Scanning proxies are a brand new technique, which focus on two
different features - blind TCP port scanning and firewall bypassing.
Scanning proxies rely heavily on proxy usage. The principal idea behind scanning proxies is to prevent bounce attacks. This has helped administrators contain exposure to similar vulnerabilities around the world. Scanning proxies are completely new and usable.
Scanning proxies depend on the use of private or public proxies. Though the entire mechanism is simple, it is a powerful scanning method without sending even a single packet to the target host or network from the true source.
Connectivity and Features
By Scanning these proxies it connects to the standard server, by sending GET petitions. This is specified as web page to fetch URL pointing to the port and target IP.
After sending the command to the scanning proxy server, if the proxy connects to non-standard HTTP port and communicates with unauthenticated source, it tries connecting on target to port 22.
This is a standard old fashion from a proxy point of view. If the port is open, the target can send ACK/SYN back. The server, in an attempt to fulfill the request, acts as proxy or gateway, while receiving invalid response from upstream server.
Proxy Security
Secure TCP scanning occurs either with Condon technique or proxy chaining. With this, the attacker uses private or public proxies to hide real connection source.
Every hop included in chain enhances throughput, latency and attacker security. This helps them decide the number of hops used depending on the target type. The theory on using the technique for proxy scanning is pretty straightforward.
As soon as the attacker forms the chain, every node knows only about the forthcoming and previous node, not knowing its use as part of the chain. In such situations, scanning proxies offer best and effective solutions.
Scanning proxies rely heavily on proxy usage. The principal idea behind scanning proxies is to prevent bounce attacks. This has helped administrators contain exposure to similar vulnerabilities around the world. Scanning proxies are completely new and usable.
Scanning proxies depend on the use of private or public proxies. Though the entire mechanism is simple, it is a powerful scanning method without sending even a single packet to the target host or network from the true source.
Connectivity and Features
By Scanning these proxies it connects to the standard server, by sending GET petitions. This is specified as web page to fetch URL pointing to the port and target IP.
After sending the command to the scanning proxy server, if the proxy connects to non-standard HTTP port and communicates with unauthenticated source, it tries connecting on target to port 22.
This is a standard old fashion from a proxy point of view. If the port is open, the target can send ACK/SYN back. The server, in an attempt to fulfill the request, acts as proxy or gateway, while receiving invalid response from upstream server.
Proxy Security
Secure TCP scanning occurs either with Condon technique or proxy chaining. With this, the attacker uses private or public proxies to hide real connection source.
Every hop included in chain enhances throughput, latency and attacker security. This helps them decide the number of hops used depending on the target type. The theory on using the technique for proxy scanning is pretty straightforward.
As soon as the attacker forms the chain, every node knows only about the forthcoming and previous node, not knowing its use as part of the chain. In such situations, scanning proxies offer best and effective solutions.
For more information, visit squidproxies.com. They offer information and products on obtaining a private proxy, including buying an Anonymous Proxy.
Article Source:
http://EzineArticles.com/?expert=Kathy_Mercado
No comments:
Post a Comment