3 weeks ago
29 Views

How to Hide Your IP Address having a Proxy Server « Null Byte :: WonderHowTo

Proxies can be quicker to use than a VPN for specific applications, like web browsers or torrent clients. Both services will hide your true IP address, however a VPN is actually slowed down because the item encrypts all data through a VPN network, while a proxy just acts as a middleman for fetching along with returning requests coming from a server on your behalf. When speed is actually needed, go proxy.

A proxy hides your IP address however leaves behind some breadcrumbs, because most proxies have a cache system that will will log browser history, passwords, along with different data. There are some encryption options with proxies, however they aren’t very helpful since there is actually still a log service. however these breadcrumbs are what makes proxies fast.

Since proxy servers cache webpages, they can increase the speed of downloading documents along with websites because the proxy server does a local cache of previously downloaded requests coming from different clients first. In comparison, a VPN is actually a direct tunnel to the endpoint with encryption, which definitely slows things down.

Don’s Miss: How to Evade Detection Using Proxychains

Private Internet Access (PIA) is actually a favorite along with well-trusted VPN service starting at $3.33/month, one which we’ve covered before within the past for securing IoT along with media devices. A VPN subscription to them also includes a PIA proxy service. Using their proxy for file-sharing allows you to download media like disk images securely without needing to route all of your traffic through a VPN, so you can still watch Netflix or browse the internet while you torrent.

In that will tutorial, we will create an application-specific tunnel for downloading your content, allowing you to continue using the internet for different tasks or games uninterrupted along with without extended ping times. Like mentioned before, proxy servers are faster because they do not come with encryption. PIA’s proxy service does offer encryption if that will’s something you’re interested in.

Step 1: Download & Install µTorrent

µTorrent is actually a torrent client, which means the item uses a peer-to-peer network to download files. While that will is actually a great, fast way to download open-source software like Kali Linux disk images, the item also isn’t always wise to download hacking tools coming from your home IP address. For those wishing to download Tor or Kali Linux without ending up on a government list, a proxy can help protect your privacy.

that will setup will work for many different torrent clients, however to keep that will tutorial as cross-platform as possible, we will be using µTorrent. You can download the software coming from its website, along with the item should auto-select the client based on the operating system you are using. Go ahead along with press the “Get µTorrent” button (the free one, obviously), along with the download will start automatically.

After downloading, the item’s time to install. When we double-click the installer, a configuration wizard will pop up. We want to hit the “Next” button within the bottom-right corner. After that will, the end-user license agreement will spring up, along with so we want to “Accept” that will.

the item wants to install a Yahoo extension on your default web browser, along with we don’t want that will. Go ahead along with “Decline” that will, along with then the final installation steps will occur automatically.

Don’t Miss: How to Make a Proxy Server in Python

Step 2: Configure µTorrent

First, let’s open up µTorrent. We want to click the “Options” tab along with then select “Preferences” coming from the drop-down menu. The Preferences window will pop up, along with next, we will want to click on the “Connection” tab. Once there, we will see the Proxy Server field, as seen below. the item’s asking for proxy credentials, so we’ll need to create those first.

Step 3: Generate Proxy Credentials

Let’s open up a web browser along with log into our PIA VPN client. After you log in, scroll down until you see the PPTP/L2TP/SOCKS Username along with Password section. These username along with password pairs are generated for use with PPTP, L2TP, along with Proxy SOCKS connections. Write down or save the username along with password for the next step.

Step 4: Configure the Proxy Server

Return to µTorrent’s “Connection” settings, along with change the Proxy Server type to “Socks5.” Check the boxes next to “Authentication” along with “Use proxy for peer-to-peer connections,” then grab that will username along with password coming from PIA client page along with stick them within the Username along with Password fields under the Proxy Server section.

Next, for the Proxy field, we want to input the address “nl.privateinternetaccess.com,” along with for the Port number, we want to change the item to port 1080. We are using that will port because PIA servers assign that will port to their proxy servers. Press “Apply,” along with then “OK.”

Step 5: Torrent a File via Proxy

today, let’s download our target torrent file. In that will case, our target will be the free live image of our favorite pentesting OS, Kali Linux. Torrenting files is actually often quicker than downloading the same file coming from a web browser, as a peer-to-peer download isn’t limited by how far the websites download server is actually.

You can navigate to the torrent file on the Kali downloads page. We are going to select the “Kali 64-bit” style using the “Torrent” download. A file having a name like “kali-linux-2017.2-amd64.torrent” should download.

Don’t Miss: Set Up SoftEther VPN on Windows to Keep Your Data Secure

Go ahead along with either save or open the TORRENT file with the µTorrent client. Then, right-click on the “kali-linux-20xx-.x-xxxxx” along with select “Force Start” to prioritize along with initialize the torrent. If the torrent does not start, then the proxy settings were not correct or your subscription had expired. If the item succeeds, you should see something like the screen below.

Here we see a successful connection as a file downloads.

Once the connection levels off, your download should work normally. As soon as the item’s finished, you’ll have downloaded your first piece of data via proxy.

Proxies Have Even More Beneficial Uses

within the end, we connected our torrent client to redirect our internet traffic to Private Internet Access’s proxy servers. that will ensured that will our private information is actually concealed while torrenting. Since we did that will in an application-specific way, we are also able to use that will configuration for web browsers along with different application that will allow proxy redirection settings.

Depending on where the proxy is actually, we can also get around geolocation filters to access regionally-restricted websites. that will useful ability can fight censorship along with be used to get around many types of network restrictions.

Some organizations, like school along with governments, use proxies in their network for almost the exact opposite reason. They configure proxies to actually filter blacklisted websites, like porn or social media, so people within the organization do their work along with without getting distracted.

In that will example, a client sends a request to the proxy server to fetch a file or webpage. When the proxy server receives the data, the item will interpret the request along with decide if that will data will be sent back, depending on the settings along with rules applied to the proxy server, such as blocking pornography. The client will then receive the file or webpage they requested, provided the item passed the proxy filter.

Again, since proxy servers also cache webpages, if an organization’s network has hundreds or thousands of users searching for the same thing, the item cuts down the search index times on the network along with reduces upstream demand.

Have any questions? Comment below or hit me up on Twitter @Nitroux2.

Don’t Miss: Chain VPNs for Complete Anonymity

Cover photo by Kody/Null Byte; Screenshots by Nitrous/Null Byte

Leave a Comment

Your email address will not be published. Required fields are marked *

fifteen + 20 =