1 00:00:00,300 --> 00:00:05,640 OK, so now that we have completed the domain name system server, that is a DNA server. 2 00:00:06,030 --> 00:00:08,310 Now let us move on to the proxy server. 3 00:00:09,510 --> 00:00:16,560 A proxy server is basically a type of server that handles its client machine requests by forwarding 4 00:00:16,560 --> 00:00:23,820 them on to other servers, but allowing granular control of the traffic between the local area network 5 00:00:24,060 --> 00:00:26,310 and the Internet domain. 6 00:00:26,310 --> 00:00:27,570 It receives a request. 7 00:00:27,930 --> 00:00:33,930 The proxy server will then connect to the specific server that can fulfill the request for the client 8 00:00:33,930 --> 00:00:38,910 that wanted a proxy server operating at the application layer. 9 00:00:39,960 --> 00:00:44,160 So a proxy server operates at the application layer. 10 00:00:44,490 --> 00:00:46,890 Well, that went far away. 11 00:00:46,960 --> 00:00:52,220 Let me just erase it and go straight and try to draw a straight line this time. 12 00:00:52,680 --> 00:00:53,980 So application layer. 13 00:00:54,000 --> 00:00:55,620 OK, yeah, fine. 14 00:00:55,650 --> 00:00:56,130 That's it. 15 00:00:56,700 --> 00:01:04,450 Sometimes now the proxy server modifies the client request or server response to it or even it handles 16 00:01:04,450 --> 00:01:06,720 the client request itself. 17 00:01:06,720 --> 00:01:09,420 So it modifies the client request. 18 00:01:10,800 --> 00:01:18,630 Now it will actually cache or remember the specific server that would have normally been contacted for 19 00:01:18,630 --> 00:01:19,380 the request. 20 00:01:19,890 --> 00:01:25,650 Now, basically, proxy server helps in limiting the availability of sites that user can access. 21 00:01:25,650 --> 00:01:32,340 For example, let's say this is your machine, this is the proxy server, and you want to communicate 22 00:01:32,340 --> 00:01:33,340 through this server. 23 00:01:33,360 --> 00:01:34,440 Okay, this is a server. 24 00:01:34,560 --> 00:01:38,430 Now, what will proxy server do in this case? 25 00:01:38,430 --> 00:01:47,670 Is it now, instead of forwarding, though, directly to request to this what your machine using the 26 00:01:47,670 --> 00:01:54,750 proxy server does its first, you transfer the request to the proxy server and then the proxy server 27 00:01:54,750 --> 00:01:57,150 transfers the request to the main. 28 00:01:57,150 --> 00:02:04,820 So so it acts as in between that in in case of ethical hacking also proxy. 29 00:02:04,830 --> 00:02:11,970 So plays an important role because in ethical hacking we use a tool called as BOPE suite, which is 30 00:02:11,970 --> 00:02:13,590 actually a proxy modify. 31 00:02:13,640 --> 00:02:14,820 It acts as a proxy. 32 00:02:14,820 --> 00:02:20,580 And instead of sending the request directly to the main server, the box which captures the request 33 00:02:20,580 --> 00:02:26,040 from the client, and then it can modify the request to test the one that is present in the direct server. 34 00:02:26,670 --> 00:02:30,710 Now, make sure that there are three major types of proxy servers. 35 00:02:31,200 --> 00:02:32,970 So the first type is. 36 00:02:34,210 --> 00:02:43,000 OK, so let me use the first type is the proxy server now of a proxy server is usually used to create 37 00:02:43,000 --> 00:02:43,960 a Web cache. 38 00:02:44,470 --> 00:02:47,460 You experience this when you Google a site, your visitor. 39 00:02:47,860 --> 00:02:54,580 Right now, the proxy remembers you and the site not only loads faster, sometimes even that he calls 40 00:02:54,580 --> 00:02:58,620 your personal information by automatically filling in your username. 41 00:02:58,870 --> 00:02:59,800 You can try this. 42 00:02:59,800 --> 00:03:05,320 Lets visit, just visit to Amazon.com or Amazon.com and fill your details and quit. 43 00:03:05,320 --> 00:03:07,840 And after some time, again, try to visit the same site. 44 00:03:08,110 --> 00:03:09,850 The details get autofill. 45 00:03:10,800 --> 00:03:19,650 The next is cashing proxy server, cashing proxy server is basically so it speeds up the network's service 46 00:03:19,650 --> 00:03:24,960 requests by recovering information from a client's earlier request. 47 00:03:25,500 --> 00:03:32,910 Now, caching proxies keep local copies of the resources requested often, which really helps in minimizing 48 00:03:32,910 --> 00:03:38,260 the upstream use of bandwidth these servers and greatly enhance the network performance. 49 00:03:39,060 --> 00:03:43,980 And finally, the last step of the proxy server is reverse proxy server. 50 00:03:45,270 --> 00:03:51,990 Now, I would like to mention one more thing about reverse proxy server is that unlike the forward proxy 51 00:03:51,990 --> 00:03:58,740 server, that is a normal proxy server, a reverse proxy takes requests from the Internet and forwards 52 00:03:58,740 --> 00:04:01,110 them to servers in an internal network. 53 00:04:01,140 --> 00:04:07,740 Whereas the forward proxy we discussed in this lecture takes client requests and then sends them to 54 00:04:07,740 --> 00:04:08,250 Internet. 55 00:04:08,940 --> 00:04:14,500 Earlier I mentioned a tool called as Boops, I guess you must have in the suburbs. 56 00:04:14,510 --> 00:04:18,390 So it acts as a forward proxy as well as a reverse proxy. 57 00:04:18,840 --> 00:04:24,690 Now, if you want to learn more about batsuit, do not forget to check our ethical hacking codes and 58 00:04:24,690 --> 00:04:31,220 bug bounty courses in which you will gain complete knowledge of how to hunt bounties and on rewards. 59 00:04:31,230 --> 00:04:34,380 My students are earning thousands of dollars of rewards. 60 00:04:34,390 --> 00:04:39,750 Even I'm a big bounty hunter, but mostly I do as auditing this current. 61 00:04:39,930 --> 00:04:41,760 It'll pass for two to three years. 62 00:04:42,150 --> 00:04:45,140 But yes, bug bounty hunting is a growing field. 63 00:04:45,150 --> 00:04:46,770 I've done a lot of bounties. 64 00:04:46,770 --> 00:04:51,950 I've owned and helped clients, but yet again, not going far away from the subject. 65 00:04:51,960 --> 00:04:56,970 If you want to know more about proxy servers, how they are used in ethical hacking, do not forget 66 00:04:56,970 --> 00:04:58,080 to check out course. 67 00:04:58,980 --> 00:05:00,560 That's it for a proxy server. 68 00:05:00,840 --> 00:05:02,520 I hope you have a basic idea. 69 00:05:02,520 --> 00:05:06,480 So a proxy server is basically a server which acts as a middleman. 70 00:05:07,140 --> 00:05:13,620 Instead of trying to communicate directly to the main server, you communicate to the main server through 71 00:05:13,620 --> 00:05:14,550 a proxy server. 72 00:05:15,180 --> 00:05:20,600 Now in the next lecture, we are going to talk about encryption devices which are used in the Internet 73 00:05:20,600 --> 00:05:20,730 to.