1 00:00:00,150 --> 00:00:01,400 All right, welcome back, everyone. 2 00:00:01,650 --> 00:00:07,980 This lecture and this lecture will be installing the proxy chain and will be getting started with it. 3 00:00:08,070 --> 00:00:08,450 All right. 4 00:00:08,730 --> 00:00:10,890 So without taking much time, let's get started. 5 00:00:11,760 --> 00:00:17,950 So let's first go to the candy machine and I'm here. 6 00:00:19,140 --> 00:00:21,490 OK, we have over time and I'm ready. 7 00:00:21,870 --> 00:00:26,270 Now, the first thing that you need to understand is do we already have a star installed? 8 00:00:26,280 --> 00:00:29,100 So if you don't have to install it, what? 9 00:00:29,550 --> 00:00:32,070 So you should have done really with it. 10 00:00:32,350 --> 00:00:34,940 You can verify if the door is working. 11 00:00:34,950 --> 00:00:41,700 So for that, make use of service star status. 12 00:00:43,430 --> 00:00:44,580 OK, so it's working. 13 00:00:44,790 --> 00:00:52,140 In case it's not, then you can make use of pseudo service door start and if you see it's got stuck 14 00:00:52,140 --> 00:00:57,230 with something, you can restart it by pseudo service dogs to restock. 15 00:00:57,310 --> 00:00:58,930 OK, so that's how it's going to work. 16 00:00:59,250 --> 00:01:06,120 Make sure the door network is ready because you remember everything runs over the Internet, so we should 17 00:01:06,120 --> 00:01:07,380 have the dog ready with it. 18 00:01:07,740 --> 00:01:16,290 Once it is done, just go to a file and because I'm working as a user, so go to our access to a file 19 00:01:16,440 --> 00:01:17,520 and open it. 20 00:01:17,940 --> 00:01:18,370 OK. 21 00:01:18,390 --> 00:01:19,940 So we have to edit the file. 22 00:01:20,220 --> 00:01:25,820 So and Lennix, anything that you want to just like Windows, you want to change some settings. 23 00:01:25,830 --> 00:01:27,450 You have a wonderful you like. 24 00:01:27,750 --> 00:01:31,910 But in case of Linux you have a configuration file. 25 00:01:31,920 --> 00:01:33,500 These are nothing but the text file. 26 00:01:33,780 --> 00:01:38,970 You just have to edit the text file, you know, and then the setting changes. 27 00:01:38,970 --> 00:01:39,210 Right. 28 00:01:39,550 --> 00:01:45,210 So go to it and ABC and then Dreux genes. 29 00:01:46,830 --> 00:01:49,590 So you see the proxy genes. 30 00:01:52,270 --> 00:01:54,020 Strings config file, right? 31 00:01:54,460 --> 00:01:55,630 So that's done right? 32 00:01:55,840 --> 00:01:58,430 So this is the proxy configuration. 33 00:01:58,450 --> 00:02:00,260 What do you do, the changes in here? 34 00:02:00,670 --> 00:02:02,110 This will be impacted. 35 00:02:02,350 --> 00:02:06,870 OK, so and Paroxetine, there are three kind of changes. 36 00:02:06,880 --> 00:02:14,340 We'll talk about one, two of them, the dynamic gene, gene and the gene switching. 37 00:02:14,410 --> 00:02:18,840 As you seen something, the hash is disabled. 38 00:02:19,290 --> 00:02:21,070 OK, just like encoding. 39 00:02:21,130 --> 00:02:21,360 Right. 40 00:02:21,700 --> 00:02:25,550 And this thing, which is without hash, it is enabled. 41 00:02:25,570 --> 00:02:32,710 OK, so you see the structure is in it, but it means that it will be done off all the peers. 42 00:02:32,710 --> 00:02:34,030 All the notes are ready. 43 00:02:34,150 --> 00:02:39,240 If if it's not, then the chain won't be formed and the traffic won't be going to it. 44 00:02:39,730 --> 00:02:46,270 But in case of dynamic change, even if one beer, if even if one node is already available, it can 45 00:02:46,270 --> 00:02:47,150 forward the traffic. 46 00:02:47,160 --> 00:02:47,460 Correct. 47 00:02:47,860 --> 00:02:51,550 So it's always good to start with the note. 48 00:02:51,560 --> 00:02:59,450 So you just have to remove the hash and it's getting you see, it's now done right away. 49 00:03:00,670 --> 00:03:03,930 Now, at the end, you should also verify two more things. 50 00:03:03,940 --> 00:03:06,040 First is the DNA test. 51 00:03:07,090 --> 00:03:15,430 Delete ensures that even if you change your location, you take their DNS request from that location. 52 00:03:15,430 --> 00:03:25,090 Only what just imagine why it is important is because even if you take Tanit work or multiple VPN service 53 00:03:25,090 --> 00:03:33,160 provider, if you take if your business request goes from your postal system, it's easy to understand, 54 00:03:33,160 --> 00:03:39,400 OK, you are going through the traffic, you are reaching to the destination to multiple hop, but your 55 00:03:39,400 --> 00:03:41,270 DNS request done locally. 56 00:03:41,590 --> 00:03:49,900 So in that case, anybody or you know, it's not that secure enough because your DNS privacy is still 57 00:03:50,140 --> 00:03:51,110 not protected. 58 00:03:51,820 --> 00:03:58,300 So that proxy chain, you can ensure that the whenever you test, whenever if your traffic goes through 59 00:03:58,300 --> 00:04:00,700 multiple, let's say, exit from Dutch. 60 00:04:01,060 --> 00:04:05,430 So your DNS request should also be going through the Dutch itself. 61 00:04:05,770 --> 00:04:06,080 Right. 62 00:04:06,100 --> 00:04:12,220 So that way you can even not only security after DP traffic, web traffic, but you even secure your 63 00:04:12,220 --> 00:04:17,690 DNS request because that would be done through the same done on the same path itself. 64 00:04:18,070 --> 00:04:24,970 And the problem, this problem happen when you even though you go through the chain to the tunnel, 65 00:04:25,270 --> 00:04:28,650 but you take the business request, Lukie, that's going to be missed. 66 00:04:29,470 --> 00:04:29,820 All right. 67 00:04:29,840 --> 00:04:32,150 So I'll tell you how to do this as well. 68 00:04:32,590 --> 00:04:41,960 So once that is done, you can go down and you can see this is already an evil proxy DNS request, not 69 00:04:41,980 --> 00:04:43,270 only for the in the state. 70 00:04:43,360 --> 00:04:46,950 It is on the neighbor because it has been done right. 71 00:04:47,770 --> 00:04:54,130 And you can also add some another sock sock is the proxy's broke protocol basically. 72 00:04:54,130 --> 00:04:56,470 So sock four and five are one. 73 00:04:57,340 --> 00:04:58,790 You can add some more as well. 74 00:04:58,810 --> 00:05:05,740 I can make use of sock five and then one twenty seven, which is your local IP address. 75 00:05:07,660 --> 00:05:12,480 One twenty seven zero one zero one nine zero five zero. 76 00:05:12,530 --> 00:05:13,720 That's going to be looking for. 77 00:05:14,080 --> 00:05:19,220 You can do control X it would say save modify data. 78 00:05:19,240 --> 00:05:19,900 You can type. 79 00:05:19,900 --> 00:05:20,380 Yes. 80 00:05:20,830 --> 00:05:22,960 And do you want to keep the same. 81 00:05:22,960 --> 00:05:31,210 Finally you hit enter, it will be seen and usually if somebody modified the button they just, you 82 00:05:31,210 --> 00:05:33,880 know, make a copy of it and then modify it. 83 00:05:34,210 --> 00:05:38,410 But in this case, because this is the we are not going to make multiple devices. 84 00:05:38,410 --> 00:05:42,700 So it's OK to press, enter or proxy setup. 85 00:05:42,700 --> 00:05:46,180 It's already now let's test it now. 86 00:05:46,510 --> 00:05:48,880 Tested the existing browser first. 87 00:05:48,910 --> 00:05:52,090 OK, so let's say I do the proxy genes. 88 00:05:54,490 --> 00:06:00,860 Proxy teams, if you want to, let's say axis browser, maybe. 89 00:06:01,180 --> 00:06:08,620 So what you can do is let's say I want to make use of Firefox, maybe Google dot com 90 00:06:11,440 --> 00:06:16,770 type pointer and OK, looks. 91 00:06:16,780 --> 00:06:17,560 Oh, my God. 92 00:06:17,980 --> 00:06:18,760 You see this? 93 00:06:19,030 --> 00:06:21,450 This is why. 94 00:06:21,460 --> 00:06:29,980 OK, I missed something in the in the configuration file because it says that the the this is this protocol, 95 00:06:29,980 --> 00:06:32,690 this sucks protocol seems to be invalid. 96 00:06:33,100 --> 00:06:38,500 So that has to be some correction, some manual correction for sure. 97 00:06:38,890 --> 00:06:39,970 So you can go there. 98 00:06:40,000 --> 00:06:44,230 You have to be very, very cautious. 99 00:06:45,490 --> 00:06:52,130 OK, and this is the problem because I didn't mention five or six, five of them. 100 00:06:52,380 --> 00:06:52,800 All right. 101 00:06:52,810 --> 00:07:01,570 So pretty sometime it becomes difficult if you don't notice or don't recognize your error. 102 00:07:02,170 --> 00:07:08,740 OK, because I realize this error is something which is very clear if you doesn't have a number. 103 00:07:09,970 --> 00:07:17,080 So I can again go back to my mind the same query proxy change Firefox Google dot com hit enter and you 104 00:07:17,080 --> 00:07:19,200 see this Google opens up. 105 00:07:19,660 --> 00:07:26,170 Similarly, if you want to open, maybe Bing, of course there's not much difference. 106 00:07:26,440 --> 00:07:33,260 But yeah, just to show you a restart, this is maybe because it has been open somewhere else so that 107 00:07:33,280 --> 00:07:34,120 that could happen. 108 00:07:34,630 --> 00:07:38,110 Similarly, you can also make use of map. 109 00:07:38,470 --> 00:07:46,000 So I'll show you how that if you are into ethical hacking, then you should really understand making 110 00:07:46,000 --> 00:07:48,220 use of any map scanner for scanning. 111 00:07:48,220 --> 00:07:55,510 Let's say your destination is open for certain ports or what are the IP addresses of life or is it talking? 112 00:07:55,750 --> 00:08:01,690 Is the port eighty four HTP or steeps or DNS is open or not. 113 00:08:02,560 --> 00:08:10,540 You can get to know all the stuff that and map and map is super powerful, robust scanner and freely 114 00:08:10,540 --> 00:08:12,670 available as part of open source. 115 00:08:13,750 --> 00:08:19,500 What you can do is you can make use of some command with and map so that your activity will be hidden. 116 00:08:20,050 --> 00:08:23,050 So let's say I do the map. 117 00:08:23,800 --> 00:08:28,270 Just make sure you have a appended ended with proxy trees and map. 118 00:08:28,510 --> 00:08:34,030 I let me scan it with both eighty maybe so minus P and it wasn't as well. 119 00:08:34,210 --> 00:08:38,530 And let me, let me scan two and map itself. 120 00:08:41,310 --> 00:08:43,890 You see it, it's it was pretty quick, right? 121 00:08:44,220 --> 00:08:47,310 It has it has made use of dynamic change. 122 00:08:47,410 --> 00:08:53,490 You can see over here because we have to see this static thing and it has successfully scanned it. 123 00:08:53,820 --> 00:09:01,260 And it looks like the board eppy is open on scan, me and my dog. 124 00:09:01,470 --> 00:09:01,850 All right. 125 00:09:02,220 --> 00:09:05,010 So you get the details, you get the idea, right. 126 00:09:05,490 --> 00:09:07,250 So this is how it really works. 127 00:09:07,260 --> 00:09:09,450 I hope this was really helpful to you. 128 00:09:09,690 --> 00:09:17,400 And this is the one of the most I mean, Bronx's gene people make use of proxy's, gene, on a very 129 00:09:17,400 --> 00:09:18,540 limited way. 130 00:09:18,540 --> 00:09:25,530 But there are many, many good stuff, like a pro that you can make use of that to talk about it in 131 00:09:25,550 --> 00:09:30,180 advance session as well, but then keep making use of it. 132 00:09:30,450 --> 00:09:35,340 And I hope you like the rest of the rest of the series as well. 133 00:09:35,700 --> 00:09:36,390 Thank you so much. 134 00:09:36,420 --> 00:09:37,410 We'll get to the next one.