Well, a transparent proxy is basically something which fools the client (who connect to the server running the
transparent proxy) into believing that they are directly connected to the web server (and not through a proxy.).
OK, I
am sorry, that is not exactly the correct way to describe it. ;-) Read on for a better description.
Well, a transparent proxy works in the following manner: It listens to a specific
port (like the HTTP port i.e. 80) for
any connections. As soon as it gets a request for a connection (in this case a HTTP request for a file.) then it redirects
the user
i.e. connection to another port on the same machine. Now this new port to which the connection is
transferred is actually running a Proxy.
So, in affect what happens is, the client i.e. the user who connects to the server where the transparent proxy installed,
assumes that it is directly connected and is communicating with the HTTP daemon. However, the truth of the matter
is that all communication is being carried out via the proxy running on the server. All this would be clearer when you
see the below picture of what happens:
Client --------> Server(Port 80 or HTTP)
The rules of the ipchains transfers client to the port where the proxy is running. So, now the communication takes
place in the following manner:
Transparent proxies with Squid By Ankit fadia hackingtruths.box.sk Proxy Servers
Client --------> Server(Port of Proxy) --------> Server (Port 80 or HTTP)
So, the connection to Port 80 is indirect, however the client has little idea about it.
Now, that you know the working of transparent proxies, let us get down to configuring them on your machine.
However, before we get down to the actual process, you need to check whether this is possible on you system or not.
Simply look for the file:
/proct/net/ip_fwchains
If you have this file, then well and good, else you will have to recompile your Kernel. However, I am sure almost
98% of you would definitely have this file.
NOTE: In this case, we will be transferring all connections from Port 80 to Port 8080 where Squid runs by default.
You could always transfer connections to any proxy port of your choice, by changing the revelant parts. I have taken
up Squid, as it is the most common one.
Firstly, in order to transfer all connections from Port 80 to Port 8080, add the following lines to your startup script, so
that they are executed each time you boot up.
Note: The server IP is xxx.xx.xx.xx
ipchains -A input -p TCP -d 127.0.0.1/32 www-j ACCEPT
ipchains -A input -p TCP -d xxx.xx.xx.xx/32 www-j ACCEPT
ipchains -A input -p TCP -d 0/0 www-j REDIRECT 8080
NOTE: If you are using ipfwadm, then add the following lines to the startup script:
ipfwadm -I -a-a -P tcp-s any/0 -D 127.0.0.1
ipfwadm -I -a-a -P tcp-s any/0 -D xxx.xx.xx.xx
ipfwadm -I -a-a -P tcp-s any/0 -D any/0 80 -r 8080
Once this is done, then configure Squid by following the below process. Please note that you need atleast Squid 2.x
to be able to make use of Transparent Proxies. Anyway, to configure Squid, edit the, /etc/squid/squid.conf file and
make the following changes:
httpd_accel_host virtual
httpd_accel_port 80
httpd_accel_with_proxy on
httpd_accel_uses_host_header on
Then,restart Squid by typing:
/etc/rc.d/init.d/squid.init restart
Linux Users: I also suggest you compile and execute the following C program. It is
simply great and allows you to
configure or control Firewall rules etc. Click Here To Download
Voila, your transparent proxy is configured and running!!! Anyway, have fun and watch out for updated versions of
this manual.
THIS IS PART FORM ANKIT FADIA'S HACKING MANUALS
TRICKS OF ALL KIND OF MOBILE and COMPUTER, ALSO DOWNLOADS LINKS FOR GAMES AND SOFTWARE
Labels
- COMPUTER GAMES (104)
- COMPUTER TRICKS (1)
- COMPUTER UTILITY (6)
- CRACKING TOOLS (2)
- GAME CHEETS (1)
- GAME CRACK LINKS (2)
- GAME SERIAL KEY (5)
- INTERNET TRICKS (2)
- MOBILE TRICKS (2)
- OPERATING SYSTEM (1)
- SOFTWARES FOR PC (2)
- WINDOWS SECREAT (9)
Games By Type
- FIRST PERSON ACTION (5)
- FIRST PERSON SHOOTER (4)
- HORROR (1)
- OPEN WORLD ACTION (2)
- SIMULATION (2)
- STRATERGY (1)
Tuesday, June 2, 2009
|
Subscribe to:
Post Comments (Atom)
About Me
Disclaimer
We DO NOT host or upload any of the files that are available on this site. We merely search on INTERNET and index popular files openly available for anyone. Please Contact Us through E-Mail, if you feel that any Content including any thing on this site are objectionable or violating your copyrights. The objectionable content shall be promptly removed from our Website. If you're member of any anti-piracy, government, corporation or related group or organization, you cannot use this site and view any of site contents. You must leave now.We are not responsible for anything you may download, and we do not support software piracy what-so-ever. In fact we are against it and encourage our surfers to purchase retail copies of any given software link found on the web. We are also against P2P piracy and will give our full support to the aid of any anti-piracy group.Because we don't maintain the files, we cannot fix broken links. If you find a broken link let us know and, if possible, we'll try to find a new link.
0 comments:
Post a Comment