02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Using Proxies 121<br />

Proxy servers are typically used to maintain anonymity, which helps scanners. A vigilant<br />

network administrator who is checking logs and systems will see the agent or proxy, but<br />

not the actual scanning party behind the proxy.<br />

Setting up a proxy is easy and can be accomplished a number of ways, depending on the<br />

situation itself.<br />

Setting a Web Browser to Use a Proxy<br />

Use the following steps to set your browser to use a proxy:<br />

1. Log on to www.whatismyip.com and write down your current IP address. Or you can<br />

use ipconfig to gain this information.<br />

2. Enter proxies in your favorite search engine to find a site providing a list of publicly<br />

available proxies. Each proxy in the list consists of an IP address and a port.<br />

3. Randomly select a proxy from the list and write down its IP address and port number.<br />

4. In your browser, find the proxy settings and manually configure the browser to use the<br />

information from step 3.<br />

5. Check out www.whatismyip.com again to see how the proxy now hides your actual IP<br />

address.<br />

You can configure proxies in other web browsers the same way.<br />

Choose a proxy based outside the United States to best simulate what an<br />

advanced attacker would do. Proxies based in the United States can have<br />

their records subpoenaed, which is why a malicious party typically would<br />

refrain from using them.<br />

Other proxy options are available to you as well, that may be useful in certain<br />

situations. One important one is the Onion Router (Tor). Tor is an older technology,<br />

but it is still effective and widely used. To better understand this technology, read the<br />

following description from the Tor Project’s website (https://www.torproject.org/about/<br />

overview.html.en):<br />

Tor is a network of virtual tunnels that allows people and groups to<br />

improve their privacy and security on the Internet. It also enables<br />

software developers to create new communication tools with built-in<br />

privacy features. Tor provides the foundation for a range of applications<br />

that allow organizations and individuals to share information over public<br />

networks without compromising their privacy.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!