1 00:00:01,290 --> 00:00:02,680 All right, welcome back, everyone. 2 00:00:02,880 --> 00:00:05,670 This is the lecture on proxy teams. 3 00:00:05,690 --> 00:00:17,400 OK, so proxy chain will understand how it is different than when we when we just focus on making our 4 00:00:17,400 --> 00:00:25,660 browser activity anonymous or our complete system activity anonymous. 5 00:00:25,730 --> 00:00:27,310 OK, understand the difference. 6 00:00:27,330 --> 00:00:30,690 There are multiple ways your data go out of your system. 7 00:00:30,690 --> 00:00:37,920 For a normal user, it could be simply, but it's not browser or maybe through e-mail or in case he 8 00:00:37,920 --> 00:00:40,940 might be using any, you know, applications or something. 9 00:00:41,310 --> 00:00:43,620 So maybe Skype application. 10 00:00:43,650 --> 00:00:46,500 So it might be using its own traffic. 11 00:00:46,850 --> 00:00:52,550 In that case, it might not be going through the browser or maybe only certain other kind of application. 12 00:00:52,560 --> 00:00:52,760 Right. 13 00:00:53,490 --> 00:00:54,870 So this all could happen. 14 00:00:55,140 --> 00:00:56,790 What about DCB application? 15 00:00:56,820 --> 00:00:59,190 What about some other YouTube based application? 16 00:00:59,600 --> 00:01:08,530 What what if you want to send any other set of application which is not making use of SCDP, maybe the 17 00:01:08,550 --> 00:01:09,540 DNS request. 18 00:01:09,550 --> 00:01:09,900 Right. 19 00:01:10,350 --> 00:01:16,020 So when you are working as an ethical hacker, you have all sort of stuff. 20 00:01:16,020 --> 00:01:25,510 You know, you are sending DCP scanning requests, DNA or maybe DNS request as well. 21 00:01:25,830 --> 00:01:31,080 It's not for the ethical hacking, but using the UDP based traffic as our request. 22 00:01:31,080 --> 00:01:35,220 ASBA as a part of and map scanning or maybe another part of scanners. 23 00:01:35,280 --> 00:01:36,540 But right. 24 00:01:36,900 --> 00:01:41,940 But let's understand where exactly Occitan sets and why. 25 00:01:41,940 --> 00:01:45,880 Oh, how it is different from the the browser in a way. 26 00:01:46,080 --> 00:01:55,350 So as of now we understand Avatar browser or Thornycroft we can only anonymize or we can only make our 27 00:01:55,350 --> 00:01:58,430 browser activity a private track. 28 00:01:58,980 --> 00:02:04,830 But with proxy tene it goes a bit more beyond, although it makes use of the term network at the end. 29 00:02:05,190 --> 00:02:09,850 But on the same network, it also sent you rest of the traffic as well. 30 00:02:10,260 --> 00:02:17,730 So when you're working as an ethical hacker, it matters that all of your traffic, maybe you are scanning 31 00:02:17,730 --> 00:02:21,350 and all the stuff actually goes to the private network as well. 32 00:02:21,600 --> 00:02:24,070 And that is you can make use of proxy teams. 33 00:02:24,480 --> 00:02:27,860 OK, so in simple nutshell, it's a proxy fight. 34 00:02:27,870 --> 00:02:30,930 Can proxy fight anything usually for proxy? 35 00:02:30,960 --> 00:02:35,420 There are certain sackfuls Occupy, which is basically being available. 36 00:02:36,030 --> 00:02:40,190 So it basically download the PXP and -- through the proxy. 37 00:02:40,270 --> 00:02:45,230 You're all the DCP traffic versus traffic through the proxies itself. 38 00:02:45,500 --> 00:02:47,860 It supports the ISP SOC force. 39 00:02:48,210 --> 00:02:53,900 So for as long that so far is something that you should go for or adopt for as well. 40 00:02:54,330 --> 00:03:01,680 Again, also a proxy fight, as I said, strophic FCP, a pretty request and map, anything, anything. 41 00:03:01,710 --> 00:03:08,380 And then they will have to make use of it can actually be, you know, can actually be sent through 42 00:03:08,380 --> 00:03:12,420 a proxy team to the entire network and then reaches to the destination. 43 00:03:12,630 --> 00:03:12,950 All right. 44 00:03:13,200 --> 00:03:18,250 So that's all about understanding it and that's all competing. 45 00:03:18,390 --> 00:03:24,270 The idea about proxy change in the next lecture will be installing the proxy chain and launching the 46 00:03:24,270 --> 00:03:34,530 proxy chain by making use of it for accessing certain sites and of course, will run the actual application 47 00:03:34,530 --> 00:03:42,050 like unmap scanners or will be sending the non EDP traffic and the proxy. 48 00:03:42,670 --> 00:03:47,700 So until then, enjoy, enjoy this content and we'll get you in the next one. 49 00:03:47,730 --> 00:03:48,180 Thank you.