Dec 13, 2013

hacker to bypass proxy servers

Proxy request chart

this is basic chat among user to proxy and its reverse. You can see clearly now.


Direct raw package and inject package

some companies allow user to use directly either from its proxy server or directed by program to send raw package to the proxy, so that they can go out.

you can see on this video


before you send raw package direct to proxy, you should check the proxy first, as i mentioned before on this [about how proxy works ]. Sending data to proxy by raw format make your connection better, why ?, you find the answer on this section.

pimp the url 


they also can bypass the proxy by encode their url before send it to proxy, so the proxy identify this package as common request. As you know that proxy have ACL to filter some request by their URL.

Using multiple protocol

when you use multiple protocol, they usually just consider the first only. The common method is embedding HTTP protocol into Mail protocol. 

Going to another proxy

by going to other proxy, they will detect that you are not in their authority to filter because you are not in their scope.

Tunneling 

by some tunneling methods that was mentioned before about how to bypass proxy

.

Proxy request chart

this is basic chat among user to proxy and its reverse. You can see clearly now.


Direct raw package and inject package

some companies allow user to use directly either from its proxy server or directed by program to send raw package to the proxy, so that they can go out.

you can see on this video


before you send raw package direct to proxy, you should check the proxy first, as i mentioned before on this [about how proxy works ]. Sending data to proxy by raw format make your connection better, why ?, you find the answer on this section.

pimp the url 


they also can bypass the proxy by encode their url before send it to proxy, so the proxy identify this package as common request. As you know that proxy have ACL to filter some request by their URL.

Using multiple protocol

when you use multiple protocol, they usually just consider the first only. The common method is embedding HTTP protocol into Mail protocol. 

Going to another proxy

by going to other proxy, they will detect that you are not in their authority to filter because you are not in their scope.

Tunneling 

by some tunneling methods that was mentioned before about how to bypass proxy

1 comment:

  1. Pretty good post. I just stumbled upon your blog and wanted to say that I have really enjoyed reading your blog posts. Any way I'll be subscribing to your feed and I hope you post again soon. Big thanks for the useful info. debestevpn

    ReplyDelete