Lecture
Proxy security is a question that everyone who tries to find and write to the search engines the request “Fresh proxies” should think about, and in this short article I will explain why. By the way, if someone does not know what a proxy is and how they differ, you are welcome here “What is a proxy”
Initially, I want to divide the audience into two categories:
I have long talk on all sorts of forums. And quite often I heard all sorts of not very pleasant stories about the use of public proxies. Many probably have heard that some proxies create traps - honeypot sniff the traffic passing through them and intercept the information. I’m probably not going to retell these horror stories, but I’ll suggest that you watch the video report of one of the participants in the hacker conference Defcon Chema Alonso, in which he tells how the botnet was created using a proxy server for them and his team.
Very interesting information that the author presented with humor. Report in English.
And they came up with a brilliant idea - to create a public proxy server distributing Javascript botnet. The guys quickly cooked up a proxy and installed the necessary software, sniffers and all that.
Now I had to make it so that everyone would know about this proxy. On one of the sites providing fresh proxy lists, the IP address of their proxy server was posted. And so, as all sites providing fresh proxy lists tyryat material from each other, this IP for a couple of days got on a bunch of similar sites and traffic poured on them, sometimes not interesting, and sometimes the sniffer caught quite interesting logs about which the author video with humor tells.
As for paid proxies, I can not say anything. This should be checked separately for each service. People, proxy security is a very serious topic, and I think having watched this video, every time you use a public proxy, you will well think whether to enter your usernames and passwords from social networks and mail services, is it really worthwhile to behave badly.
If you had a negative experience of use, share with us, write in comments.
Comments
To leave a comment
Information security, Malicious, and information security
Terms: Information security, Malicious, and information security