Hacklog Volume 1 Anonymity: it security & Ethical Hacking Handbook


partially blocked by websites and services, and offer a fair, general compromise



Download 2,32 Mb.
Pdf ko'rish
bet9/57
Sana01.01.2022
Hajmi2,32 Mb.
#289651
1   ...   5   6   7   8   9   10   11   12   ...   57
Bog'liq
Hacklog Volume 1 Anonymity IT Security Ethical Hacking Handbook


partially blocked by websites and services, and offer a fair, general compromise
in terms of anonymity.
Through Proxy Scrapers
Proxy Scrapers are software programs designed to scrape, or collect proxies
over  the  web,  in  order  to  obtain  the  latest  proxies,  faster  and  with  no  efforts.
Once again, we suggest you to use any search engine; we found some for you,


hoping it can be helpful:

Net Ghost

GatherProxy Scraper

Proxy Harvester

Holy SEO Proxy Scraper
Beware using those programs. Almost all are poorly programmed or, worse,
they may contain  harmful code for  your Operative System  (Proxy Scrapers  are
not always designed for fair purposes, and you make your bed...). The best thing
you  can  do,  then,  is  to  make  your  own  scraper,  using  a  programming  language
and being very, very patient.
Through Premium Lists
Premium  Lists  are  sites  or  newsletters/mailing  lists  containing  an  index  of
proxies  not  publicly  shared  yet.  Such  lists  are  mostly  paid  or  reserved  to  elite
groups. Actually, there are very few public services offering paid proxy lists, and
the last remaining ones are not that exclusive, after all:

Hidemyass
(around 24€/lifetime)

Premium Proxy Switcher
(around 9€/month)

ProxySolutions
(around 18€/month)

SharedProxies
(around 8€/10 proxyes)

Coolproxies
(around 10€/month)
2.4.2.3 How to use Proxies
On the whole Operating System
At this point, every user should be able to connect to a proxy, with more or
less difficulties, according to the Operating System in use and its version.
In  example:  on  Windows  (Figure  6)  you  can  set  a  proxy  for  the  entire


computer following this path: Control Panel -> Internet options -> Connections
->  LAN  settings  ->  Proxy  Server,  while  you  can  try  different  methods  at  the
same  time  on  Windows  8  (but  it’s  quite  confusing).  Once  you  reached  the
location, you can enter the proxy address and port into the relevant fields.
Figure 6: using a proxy in the Windows OS environment
Fortunately,  the  graphical  environments  of  GNU/Linux  (Figure  7)  make
things simpler: on Debian with GNOME 3, you can go to Settings -> Network -
> Network Proxies.


Figure 7: using a proxy in the Debian environment with Unity
To close this little chapter, we are mentioning the Apple operating system: in
macOS  (Figure  8)  you  can  reach  the  option  through  System  Preferences  ->
Network -> Advanced -> Proxy. Here you can also specify the different service
types to filter and assign each one the related authentication data (in the case of
SOCKS5).
Figure 8: using a proxy in the OSX/macOS environment
Once again, you can run the same process on Linux command line, using a
text editor (nano) and editing the file you can find in /etc/environment:
$ su
$ nano /etc/environment
As stated previously, regarding the graphical configuration, we will compile
the file pasting the following lines:
http_proxy="http://myproxy.server.com:8080/"
https_proxy="http://myproxy.server.com:8080/"
ftp_proxy="http://myproxy.server.com:8080/"
no_proxy="localhost,127.0.0.1,localaddress,.localdomain.com"
Please keep in mind, however, that some internal programs (such as APT for
Debian/Ubuntu-base distros) will bypass that reading
[8]
.
Using programs


Some  software,  such  as  sharing,  chat,  and  other  programs,  allow  the  final
user  to  use  internal  proxy  configurations.  The  reasons  may  vary  (enterprise
grade,  university,  and  other  types  of  proxies)  and  this  allows  to  use  a  proxy  to
anonymize  incoming  and  outgoing  connections  as  well.  In  order  to  know
whether a program provides proxy functionalities or not, please see the official
documentation.
Proxychains
The proxychains
[9]
software is one of the best for using proxies in a targeted
way;  perhaps  it  is  the  best  proxifier  currently  available.  Unfortunately,  its
development  halted  in  2013:  the  good  news  is  that  a  fork  has  been  introduced,

Download 2,32 Mb.

Do'stlaringiz bilan baham:
1   ...   5   6   7   8   9   10   11   12   ...   57




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©www.hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish