Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Hunting down a proxy user?


Mb0742's Avatar
Ultimate Headshot
0 0

Oddly enough I used tor the other day and a member supposedly went back through the proxies and found me. He said he had to use the proxies I used bla bla. Is this possible?

EDIT: I don't know if he caught me when I was using a web proxy or tor.


ghost's Avatar
0 0

Well of course it is possible. No matter what you do you are always going to be one of the address in the list of proxies. Well thats at least what the cops said when they cought me. But they didnt catch me though the computer, they cought me though people.


regret's Avatar
Attack-Vector Perl
0 0

Everyone must understand that a proxy server does not mean anonymous server. There are many types of proxies out there and the majority of the publicized ones you can find on your standard google search will still pass the originator networking information thru the header files.

Never, ever trust a proxy server…if someone tells you that something is anonymous, do not believe it until you have verified it (and I mean really verified it by hitting back at your own server and checking the logs) personally.

Also, if you were using tor and someone else told you they tracked you down thru the Tor network if you were using the default onion routing style…I'd call 'bullshit' unless they can give you the header information that proves that it is you.

Very short version of all that….do not trust what anyone says without full proof to back it up. The veracity of ones own 'leetsauceness' is only verified by proof.


ghost's Avatar
0 0

im a noob… so i will put a nub question = i was wondering if you could use a proxy through another proxy?


Uber0n's Avatar
Member
0 0

daniel11us wrote: im a noob… so i will put a nub question = i was wondering if you could use a proxy through another proxy?

Yes, this is called proxy chaining. However it requires special software and SSL support, and I wouldn't recommend it since it will be much slower.

From WikiPedia:

By chaining proxies which do not reveal data about the original requester, it is possible to obfuscate activities from the eyes of the user's destination. However, more traces will be left on the intermediate hops, which could be used or offered up to trace the user's activities. If the policies and administrators of these other proxies are unknown, the user may fall victim to a false sense of security just because those details are out of sight and mind.

You might also want to read http://www.microsoft.com/technet/archive/proxy/proxch.mspx?mfr=true