Tuesday, March 27, 2007

Proxy Issue

WHAT IS PROXIES? WHY PROXY?

Your browser normally sends requests for pages directly to websites.
Along with this request, it sends out your IP address (= a unique
identifier of your computer on the Internet, which can be tracked back
to your country, city ISP and finally to you.)
The only way to hide your true IP from the site you are visiting is to
have a "middleman", a computer that will take your requests
from you and forward them to the website on your behalf; then it will
receive the pages and pictures from the site and forward them to you.
This way, the website will only know the IP address of that computer,
called (=proxyserver). You can configure your browser in such way that it
will use a proxyserver when it goes to the Internet.

The following items are visible to a website you visit:
-IP-address
-your ISP
-hostname
-your system
-your country/city
-URL of the privious site you visited
-color-settings
-your webbrowser
There are anonymous and transparent (=non-anonymous) proxies. In both
cases the contact to the website is made through a proxy and will the IP
of the proxy be logged by the website. But a transparent proxy also sends
information regarding your true IP address to the website (In the so called
Client-IP field)
Socks proxies are the best, general-purpose proxies. They are non-caching
(There won't be a record of the Web pages you fetched while connecting
through one, except on your own machine) it also means they're slow.
(They're located on port 1080)
The proxy machine's admin can easily learn that you connected to it after
perusing his logs, so a proxy doesn't actually conceal you; it just adds
a layer between you and whatever you're contacting on the Net.
If your proxy is located in a country unlikely to cooperate with requests
for their logs from foreign officials, or a country where your mother tongue
is rarely spoken, it can be quite an effective layer of protection.
______________________________________________________________

HOW TO FIND THE RIGHT PROXY

1) Checking your own IP-address:

-Go to: "Start" >"Run".
-Typ in the appeared field: winipcfg (for Windows NT or 2000: ipconfig)
-Select in the screen: "PPP-adapter"
You'll now see your IP-address and your adapteraddress (MAC-address). The MAC-address
probably is unique too.

2) Finding the right proxy

-Free proxy-lists at:
-www.samair.ru/proxy (1000 proxys with country + anonymity)
-www.atomintersoft.com/products/alive-proxy/proxy-list (1000 proxys with anonymity)
-www.proxymatrix.com/index.html (with country + anonymity)
-www.stayinvisible.com/index.pl (20 pages of proxys. with country + anonymity)

-You now have to check for yourself wether or nog a proxy works:
Go online and put the IP-address in a testscreen:
-www.atomintersoft.com/products/alive-proxy/online-procy-checker
-checkyourproxy.com
Now it is tested for speed and anonimity.

I DON'T WANT TO TEST THESE PROXIES 1 BY 1. I WANT TO HAVE A WHOLE LIST
TESTED WHILE I EAT MY SANDWICH:

1) Go to:www.checker.freeproxy.ru/checker
2) Here you can COPY and PASTE the contents of a whole page of proxies into the
online proxy checker screen.

-If your proxy is working and not too slow: (they're always slower than a normal connection)
When you've found a reasonable proxy you open your browser and use it for your connection

1) Using Internet Explorer:
-Click on your Explorer using the right-mousebutton, choose option: "Properties".
And then click: Connections.
-Doubleclick your internet-connection (in the screen) and make sure you get the following settings:
a) Use a proxyserver for this connection enable
b) Bypass proxy server for local addresses disable
c) Put the "address" and "portnumber" of your proxy in the fields
d) Click "Advanced" and make sure the proxy is put into the top 3 screens
e) Use the same proxy for all protocols disable

2) Using Opera:
-Open Opera and click "File" >"Preferences" >"Network" >"Proxy servers":
a) Enable the options HTTP, HTTPS and FTP. In the fields following these options
you type your proxy (Click ok and apply)
b) Click "File" >"Quick preferences". enable option "Enable proxy servers"

3) Testing your proxys by visiting 1 or more of the following testpages:-

-wiebenik.beveiligingsadvies.nl (Also shows you the contents of your C: drive, if you have
cookies, javascript, VBS-script enabled and some more)
-security.symantec.com/ssc/home.asp (Also tests your network, netbios, active
trojan horses)
-scan.sygatetech.com (Also tests your firewall, if your computer is
vulnerable to trojan horses, TCP/UDP)
-www.lfd.niedersachsen.de Choose option: "Service" and then "PC-Selbsttest"
(Also tests if you have java, javascript, VBS and activeX enabled)
-www.leader.ru/secure/who.html (Spills the fact that you went through
1 or more proxyservers, unless you used a HI (High Anonymity) proxy. And a lot more
-privacy.net/analyze (Traces your IP back to your host, if you have
java and cookies enabled and some more)

WINGATES
A wingate is a proxy server software package that allows you to share
a single (or multiple) Internet connections with an entire computer network
through port 23 (telnet connection)
Due to poorly configured wingates and Administrator's incompetence, there's
a lot of wingates that will let anyone on the Internet connect through
them. A more secure WinGate-like software is SyGate.
The logs on most wingates are cleared usually every 48 hours.
One can find wingates by using a wingate scanner. You can scan whole subnets
for wingates. IP's in third world countries, the Middle East (except Israel)
Africa and on the @home network are mostly poorly configured and usually
have a few open wingates on their networks. A good wingate scanner is called: wGateScan v2.2

CHAINING PROXYS

Proxy chaining is merely connecting to more than one proxy and
then to your intended destination. Your can use as many proxy servers as
you want. The more you have, the more anonymous you will be.
It is possible that you still can be tracked even if you chain proxies.
Chaining just makes it a lot harder to track someone. To make it even harder,
its best to use foreign proxies because if someone wanted to trace you,
they would need to get logs of your use of each proxy from each proxy
administrator. This could take quite a while or even never at all if one
of the proxy's or all for that matter, belong to an admin in a country
that isn't too fond of the country you are located in. The longer it takes
for the authorities to subpoena the logs of your usage of a single proxy
from that proxy's administrator, the more chance that the other proxies
that you used in the chain will have their logs deleted by the time
anyone gets to the server administrators of those proxies. If there's an
occasion where you need to be extremely anonymous, it's best to use at
least 5 or 6 proxies in a chain.

3 WAYS OF CHAINING PROXYS:-

A) HTTP CHAINING (=chaining a proxy server in your browser's address bar) Example:
http://proxy.server1.com/-_-http://proxy.server2.com/-_-http://www.destination.com
Another way to use proxys in your address bar is by adding the proxy IP or domain then
the Port number. Example:
http://proxy.server1.com:80/http://proxy.server2.com:80/http://www.destination.com

B) BROWSER CHAINING
Go to: Internet Explorer >"Connections", then go to the first "Settings" button (not LAN Settings).
In the field "Address:" you put:
(First proxy address)(:)(port number)(space)(Second proxy address)(:)(port number)(etcetera)
You put the port number of the last proxy inside the "Port" field. Example:
"Address:" 213,234.124.23:80 121.172.148.23:80 143.134.54.67 "Port:" 80

C) CHAINING WINGATES USING TELNET
First bring up the DOS prompt. Typ: telnet, then your wingate and finally the port number.
(Since telnet's default port is 23 and all wingates run on port 23, the port number is not
necessary). Example:
C:\WINDOWS>telnet 61.133.119.130 23
Once you're connected to the wingate it should look like this:
Wingate>
Now you would type your next wingate and port number in:
Wingate> 203.207.173.166 23
Finally typ your destination:
Wingate>destination.com

______________________________________________________________

Labels:

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home