A proxy is a system acting as an intermediate device between the scanner and the target host. The proxy acts as an agent for the scanning party, thus providing a degree of anonymity for the scanning party.
Proxy servers can perform several functions, including
Proxy servers are typically used to maintain anonymity, which will help scanners. A vigilant network administrator who is checking logs and systems will see the agent or proxy, but not the actual scanning party behind the proxy.
Choose a proxy outside your country to better simulate what an advanced attacker would do. Proxies based in the United States can have their records subpoenaed, which is why a malicious attacker typically would refrain from using them.
Some proxies are available as well, that may be useful in certain situations. One important one is The Onion Router, the Tor Network. Tor is an older technology, but it is still being developed and is very effective and widely used. Tor will supply not only anonymity but also protection in the form of encryption.
An alternative to Tor is the I2P (Invisible Internet Project) that is an anonymous peer-to-peer distributed communication layer designed to run any traditional Internet service such as Usenet, email, IRC, file sharing, Web hosting and HTTP, Telnet, as well as more traditional distributed applications such as a distributed data store, a web proxy network using Squid, or DNS.
Proxy servers can perform several functions, including
- Filtering traffic in and out of a network
- Anonymizing traffic
- Provide a layer of protection between the outside world and the internal network.
Proxy servers are typically used to maintain anonymity, which will help scanners. A vigilant network administrator who is checking logs and systems will see the agent or proxy, but not the actual scanning party behind the proxy.
Choose a proxy outside your country to better simulate what an advanced attacker would do. Proxies based in the United States can have their records subpoenaed, which is why a malicious attacker typically would refrain from using them.
Some proxies are available as well, that may be useful in certain situations. One important one is The Onion Router, the Tor Network. Tor is an older technology, but it is still being developed and is very effective and widely used. Tor will supply not only anonymity but also protection in the form of encryption.
An alternative to Tor is the I2P (Invisible Internet Project) that is an anonymous peer-to-peer distributed communication layer designed to run any traditional Internet service such as Usenet, email, IRC, file sharing, Web hosting and HTTP, Telnet, as well as more traditional distributed applications such as a distributed data store, a web proxy network using Squid, or DNS.