Pages

Showing posts with label Proxy. Show all posts
Showing posts with label Proxy. Show all posts

Monday, February 13, 2012

Online Email Spoofing Using Emkei's Fake Mailer

Email spoofing is email activity in which the sender address and other parts of the email header are altered to appear as though the email originated from a different source.


Emkei's Fake Mailer is a website to send fake emails from anybody to anybody . Emkei is a fake mail server that captures emails as files for acceptance testing. This avoids the excessive configuration of setting up a real mail server and trying to extract mail queue content. There are many free services that allow you to send fake emails, but some of them do not allow sending Links (URL’s) along with the fake email . If you need such service for sending fake emails with hyperlinks , then I would recommend Emkei’s Fake Mailer. This is a useful website which allows you to send fake emails.

Note : Kindly do not misuse it for any other purposes.Your IP address gets saved on there server, So do not misuse this free service.

Friday, January 13, 2012

What is IP Masking? How to use Fake IP address?


What is IP Masking? How to use Fake IP address?

What is Ip Masking?
IP masking is hiding your Original(Dynamic/Static) IP address so that you can not be traced.  IP masking is using Fake IP address for your machine.


For Example, Let us assume your ip address is 173.23.22.212 and your location is xxxx.

Using IP masking, you can make your IP address is 202.102.12.123(fake IP Address) and your location becomes yyyy.

Using Proxy IP Address , you can hide your IP.  Read this article : What is Proxy IP Address?

This can be achieved by the following methods:

So won't i be traced now?  The Answer is yes and No.  It is depending on your anonymity level of your Proxy IP address.

Different Types of Anonymity Levels: 
Transparent Proxy

      This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)

Anonymous Proxy
   This type of proxy server indentifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.

Distorting Proxy
   This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.

High Anonymity Proxy
   This type of proxy server does not identify itself as a proxy server and does not make available the original IP address

From:www.breakthesecurity.com
.

100 percentage working proxy server ip address list


Here is the list of proxy server address. use it and enjoy.

94.125.27.20:8080
93.91.200.146:8080
81.18.116.66:8080
79.125.28.242:3128
72.52.96.9:80
72.52.96.11:80
69.13.229.214:3128
68.96.75.146:9090
64.87.46.57:3128
64.23.156.82:8080
62.142.57.72:8080
61.79.87.93:3128
61.6.163.30:8080
61.244.235.34:3128
61.156.25.222:8080
58.215.78.157:808
58.17.71.121:8080
41.190.16.17:8080
222.77.69.210:3128
217.197.121.188:8080
216.27.81.163:8080
216.185.4.200:8080
213.192.246.133:80
213.192.246.133:80
213.192.246.130:80
213.192.246.130:80
213.151.33.58:3128
213.151.033.058:3128
213.109.130.80:54321
212.158.160.96:80
212.118.224.151:80
212.118.224.151:80
212.118.224.150:80
212.118.224.150:80
212.118.224.148:80
211.138.124.232:80
211.138.124.232:80
211.138.124.217:80
211.138.124.213:80
211.138.124.212:80
211.138.124.209:80
211.138.124.200:80
211.138.124.199:80
211.138.124.199:80
211.138.124.180:80
211.138.124.179:80
211.138.124.178:80
211.138.124.174:80
211.138.124.173:80
211.138.124.170:80
211.138.124.169:80
211.138.124.167:80
210.212.55.194:3128
210.187.51.43:8080
210.125.51.41:80
210.107.100.251:8080
209.203.19.2:8080
208.92.249.118:80
208.115.60.146:8080
208.100.40.46:80
208.100.40.46:80
208.100.40.43:80
208.100.40.42:80
207.135.129.5:8080
207.135.129.5:8080
206.196.111.110:80
205.213.195.70:8080
203.139.145.2:3128
202.201.34.101:3128
202.169.226.208:8080
202.162.192.232:8080
202.149.25.43:8080
202.143.146.205:8080
202.115.12.162:808
201.76.211.246:8080
201.20.18.165:3128
200.57.88.164:80
200.36.104.230:8080
200.36.104.230:8080
200.101.82.4:8088
199.3.183.242:8088
196.30.6.186:80
196.29.161.85:8080
196.29.161.84:8080
196.29.161.84:80
196.29.161.82:80
196.29.161.81:80
190.202.124.18:3128
190.141.4.5:8080
190.128.169.122:3128
190.120.10.71:3128
189.72.251.166:8080
189.61.196.10:3128
189.45.245.126:3128
189.17.118.10:3128
189.114.58.242:3128
189.11.211.237:3128
188.59.252.190:80
188.165.205.62:80
187.87.203.209:3128
187.45.232.176:8080
187.45.232.176:8000
187.45.213.100:3128
187.115.162.6:3128
187.115.162.6:3128
184.73.50.88:8118
184.73.131.27:80
184.73.120.223:80
184.73.114.189:8080
184.73.114.189:3128
184.72.9.242:8080
184.72.9.242:8000
184.72.9.242:80
184.72.9.242:443
184.72.9.242:3128
184.106.242.128:80
175.106.17.229:8080
174.143.202.39:80
174.143.168.38:8081
174.142.40.86:3128
174.142.40.84:3128
173.203.78.165:8080
173.203.78.165:3128
168.216.38.209:8080
164.78.252.24:80
164.78.252.24:80
164.078.252.110:80
164.078.252.025:80
125.95.189.82:8080
125.21.227.206:80
122.228.202.236:3128
122.184.133.210:8080
122.183.136.59:80
121.30.255.38:8080
120.50.57.234:3128
119.167.219.78:80
119.167.219.078:80
119.110.97.28:3128
119.110.97.28:3128
118.98.212.242:3128
118.98.160.99:80
118.98.160.99:3128
118.97.224.2:8080
118.97.224.2:8080
118.97.224.2:80
118.97.224.2:3128
118.97.169.173:8080
118.69.127.34:3128
117.40.29.89:80
111.1.32.93:80
111.1.32.92:80
111.1.32.91:80
111.1.32.8:80
111.1.32.7:80
111.1.32.72:80
111.1.32.71:80
111.1.32.69:80
111.1.32.61:80
111.1.32.59:80
111.1.32.4:80
111.1.32.47:80
111.1.32.45:80
111.1.32.44:80
111.1.32.19:80
111.1.32.15:80
110.164.66.98:3128
087.224.133.108:8080
082.206.129.160:3128
061.079.087.093:3128
058.056.108.114:80
From : www.breakthesecurity.com

How to Use Proxy IP address ?-Change the Ip address

Hi friends, i give a list of proxy servers about 100.  But i forget to tell how it will be useful ,how to use it. In this post, i will explain how to use the proxy server.

What is the Use of The Proxy?
Hide your IP.  Browse the Internet anonymously.  



Get the List of Proxy from here:

The above list is old one.  Get the fresh proxy from here:
http://www.samair.ru/

How to Use?
Mozilla is the famous browser. So i will explain how to use the proxy servers in Mozilla.

Open Mozilla FireFox.
Select Tools from menu bar(or simply press ALT+T)
Click the Options
Small window Will Open.
Navigate to Advanced tab
Click Settings.
Now select the Manual Proxy Configuration Radio Button.
Paste the one of the Ip address of Proxy server and set the Port as defined in the list.
For Eg:
Let's take this proxy 
058.056.108.114:80
 Here ip address is  058.056.108.114
Port no is :80 
That's all click ok.
Now to check the whether your ip address is changed or not, visit "www.whatismyipaddress.com".

If you like my post, you can help me by :
Ask your friends to visit this site.
Post this link in Social Networks .
Comment here.

Screen Shot for reference:
Proxy+Server.JPG
Mozilla Settings


Proxy+Server2.JPG
Manual Proxy configuration

How the Proxy servers working ? How it hides our IP Address.

You know that Proxy Servers is able to hide your IP address.   But you may not know what is the process of Server and How it hides the IP address.  This Post will explain it in details.

When we visit website using Proxy Server ,the request is send to Proxy server first.  Then from Proxy server the request will be send to the original Server.    So  The Sever assumes  that  request come from IP address of Proxy server.


Thus a proxy server hides our identity by acting as an intermediary between us and the web server that we are accessing. Suppose we break into a server using a proxy server thinking that we are anonymous. But what if owner of web server starts enquiring about the clients connecting to it using the proxy server  and it is possible that owners of proxy server might  reveal our identity. This means we cant actually rely on proxy servers for being anonymous online.

THE ONION ROUTING (TOR):
 Here comes the concept of THE ONION ROUTING (TOR) into picture. By using this , the client traffic is supposed to be passed from three different servers or nodes before reaching to actual web server. It may randomly take any path through any three nodes. 



Lets consider it has taken path shown by green arrows. Now

* Node 1 knows only actual origin(client) but not actual destinantion(web server).
*Node 5 neither knows actual origin nor actual destinantion.
*Node 9 knows actual destination but not actual origin.

Thus no one exactly knows which client is accessing which web server. So it is highly anonymous.


From:www.breakthesecurity.com