2014년 3월 16일 일요일

Why Attackers use proxy servers?

[Why attackers use proxy servers?]
  1. To hide the source IP address so that an attacker can hack without any legal corollary.
  2. To mask the actual source of the attack by impersonating a fake source address of the proxy.
  3. To remotely access intranets and other website resources that are normally off limits.
  4. To interrupt all the requests sent by an attacker and transmit them to a third destination, hence victims will only be able to identify the proxy server address.
  5. Attackers chain multiple proxy server to avoid detection.

[Proxy chaining tools]
  • Proxy workbench : Proxy workbench is a proxy server that displays the data passing through it in real time, allows you to drill into particular TCP/IP connections, view their history, save the data to a file, and view the socket connection diagram. The socket connection diagram is an animated graphical history of all of the events that took place on the socket connection. It is able to handle HTTPS(secure sockets)and POP3 natively.
        URL : http://proxyworkbench.com

  • Proxifier : Proxifier allows network applications that do not support working through proxy server to operate through a SOCKS or HTTPS proxy and chains. It allows you to surf websites that are restricted or blocked by your government, organization, etc. by bypassing the firewalls rules.
        URL : http://www.proxifier.com

  • Proxy switcher : Proxy switcher allows you to surf anonymously on the Internet without disclosing your IP address. It also helps you yo access various sites that have been blocked in the organization. It avoids all sorts of limitations imposed by sites.
        URL : http://www.proxyswitcher.com

  • SocksChain : SocksChain is a program that allows you to work with any Internet service through a chin of SOCKS or HTTP proxies to hide the ral IP address. It can function as a usual SOCKS-server that transmits queries through a chain of proxies. It can be used with client programs that do not support the SOCKS protocol, but work with on TCP-connection, such as TELNET, HTTP, IRC, etc. It hides your IP from being displayed in the server's log or mail headers.
        URL : http://ufasoft.com

  • TOR(The Onion Routing) : TOR is software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. You can use TOR to prevent websites from tracking you on the Internet. You can also connect to news sites and instant messaging services when these sites are blocked by your network administrator. TOR makes it difficult to trace your Internet activity as it conceals a user's location or usage.
        URL : https://www.torproject.org

댓글 없음:

댓글 쓰기