computer
but allow you to navigate directly anonymity. In the network there are many, here are some
we have found on the net for you and tested: whoer.net hide.me
proxysite.com vpnbook.com
hidemyass.com kproxy.com
hidester.com filterbypass.me
A complete list is available on www.proxy4free.com Once we realized what
proxies must also know where to find them! The boy novice probably would use
Google as a search key by typing “proxy list “: that, however, does not know is that he
It is the last wheel of a wagon made of millions of people who, in turn, make a careless use
proxies. This means that in 99.9% of cases will get
Proxy not good, that is already recognized as abused and then banned, filtered or
even no longer active since closed host, while those still working
will be slow and unstable. For the record, the most active sites
and popular to retrieve proxy are: HideMyAss
Proxy4free samair.ru
inCloak Cool Proxy
GatherProxy SSLProxies Here then is the need of having to
constantly find new proxy that are fast enough, (almost) not blocked by
sites and services that offer a good compromise General of anonymity. Premium lists are those sites or those newsletters / mailing
lists that contain within them lists proxy not already made public. These lists are almost always paid
or just the preserve of the elite groups. In fact they are really few remaining services
public offering proxy list for a fee and the last remaining it is not so
exclusive: HideMyAss
Premium Proxy Switcher ProxySolutions
SharedProxies Coolproxies Arrived at this point everyone you will find more
or less hard the right way to connect to a proxy, this depends not only from the system
Operating in use but also by the version same. Fortunately in graphic arts environments for GNU / Linux
things are simple here: Debian GNOME 3 is under the Settings item
->Network ->Network Proxy. Going back to the command line in Linux
You can of course do the same thing, using a text editor (nano) and changing
this file in the / etc / environment on
nano / etc / environment Considering what we have said for
graphic configuration, compile the file by pasting the following lines. Keep in mind, however, that some internal programs (like APT for distributions based on Debian / Ubuntu) will perform the bypass of this reading. For more information visit the official wiki (https://help.ubuntu.com/community/AptGet/Howto). Some software – such as programs
sharing, chat and anything else – give the possibility the end user to make use
internal proxy settings. The reasons may be various (corporate proxy,
university and so on), and this allows you can use a proxy for anonymize
incoming and outgoing connections. To know if a program provides the functionality
proxy please refer to the documentation official.


  • The Walter Production

    +Inforge.net Ma Tor? Non è meglio connettersi a tor per mascherarsi nella rete, piuttosto che configurare un proxy nel modo che avete mostrato?

  • Davide Foti

    Ciao, complimenti per questa serie, la trovo affascinante e sopratutto ben fatta.
    Avrei una domanda: se si utilizzasse un proxy, quest'ultimo registrerebbe in un log le ricerche/richieste che vengono fatte tenendo traccia dell'indirizzo IP del richiedente? Se per motivi legali le autorità chiedessero questi log file, il gestore del proxy è tenuto a fornirli? Grazie mille

  • shoto game

    anche se nn centra niente vorrei sapere se io lancio iptables su linux mi dice questo iptables v1.4.21: not comand specified
    try 'iptables -h' or –help' for more information

  • def me

    Scusami, tutto bello e bellissimo ma i proxy fanno una cosa molto importante… e che non hai menzionato … rendono stabile internet molte volte quando apri un sito internet diverse volte o comunque diversi utenti accedono allo stesso medesimo sito , le immagini e file pesanti vengono scaricati da un proxy server in scale Nazionale regionale provinciale in modo che un utente riceve i dati prima del effettivo tempo di attesa su internet, scaricano il peso dei dati è la prima motivazione per cui esistono i proxy poi che sono stati adoperati per altro è un altra discussione 🙂

    Distinti Saluti un utente Inforge

  • Angelo Raffaele LISO

    Ok, video esplicativo ed esaustivo, però come dici i server proxy esistenti vengono bannati e quelli di elite o a pagamento sono oramai introvabili e non così tanto performanti . Mi chiedo se non sia meglio affidarsi a tor e a tutta l'infrastruttura che ne segue. Performante lo è perché di tanto in tanto lo uso e pur rallentando la connessione risulta sicuramente, a mio avviso, più scattante rispetto all'uso del proxy. Poi bhò, sicuramente hai più esperienza quindi potresti illuminarmi in merito.

  • Vittorio Pinti

    Ciao, sto provando a cambiare proxy sia dalle impostazioni di Debian gui che da /etc/envirionment ma quando vado a fare una verifica ritrovo sempre il mio ip, c'è per quase qualcosa che bypassa le impostazioni? Grazie mille

  • Kabuka Jexx

    Per quanto riguarda il terminale linux ci sono tre tipologie di consulta della documentazione:
    >> info uname
    >> man uname
    >> uname — help

  • Azarilh

    Ma quindi, ipoteticamente, se hackero qualcosa (un attacco grosso) poi dovrei distruggere il computer anche se ho mascherato il MAC?

  • Joker

    io guardo ste cose perché così ora ho 9 anni ma quando sarò grande sogno di diventare il miglior inventore di computer dell'universo

  • Pavlo ukr

    Lo posso usare per far passare tutte le richieste d'entrata e uscita del mio server, e di conseguenza rendere non rintracciabile la posizione di essi?

  • Federico Ravenda

    Ho una domanda forse banale: il proxy serve ad oscurare il mio indirizzo ip pubblico; questo significa che se navigo dopo aver configurato un proxy "mostro" un indirizzo ip di facciata? E inoltre, se l'area di provenienza del proxy sono, per esempio, gli stati uniti, allora posso navigare in tutti quesi siti statunitensi che rendono i contenuti disponibili solo agli utenti del loro paese?

  • lorenzo iacenda

    ho un problema, perché quando vado a mettere un proxy trovato su hidemyass e ricarico la pagina web del mio ip è uguale al proxy http che ho messo? Faccio questa domanda perché nel video cambia, non è uguale

  • PierPaolo Caoduro

    Ciao video perfetto ho sentito che si usa un proxy per comprare dei vestiti rarissimi avendo più probabilità di comprarli il giorno del drop ne sapete qualcosa?

  • stefano pillai

    mpag questo video deve essere famoso, ragazzi comunque siete bravissimi, non lo fa nessuno quell oche fate voi, GRAZIE ! ! ! ! !

Leave a Reply

Your email address will not be published. Required fields are marked *