what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 49 of 49 RSS Feed

Files

A Short Tale Of Proxy Leakage
Posted Oct 22, 2020
Authored by David Coomber

A brief write up discussing disclosure of internal IPs and hostnames from Apple bots leveraging Via and X-Forwarded-For headers.

tags | paper
systems | apple
SHA-256 | b673e03e8e1aa51151d99f5859b00763aeba232a9176600740c438ec5fb79def

Related Files

proxychecker.txt
Posted Nov 27, 2006
Authored by b1ma | Site iko94.blogspot.com

HTTP proxy checking utility.

tags | web
SHA-256 | eec08c60dfe292551451ec91226d1e4a99c355b1e7cef9e6bfac347439032c2f
proxy-hidden.txt
Posted Nov 1, 2006
Authored by Richard Braganza

Information on removing hidden field tags in the Paros proxy.

tags | paper
SHA-256 | 7cb48451f4562612b6998e285237507618c6a04a8ecfa79eaebc9871834f6532
proxytest.pl
Posted Apr 29, 2006
Authored by Andrea Purificato | Site rawlab.altervista.org

proxytest.pl is a perl script that reads in a list of proxies from a text file and checks their state.

tags | web, perl
SHA-256 | 6ee7234a27bb8276b190e57089ec9fe6039dd9086a9ef97adaf4240fcfd66ed9
proxychains-3.1.tar.gz
Posted Mar 15, 2006
Authored by netcreature | Site proxychains.sourceforge.net

Proxychains is a command line tool for Linux and Solaris which allows TCP tunneling trough one or multiple (chained) HTTP proxies.

Changes: fixes new DNS resolver.
tags | web, tcp
systems | linux, unix, solaris
SHA-256 | 9a27657fe9f6e17de9e402ba5c60f9954e7e79fb270c1ef242770f3c01d8515a
proxychains-3.0.tar.gz
Posted Mar 8, 2006
Authored by Proxy Labs | Site proxylabs.com

Proxychains is a command line tool for Linux and Solaris which allows TCP tunneling trough one or multiple (chained) HTTP proxies.

Changes: new feature - DNS resolving form behind proxy.
tags | web, tcp
systems | linux, unix, solaris
SHA-256 | e4f00532cc0a2a0a8aa5c8df6c18a330e67b4b467007477dfb13944f2da3f558
proxyscanner-2.0.tar.gz
Posted Jul 21, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Proxy Scanner is a tool that tells you whether or not a proxy server can bounce your connection.

Changes: Can now be compiled on any Unix platform.
SHA-256 | fabe21aa1f3980a895c2d11bb0db9e397210a048532f9c75d549c855484e7445
proxyscanner.zip
Posted Apr 16, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Proxy Scanner for Windows that tells you whether or not a proxy server can bounce your connection.

systems | windows
SHA-256 | b98f049ce072acfc5b48e1d338c10c202e80c660110b64e8c5ff8782eb8a0569
proxyNow2x.txt
Posted Jan 27, 2004
Authored by Peter Winter-Smith | Site elitehaven.net

ProxyNow! versions 2.75 and below are susceptible to both heap memory corruption and stack-based buffer overflows. Exploitation of these vulnerabilities can lead to a denial of service and/or code execution with SYSTEM privileges. Detailed analysis and exploit included.

tags | exploit, denial of service, overflow, vulnerability, code execution
SHA-256 | befbd5bf13e3b6d7dc791bb61f8d8476b36082b54e5da32d7a8aa177d07afba7
proxydoc.txt
Posted Oct 21, 2003
Authored by fris

Proxies by Fris - Documents different uses of proxies, proxy related software, and IP ranges.

tags | paper
SHA-256 | 680c7006ca1f36118af72c2255491223671740387b59e1579136275734c4985d
proxychains-1.8.2.tar.gz
Posted Jun 11, 2003
Authored by Proxy Labs | Site proxylabs.com

Proxychains is a command line tool for Linux and Solaris which allows TCP tunneling trough one or multiple (chained) HTTP proxies.

Changes: Minor bugfixes, improved compilation on FreeBSD, OpenBSD, and Sun Solaris, and addressed some cross platform issues.
tags | web, tcp
systems | linux, unix, solaris
SHA-256 | e919bd37f15dce9b792a32f5385ff70b84c09f6fdc10ce4f15e0b6d7aedad71e
ProxyBypass.pdf
Posted Feb 12, 2003
Authored by flur | Site flurnet.org

Comprehensive paper explaining various ways to get around restrictive web proxies which are used by some restrictive countries and corporations.

tags | paper, web
SHA-256 | 8d9d766cd21a65b57e4c66bdeab1db1cf15172a76f5abf3a8ffb6b63490001ab
proxychains-1.8.tar.gz
Posted Feb 4, 2003
Authored by Net Creature | Site proxychains.sourceforge.net

Proxychains is a command line tool for Linux and Solaris which allows TCP tunneling trough one or multiple (chained) HTTP proxies.

Changes: Support for SOCKS4 and 5 protocols, more options, a proper installation guide, and more.
tags | web, tcp
systems | linux, unix, solaris
SHA-256 | 3001047568c857efbd33c86231094ba5d90d5523e4bb6f8c456c4e8c7fc9153c
proxyscan.c
Posted Nov 17, 2002
Authored by sit0 | Site defcon.one.pl

Multithreaded Proxy Scanner for UNIX v0.7.0. This proxy scanner uses a small PHP script to collect open proxy servers.

tags | tool, scanner, php
systems | unix
SHA-256 | f104e807c621cceb31c16056158d12c795b3dc603408f99872db08030dd301e3
proxychains-0.0.1.tar.gz
Posted Jul 8, 2002
Authored by Net Creature | Site proxychains.sourceforge.net

Proxychains is a command line tool for Linux and Solaris which allows TCP tunneling trough one or multiple (chained) HTTP proxies.

tags | web, tcp
systems | linux, unix, solaris
SHA-256 | 2a96c33a0a19de6d914800a19780c4cf0afe15ce07d6b285cce8f622ff3aa7da
proxy.dos
Posted Aug 2, 2000
Authored by Sectorx | Site xorteam.cjb.net

Many HTTP proxies are vulnerable to a denial of service attack because they do not timeout connections to a remote host, causing the proxy to run out of available sockets and start refusing connections. Tested against Delegate 6.1.13. Exploit code included.

tags | exploit, remote, web, denial of service
SHA-256 | a9552173fc6e379e7810ac0699fb84188c3ccbf628f94952e2b66c5ae4c71603
proxylog.pl
Posted Apr 21, 2000
Authored by Vladimir Lohov

Proxylog.pl logs all IP's of visiors who came to your site using proxy.

tags | web
SHA-256 | ae18aa3f932d9f4de9f0f2f86948f7c276bdc62cb83f701c4152740a1a37b49d
proxyht300b4.zip
Posted Oct 8, 1999

proxyht300b4.zip

SHA-256 | 61fc98e609c1c541322571beb07fe1383d11c9c040e504dabbe11f5d46c951eb
proxy-de.txt
Posted Oct 7, 1999

Proxies/Wingates/SOCKS Firewalls Tutorial (In German). Original by Jatt, translated /uebersetzt by I.RAM.S.

tags | paper
SHA-256 | bb8b163d4cb8e2f941bbe2a4ad83ab2358daa09efbd8396e26418c18f4468442
proxy.txt
Posted Sep 24, 1999

Proxy/WinGate/SOCKS Tutorial (version 1.0) - don't know what a Proxy is? Don't know what a WinGate is? Don't know what a SOCKS firewall is? Want to learn how to increase your anonymity using them? Then read this one.

tags | paper
SHA-256 | b0efb5e99953ae9c9d7abbb4e4ab6e62fe3879ba52e04281e9d5786ff44327c4
proxy.txt
Posted Aug 17, 1999

Intro to using proxy servers, by c1ph3r

tags | paper
SHA-256 | 7aeaaf403b2af818a265f8f1b6d64da868f6172f8b15d42395a169a1088bee94
proxy.doc
Posted Aug 17, 1999
Authored by rhino9

Understanding Proxy Server and Firewall Strategies - NeonSurge

SHA-256 | ce2464920c7f59c9e62b3ead178139c03c5c04383706eaadbc8333f94db86eb2
proxy-2.0.tar.gz
Posted Aug 17, 1999
Authored by Sonny Parlin

proxy 2.0 - Proxy is a C application that when run on a multi-homed host will forward all packets from source, to destination. Where source might be a system on the internet, and destination might be a box on a private network behind a multi-homed linux machine. It's also good for setting up sort of a 'bounce back' connection for poeple trying to attack you. Just run the proxy and point the outgoing connection to your attackers system, and they will end up attacking their own machine. Threaded and runs from inetd.

Changes: Proxy 2.0 is a complete re-write from 1.1 and 1.2, uses select() for I/O, now a filtering proxy.
systems | linux, unix
SHA-256 | b4cf112a431143cb374018baf8101ba681ded42e8661265647c22c56e4213e6f
proxy-1.1.tar.gz
Posted Aug 17, 1999
Authored by Sonny Parlin

proxy 1.1 - Proxy is a C application that when run on a multi-homed host will forward all packets from source, to destination. Where source might be a system on the internet, and destination might be a box on a private network behind a multi-homed linux machine. It's also good for setting up sort of a 'bounce back' connection for poeple trying to attack you. Just run the proxy and point the outgoing connection to your attackers system, and they will end up attacking their own machine. Multi-threaded version.

systems | linux, unix
SHA-256 | a0e0413e7b870db02867d4fcdce2f7ec422c119f408e88cca1754459e69f2ef1
proxy-1.2.tar.gz
Posted Aug 17, 1999
Authored by Sonny Parlin

proxy 1.2 - Proxy is a C application that when run on a multi-homed host will forward all packets from source, to destination. Where source might be a system on the internet, and destination might be a box on a private network behind a multi-homed linux machine. It's also good for setting up sort of a 'bounce back' connection for poeple trying to attack you. Just run the proxy and point the outgoing connection to your attackers system, and they will end up attacking their own machine. Threaded and runs from inetd.

systems | linux, unix
SHA-256 | 21b26b369992a69f8bc647a4eb4efca0b3fb92483b4e4efb5a2c1bc16422f143
Page 2 of 2
Back12Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    14 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    11 Files
  • 8
    Dec 8th
    45 Files
  • 9
    Dec 9th
    9 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close