Vous êtes sur la page 1sur 79

Guru Gobind Sing Indraprastha University

A discussion around Online


Proxy IP Anonymity, tools and
Practices

Copyright 2017, GGSIPU, M.Tech(W) - 5th Semester


Team Members

Vivek Vashistha (00316406515)


Priyanka Vasudev (06016414815)
Harmanpreet Kaur (01116414814)
Nupur Pasricha (00216406515)
Yogesh Kumar (00116406515)
Question that might often come into
your mind
Am I safe while browsing this website?
Is somebody tracking my activities?
How these websites showing me the
advertisement of products and services which
I explored recently?
Can I access the restricted sites?
Can I access some private site from public
network?
How can I censor the content?
The answer is IP Proxy
So what is IP Proxy?

IP Proxy is the way to connect to some other site indirectly by


sending and receiving the request to intermediate server
(known as Proxy Server)
What is IP Proxy? (cont..)
Proxy is hardware or software
Enable indirect access to other networks.
Used in organisations, universities
Act as a gateway
Act as a Cache Server
Share a connection to others
Advantages
Caching
Reduce Latency and Network Traffic
Requires Cache invalidation strategy
Google Web use proxy to show cached pages for better
response
Load Balancing
A proxy can be used in a reverse direction to balance
the load amongst a set of of identical servers.
Have to be careful about Proxy Server failure. Because it
acting as a single point of communication.
Advantages
Security
Hide internal clients from external network
Blocking of dangerous URLs
Filter dangerous content
Check consistency of retrieved content
Eliminates need for transport layer routing between networks.
Transport layer packet dont need to be routed because the entire
request must be regenerated.Hence prevents Transport Layer
exploits(source routing, fragmentation, DoS attack).
Single point of access, control and logging.
Terminates the TCP connection before relaying to the target host.
Both outgoing and incoming connections are terminated prevents a
hacker from hijacking a stale connection on a service that is being
proxied.
Proxy Server
Part of an overall Firewall Strategy
Sits between Local and External Network
Requests are translated from your IP address
to Proxy IP address
How Overall Proxy System Works?
Types of Proxies

Open
Proxies
Here Web server dont know real identity of Client

Reverse
Proxies
Here Client dont know anything about original host
Open Proxy

A forward proxy server that is accessible by any internet


user.
There are hundreds of thousands of proxies on Internet
An Anonymous Proxy allows users to conceal their IP
addresses.
Real anonymity and extensive internet security might not
be achieved by this measure alone as website operators
can use client-side scripts to determine the browsers real
IP address and the open proxy may be keeping logs of all
connections.
Most VPN work on Open Proxy
Open Proxy
Advantages:-
Surfing Anonymously, make it harder to reveal original identity
Disadvantages:-
If Proxy server is not properly configured, it will lead to malware attacks
Proxy can be abuse for illegal activities (drugs trading, gambling, extortion,
violence)
Since Proxy can bypass firewall and bandwidth restrictions if not properly
configured, an organisation can face disastrous effect.
How to Test for access from Open Proxy
ProxyCheck is one of the tool to detect client whether he/she using Open
Proxy
Configure IRC networks with strict usage policies automatically test client
system.
Mail server may be configured to automatically send sender mail for open
proxies using ProxyCheck
Reverse Proxy
Reverse Proxy (or surrogate) is a proxy server that appears to clients to be
an ordinary server.
Reverse Proxy forward requests to one or more ordinary servers which
handle he request.
The response from the proxy server is returned as if it came directly from
the original server, leaving the client no knowledge of the origin servers.
Advantages:-
Encryption/SSL acceleration
Load Balancing
Caching
Compression
Spoon feeding (for slow clients)
Security
Applications of Proxy
Monitoring and Filtering
Content control software
Filtering of encrypted data
Bypassing filters and censorship
Logging and Eavesdropping
Improving Performance
By caching
Load Balancing
Translation
Localize content for different markets
Accessing Services Anonymously
Access control - organisations can control access to internet. For e.g. in university campus need
login details to access internet.
QA geo targeted advertising -advertisers can test their ads on different geo location without
actually going/setting up physically there.
Security
Various Implementation of Proxies
Web Proxy (HTTP, HTTPS, FTP, etc)
Socks Proxy (similar to web proxy)
Transparent Proxy (client and server are not aware of proxy server). Work at Network layer
CGI Web Proxy - helpful when you dont have admin privilege of your system or network to setup proxy
settings.
Suffix Proxy (e.g. ipu.ac.in.myproxy.com),
used to by pass web filter
Rarely used
Tor Onion Proxy Software* -
Provides good online anonymity.
Very difficult to trace Internet activity including web visit, posting comments, IM, etc
Encryption multiple times through successive Tor relay. (Onion routing)
I2P Anonymous Proxy (better than Tor Onion Routing)
Layer - 3- Proxy or NAT (Network Address Translation)
DNS Proxy
Circuit Level Proxy
Popular Hardware and Software Proxies

Software Proxies
Ms. ISA Server, Squid, Kerio WinRoute, 1st Up Net
Server, CC Proxy, Windows ICS, CProxy, WinGate
Hide My IP, Http Tunnel, L2P Anonymous Network,
Proxy Cap, TOR, etc
Hardware Proxies
Cisco PIX
Blue Coat
Cyberoam
Alacer
The Best way to secure your self is to obscure
yourself. Thank You

Vivek Vashistha
TOPICS COVERED BY:
PRIYANKA VASUDEV
PROXY IP
A proxy or proxy server is basically another computer which
serves as a hub through which internet requests are processed.

By connecting through one of these servers, your computer


sends your requests to the proxy server which then processes
your request and returns what you were wanting.
How to download research papers
Basically to download the research papers, we generally use the
website IEEE, but in some cases the papers abstract is only shown.
So to download the full paper, we can get it through the sci.hub.cc
website.

WHAT IS SCI.HUB.CC

Sci-Hub is a website with over 62 million academic papers and


articles available for direct download.

It bypasses publisher paywalls by allowing access through


educational institution proxies. Sci-Hub stores papers in its own
repository, and additionally the papers downloaded by Sci-Hub are
also stored in Library Genesis (LibGen).
The topic of my term paper is Information retrieval using multimedia
management system
Here we can copy
paste our link fro
the IEEE website.
After opening the link, we can easily download the paper in the form of
pdf.
How to upload a project on Amazon using proxy address

Account on AWS

Click on Service and Create


and configuring AWS EC2
Instance

Create a key pair, download it


and store in a secure place.

Installing Web deploy package


on EC2 Instance
Now open your Project and
Publish code.

Server and Destination URL

Site Name => Default Web Site


User Name => Administrator
Password=> xxxxx

Click on Validation Connection

Configuration ,Release and


then publish
TOPICS COVERED BY: HARMANPREET
KAUR

Why websites are blocked?


What is VPN?
Various ways to access blocked websites.
Tool Explained: HOTSPOT SHIELD VPN
WHY WEBSITES ARE BLOCKED?
Geo Restrictions / Location Errors - You are
trying to purchase and item service or you are
trying to stream your favorite movie. Then you
get an error stating that your geographic
location does not allow you to either access
the site at hand or watch your favorite show.
VPN allow you to geo-spoof your location in
order to access services unfairly denied to you
based on your geographical location
Cont..
Official Restrictions - Most of the schools,
colleges or offices keep the social networking
sites blocked so that the students or
employees cannot open it.
Virtual Private Network
VPNs assign new IP address to systems connected to them. As
you connect to a virtual network, youll be assigned a
second IP address, which spoofs your real one.
Your IP address is your digital fingerprint which reveals
information like your location (including City, State and Zip
Code), your internet service provider, what browser you are
using, and much more information.
Using a VPN service will help you hide your IP when you go
online and your information will be private and secure. A VPN
service will give you an anonymous IP and help your browse
the web privately. VPN service will protect you from Hackers,
Snoops, and companies following all your digital footsteps.
Advantages of VPN are (i) It protect you against hackers when
using a public WiFi hotspot (ii)Geo Spoof your location.
Ways to access blocked website.
1. Proxy websites- Use proxy websites or programs
to access websites blocked in your
area. OpenBlockedWebsite.com and proxysite.co
m are two such websites. What you have to do is,
just copy your site URL paste it in any proxify
website then choose your proxy location and visit
the site. So instead of directly requesting the
page, you send a request to the proxy website
first and then it forward your request to blocked
website.
2. Browser Extensions - Browser extensions are
useful third-party plugins that can increase
the functionality of your browser.

3. VPN softwares - There are lots of VPNs


software out there. Such as TunnelBear ,
StrongVPN , FreeVPN , Hidester.All of
which offer an app that allows you to easily
connect to the VPN and switch between
different countries using a dropdown box.
I have taken an example of SONGS.PK
website.
Accessing blocked website using proxy
website (proxysite.com)
Now I am able to access website
FEATURES

One click activation


Easy to use
Unlimited and completely Free
To add the Hotspot Shield extension:

Visit the Chrome Web Store.


Search for "Hotspot Shield".
Click ADD TO CHROME.
Click Add to confirm and install the extension.
The Hotspot Shield icon will appear at the
top-right of your Chrome browser.
Presently it is in off state. Google showing my
current browsing location INDIA
Songs.pk website is not accessible.
Once it is ON, It has changed my
browsing location
Able to access blocked website
My IP address and other information retrieved before
proxy application-using WhatIsMyIp.net website.
My IP address and other information retrieved after proxy
application-using WhatIsMyIp.net website.
TOPICS COVERED BY:
NUPUR PASRICHA

Proxies
Tool Explained: SafeIP
Features
Tool interface & tabs
Connecting to Proxy IP
PROXIES
Proxies can make you anonymous, making the
connection more secure and private.
But proxy software is not just about some
software that routes your internet connection
through an external server.
Let us take a look at one of the free proxy
software available for Windows PC- Safe IP
SAFEIP
SafeIP is a freeware tool intended to hide your
computers IP address and replace it with a
fake one.
The tool also offers Cookies, Referrer, Browser
ID, Wi-Fi and DNS protection and also keeps
you protected from malicious websites.
It is a perfect tool to hide your online identity
and browse with confidence.
FEATURES OF SAFEIP
Anonymous: Protect your online identity by hiding
your IP from websites, email, games, and more.
Secure: Encrypt all your Internet traffic with a
private proxy, either browsing at home or on public
WiFi hotspots.
Fast: Choose the anonymous IP location closest to
you for the fastest connection speeds.
Free: SafeIP can be used completely free for
unlimited use, without advertisements and never
expires.
TOOL INTERFACE- DASHBOARD
SETTINGS TAB
SETTINGS
Ad blocking and Malware Protection : these features can speed up your web
browsing by blocking advertisements that slow your web browsing.
Malware, scamware, phishing, and spam sites can be blocked as well using
the Malware blocking feature, potentially further speeding up your web
browsing.
Referring URL Protection: Every time to click a link to a new web page, your
browser tells the new website the last site you visited. Exposing your
Referring URL can be a security risk or a way for websites to track your
online activity. To prevent your web browser from exposing your Referring
URL, enable the Referring URL Protection feature on the Settings window.
Browser ID Protection: "Browser Fingerprinting" technology is a new way for
Internet companies to track your online activity without using cookies or
your IP address. Each time you visit a website, your browser sends
something called a "User Agent" to the website, which reveals your
operating system and version, browser and version, and other plugins,
installed fonts, extensions, installed software, and settings of your
computer. This data can be compiled to form a unique Browser Fingerprint,
linked to you and your computer. Clearing your cookies and hiding your IP
address is no longer enough to stop sites from tracking your Browser
Fingerprint.
SETTINGS (CONTINUED)
WiFi Protection: When you connect to an Internet, your computer
sends out a unique digital fingerprint. This digital fingerprint can be
easily traced back to your computer or Internet device, allowing your
Internet traffic to be monitored and even pinpoint your location. When
you turn on the WiFi Protection feature, this digital fingerprint, also
known as a MAC address, will be hidden and changes frequently at
random intervals, preventing your Internet activity from being tracked
to your computer.

DNS Privacy: Every time your PC makes a connection to a website, may


it be in a web browser or other application, it must first lookup the IP
of the website it is attempting to connect to. Most Internet users use
the default DNS provided by their ISP. Thus, it is possible for your ISP
to monitor every website you visit and even block or filter access to
certain websites. To protect your connection from DNS monitoring or
ISP filtering, we recommend turning on the DNS Privacy feature in the
Settings tab.
OPTMIZATION TAB
OPTIMZATION TAB EXPLAINED
The Optimizations tab gives you the chance to tell the SafeIP software how to best
configure your Internet proxy settings depending on how you intend to use SafeIP. The
current optimizations are:
Anonymous Web Surfing - The most common and default recommended setting.
Select this setting if you mostly go online for normal web surfing, with little Internet
application usage.
Fast Content Streaming - Recommended if you run SafeIP while going to streaming
content sites such as YouTube, TV, movie, news, or Internet radio.
Mass or Bulk Mailing - Recommended if you plan to send mailing lists, newsletters,
or other bulk mail. This optimization is useful if your ISP blocks bulk mail or ports
associated with sending mail.
Download and Torrent - If you plan to use SafeIP to protect your IP while
downloading torrents or other related intensive downloads, this optimization is
needed.
Speed Boost: When the Speed Boost with VPN setting is enabled, SafeIP will use a
different method to make a secure connection while changing your IP address. This
method is called VPN and is faster than normal proxies for web surfing,
downloading, and streaming.
LANGUAGE TAB
CONNECTING TO PROXY IP
CHANGE IP OPTION
BACK TO ORIGINAL IP
CHOICE OF LOCATION
CHANGING SETTINGS
CONNECTION AFTER SETTINGS

Vous aimerez peut-être aussi