- Private: How to Join the Infosec Community
- Private: [ Hacker Night School ] :: Excellent, well-written hacking lessons: HackingTutorials.org
- Private: Finding and Using Browser-saved Passwords: Another video from Starry Sky
- Private: Hacking for a digital marketer
- [ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a VPN ]
- [ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a Proxy Server ]
- [ Hacker Night School ] Being Anonymous: VPNs
- [ Hacker Night School ] :: TOR Browser Search Engines
- Private: [ Bug Bounty ] :: Hack Facebook for Fun and Profit!
- [ Hacker Night School ] :: Learn Python in 43 Minutes (if you’re a really fast learner)
- [ Hacker Night School ] :: Hacking Practice: the Command Injection ISO
- [ Hacker Night School ] :: Got a foothold on a Windows target? Now enable Remote Desktop.
- [ Hacker Night School ] :: [ Using Git ]
- [ Hacker Night School ] :: Tsuki CTF Pwns Access on HackTheBox
- [ Hacker Night School ] :: Exploiting sudo: Altering your PATH
- [ Hacker Night School ] :: WEP Cracking Basics in Kali
- [ Hacker Night School ] :: CSRF
- [ Hacker Night School ] :: A Memory Forensics with Volatility Writeup
- Private: [ Hacker Night School ] :: Adding the Kali Tools to Ubuntu
- Private: [ Hacker Night School ] :: Kali Linux Metapackages (All Tools or Subsets)
- Private: [ Hacker Night School ] :: Commando VM: a Windows Hacking “Distro”
- Private: [ Hacker Night School ] :: VulnHub Walk-Throughs: This is how you learn to pwn
- Private: [ Hacker Night School ] :: Metasploitable 3: A Hackable Windows VM
- Private: [ Hacker Night School ] :: Command VM: a Windows Red-Team VM from FireEye
- [ Hacker Night School ] :: WebGoat, An OWASP Hacking Practice Website
- Private: [ Hacker Night School ] :: Python for Malware Analysis
- Private: [ Hacker Night School ] :: Encoding and Decoding: Base64, ASCII, etc.
- [ Hacker Night School ] :: Using the Greenbone Vulnerability Scanner
- The KNOB Attack: Does this exploit from 2018 still work?
- [ Hacker Night School ] :: The Holy Unblocker
- [ Hacker Night School ] :: the POODLE attack, featuring TLS Downgrade
- [ Hacker Night School ] :: The Illustrated TLS Connection
Starry Sky and Glenn Norman discuss using a VPN or proxy server
https://youtu.be/7CCuE5oobMQ
Now take the Quiz:
1. What of these statements is the most accurate description of a proxy.
a. Hides your IP address
b. Makes it look like you’re coming from a different IP address
c. Makes your web traffic (ports 80 and 443) look like it’s coming from a different IP address
d. Makes ALL your network traffic look like it’s coming from a different IP address
2. What exactly does a VPN do?
a. Hides your IP address
b. Makes it look like you’re coming from a different IP address
c. Makes your web traffic (ports 80 and 443) look like it’s coming from a different IP address
d. Makes ALL your network traffic look like it’s coming from a different IP address
3. Will a proxy hide your IP if you are:
Yes No Streaming video
Yes No Downloading a torrent
Yes No Using instant messaging
Yes No Watching Flash
4. Will a VPN hide your IP if you are:
Yes No Streaming video
Yes No Downloading a torrent
Yes No Using instant messaging
Yes No Watching Flash
5. Suppose you have been given a penetration testing contract to test the security of a company’s web applications. Which type of service would give you sufficient privacy, usually at no cost, and sometimes with superior speed?
a. Proxy server
b. VPN
c. macchanger
d. Burp Suite
6. Your next pen testing contract has you scanning your client’s internal and external networks and computer systems. You’ll be using lots of non-web tools like nmap and hping3. Which type of service will give you the level of concealment you’ll need when using any networking protocol?
a. Proxy server
b. VPN server
c. Working from the nearby Starbucks
d. Kali Linux
7. How should you check to see if your proxy or VPN is working?
a. Check your external IP address after starting the VPN
b. Check your external IP address before starting the VPN
c. Both, and make sure they’re the same!
d. Both, and make sure they’re different!
8. Which would be the safest country for you to get your VPN from?
a. USA
b. Switzerland
c. China
d. Russia
Answer Key:
1: c
2: d
3: No, no, no, no
4: Yes, yes, yes, yes
5: a
6: b
7: d
8: b