Follow @Easy_hack
Monday, December 22

Understand How Proxy Servers Are Used in Launching an Attack

Preparing proxy servers is the last step in the EH scanning methodology. A proxy server is
a computer that acts as an intermediary between the hacker and the target computer.
Using a proxy server can allow a hacker to become anonymous on the network. The hacker
first makes a connection to the proxy server and then requests a connection to the target computer
via the existing connection to the proxy. Essentially, the proxy requests access to the target
computer not the hacker’s computer. This lets a hacker surf the web anonymously or
otherwise hide their attack.

How Do Anonymizers Work?

Anonymizers are services that attempt to make web surfing anonymous by utilizing a website
that acts as a proxy server for the web client. The first anonymizer software tool was developed
by Anonymizer.com; it was created in 1997 by Lance Cottrell. The anonymizer removes
all the identifying information from a user’s computers while the user surfs the Internet,
thereby ensuring the privacy of the user.
Netcraft is a website that periodically polls web servers to determine the operating system
version and the web-server software version. Netcraft can provide useful information the
hacker can use in identifying vulnerabilities in the web server software. In addition, Netcraft
has an anti-phishing toolbar and web-server verification tool you can use to make sure you’re
using the actual web server rather than a spoofed web server.
HTTrack arranges the original site’s relative link structure. You open a page of the mirrored
website in your browser, and then you can browse the site from link to link as if you were
viewing it online. HTTrack can also update an existing mirrored site and resume interrupted
downloads.

Hacking Tools

SocksChain is a tool that gives a hacker the ability to attack through a chain of proxy servers.
The main purpose of doing this is to hide the hacker’s real IP address and therefore minimize
the chance of detection. When a hacker works through several proxy servers in series, it’s much
harder to locate the hacker. Tracking the attacker’s IP address through the logs of several proxy
servers is complex and tedious work. If one of the proxy servers’ log files is lost or incomplete,
the chain is broken, and the hacker’s IP address remains anonymous.

Hope u Liked this post.
Comment Down if u have any Query.
Related Article 

Share ur Interest to friends and Community

Powered by Blogger.

Popular Post

- Copyright © EasyHack -Metrominimalist- Powered by Blogger - Designed by Secret -