BlackHatKings: Proxies and VPN Section Posted By: tisocks Post Time: 25th Mar 2020 at 02:51 PM
I’m beginner at proxy traffic stuff and i’m struggling here with Charles Proxy
i’m trying to ‘intercept traffic’ (i dont know if this is the correct term for that). I have a HTTPS page and i want to display the data from the content (inside charles proxy). ALL my https are returning I’m Currenly Using Firefox, also im not setting manually the proxy configs. I know it may seem like a dumb question but i could not figured it out how to solve this.
…I know it has to do with SSL but cant resolve that problem by myself 🙁
It would be great if you could add a filter that would allow the separation or filtering of residential vs. datacenter proxies in GSA proxy scraper. It would also be great if we could drill down on location a bit more. I know country is a filter option now but if you could also offer city / state (for U.S) that would be very useful. Are these requests something that could be added?
I’m the admin of a small Linux server owned by a relative of mine. He’s fairly tech savvy, but more at a level of a power user than an expert. I want to make a handy visual tool for him that would allow to do some simple server tasks: add/remove users and change their passwords; set up/remove websites; set up/remove mailboxes (I’ve decoupled those from system users so it’s a separate task if needed); and perhaps something else as needed.
Most of these things can be done from command line and some require the editing of some config files, but lengthy incantations with a lot of changing parts is just asking for trouble. I’d rather have a handy script.
The trouble is: most of these tasks require superuser permissions. He already has that, so I could make a textmode tool (which requires to be run as root), but a website would be so much nicer.
There’s already an apache webserver in place on port 80, bit running that as root would obviously be a lousy idea. Similarly, I don’t want to store root password anywhere.
So I had the idea of making the website in NodeJS and running the Node process as root, listening only on a specific port which only accepts incoming connections from localhost. Then Apache would be a non-elevated proxy in front of the NodeJS app. In addition, both Apache and NodeJS would ask for a password (taken from the same .htpasswd file).
If you can’t enter the password to Apache, you can’t even get to Node. If you hack Apache (or have access to some local account) you still need the password to get the Node app to cooperate.
Would this be safe enough? Ok, that’s kinda subjective, but considering that I’m more worried about opportunistic hackers from outside than malicious local users, would this be ok? There’s really nothing of much value stored on the server; I don’t expect anyone to do targeted hacking because there’s not much to gain (Wanna see pictures of my kids? You’re welcome…) I consider automated scanners and hackers trying to add to their botnets/db leaks the main threat. Any other suggestions on how to achieve this maybe?
I’m new to cyber security and I need to find a reliable list of proxy servers (preferably socks5) that actually work. I’ve tried https://www.socks-proxy.net/ and http://spys.one/en/socks-proxy-list/ but I haven’t managed to find a working one. Any help is appreciated, thanks
I’m aware you can forward connection from a proxy server like this:
ssh -R 8080:localhost:80 public.example.com
But I’m curious if it’s possible to forward from a free proxy such as:
Seems unlikely to use the ssh option because I wouldn’t have access to the server. If so what would be a practical way?
I am in no way affiliated with them, beyond having an account and sharing the affiliate link I have.
I have a docker container connected to a VPN, but sometimes i need to open a URL on browser for debug.
I cannot run the VPN on my host machine for security reasons, specifically i want to open the URL in my host machine and intercept request with BURP Suite, i already tried some “python proxy servers” from github to start a proxy on my docker machine and connect my host to it, without success.
Someone did something similar?. any ideas?
PD. sorry for my english. 🙂
I created a hotspot on wlp2s0 and connected an android device, whose IP is 10.42.0.62.
I am trying to route my all packets from my wlp2s0 interface to burp proxy which running on 8080 and I also enabled invisible proxy, but still no luck
I am routing packets using this firewall rule
iptables -t nat -A PREROUTING -s 10.42.0.62 -p tcp -j REDIRECT --to-ports 8080
After enabling this rule Internet access on device stops working means rule is working, but burp proxy is not showing any data flow.
Please anybody point out what I am doing wrong, I wasted many hours in this.
Update: I was trying Burp Proxy on PC browser and was playing with proxy settings like Socks5 and resolve dns over Socks5 and then burp proxy stopped working even on PC browser. So I think when I route packets through Burp then it not resolves DNS queries and then my android stucks at DNS requests and there is no flow of TCP packets, that’s why Burp Not showing anything. So, I think main question is how we can resolve DNS queries through Burp Proxy.
I’m curious as to whether you can be infected with malware by using a proxy? I currently process data using
Python but occasionally I encounter recaptcha, so I’m looking to implement proxy support.
The data processing is simply an experimental project. So of course my priority is the state of my computer and so I want to get a better insight of malware via proxies before I establish a connection with one via python, the connection would be made via TCP.
Also I’m not necessarily looking for a in-depth answer as I assume if this is possible there’s multiple scenarios, so just a simple yes/no and brief explanation would be great.