Since proxy servers cache webpages, they can increase the speed of downloading documents and websites because the proxy server does a local cache of previously downloaded requests from other clients first. In comparison, a VPN is a direct tunnel to the endpoint with encryption, which really slows things down.
In this tutorial, we will create an application-specific tunnel for downloading your content, allowing you to continue using the internet for other tasks or games uninterrupted and without extended ping times. Like mentioned before, proxy servers are faster because they do not come with encryption. PIA's proxy service does offer encryption if that's something you're interested in.
In this tutorial, we will create an application-specific tunnel for downloading your content, allowing you to continue using the internet for other tasks or games uninterrupted and without extended ping times. Like mentioned before, proxy servers are faster because they do not come with encryption. PIA's proxy service does offer encryption if that's something you're interested in.
Step 1
Download & Install µTorrent
µTorrent is a torrent client, which means it uses a peer-to-peer network to download files. While this is a great, fast way to download open-source software like Kali Linux disk images, it also isn't always wise to download hacking tools from your home IP address. For those wishing to download Tor or Kali Linux without ending up on a government list, a proxy can help protect your privacy.
This setup will work for many different torrent clients, but to keep this tutorial as cross-platform as possible, we will be using µTorrent. You can download the software from its website, and it should auto-select the client based on the operating system you are using. Go ahead and press the "Get µTorrent" button (the free one, obviously), and the download will start automatically.
After downloading, it's time to install. When we double-click the installer, a configuration wizard will pop up. We want to hit the "Next" button in the bottom-right corner. After that, the end-user license agreement will spring up, and so we want to "Accept" that.
Download & Install µTorrent
µTorrent is a torrent client, which means it uses a peer-to-peer network to download files. While this is a great, fast way to download open-source software like Kali Linux disk images, it also isn't always wise to download hacking tools from your home IP address. For those wishing to download Tor or Kali Linux without ending up on a government list, a proxy can help protect your privacy.
This setup will work for many different torrent clients, but to keep this tutorial as cross-platform as possible, we will be using µTorrent. You can download the software from its website, and it should auto-select the client based on the operating system you are using. Go ahead and press the "Get µTorrent" button (the free one, obviously), and the download will start automatically.
After downloading, it's time to install. When we double-click the installer, a configuration wizard will pop up. We want to hit the "Next" button in the bottom-right corner. After that, the end-user license agreement will spring up, and so we want to "Accept" that.
It wants to install a Yahoo extension on your default web browser, and we don't want that. Go ahead and "Decline" that, and then the final installation steps will occur automatically.
Step 2
Configure µTorrent
First, let's open up µTorrent. We want to click the "Options" tab and then select "Preferences" from the drop-down menu. The Preferences window will pop up, and next, we will want to click on the "Connection" tab. Once there, we will see the Proxy Server field, as seen below. It's asking for proxy credentials, so we'll need to create those first.
Configure µTorrent
First, let's open up µTorrent. We want to click the "Options" tab and then select "Preferences" from the drop-down menu. The Preferences window will pop up, and next, we will want to click on the "Connection" tab. Once there, we will see the Proxy Server field, as seen below. It's asking for proxy credentials, so we'll need to create those first.
Step 3
Generate Proxy Credentials
Let's open up a web browser and log into our PIA VPN client. After you log in, scroll down until you see the PPTP/L2TP/SOCKS Username and Password section. These username and password pairs are generated for use with PPTP, L2TP, and Proxy SOCKS connections. Write down or save the username and password for the next step.
Generate Proxy Credentials
Let's open up a web browser and log into our PIA VPN client. After you log in, scroll down until you see the PPTP/L2TP/SOCKS Username and Password section. These username and password pairs are generated for use with PPTP, L2TP, and Proxy SOCKS connections. Write down or save the username and password for the next step.
Step 4
Configure the Proxy Server
Return to µTorrent's "Connection" settings, and change the Proxy Server type to "Socks5." Check the boxes next to "Authentication" and "Use proxy for peer-to-peer connections," then grab that username and password from PIA client page and stick them in the Username and Password fields under the Proxy Server section.
Configure the Proxy Server
Return to µTorrent's "Connection" settings, and change the Proxy Server type to "Socks5." Check the boxes next to "Authentication" and "Use proxy for peer-to-peer connections," then grab that username and password from PIA client page and stick them in the Username and Password fields under the Proxy Server section.
Next, for the Proxy field, we want to input the address "nl.privateinternetaccess.com," and for the Port number, we want to change it to port 1080. We are using this port because PIA servers assign this port to their proxy servers. Press "Apply," and then "OK."
Step 5
Torrent a File via Proxy
Now, let's download our target torrent file. In this case, our target will be the free live image of our favorite pentesting OS, Kali Linux. Torrenting files is often quicker than downloading the same file from a web browser, as a peer-to-peer download isn't limited by how far the websites download server is.
Torrent a File via Proxy
Now, let's download our target torrent file. In this case, our target will be the free live image of our favorite pentesting OS, Kali Linux. Torrenting files is often quicker than downloading the same file from a web browser, as a peer-to-peer download isn't limited by how far the websites download server is.
You can navigate to the torrent file on the Kali downloads page. We are going to select the "Kali 64-bit" version using the "Torrent" download. A file with a name like "kali-linux-2017.2-amd64.torrent" should download.
Go ahead and either save or open the TORRENT file with the µTorrent client. Then, right-click on the "kali-linux-20xx-.x-xxxxx" and select "Force Start" to prioritize and initialize the torrent. If the torrent does not start, then the proxy settings were not correct or your subscription had expired. If it succeeds, you should see something like the screen below.
Once the connection levels off, your download should work normally. As soon as it's finished, you'll have downloaded your first piece of data via proxy.
Go ahead and either save or open the TORRENT file with the µTorrent client. Then, right-click on the "kali-linux-20xx-.x-xxxxx" and select "Force Start" to prioritize and initialize the torrent. If the torrent does not start, then the proxy settings were not correct or your subscription had expired. If it succeeds, you should see something like the screen below.
Once the connection levels off, your download should work normally. As soon as it's finished, you'll have downloaded your first piece of data via proxy.
Proxies Have Even More Beneficial Uses
In the end, we connected our torrent client to redirect our internet traffic to Private Internet Access's proxy servers. This ensured that our private information is concealed while torrenting. Since we did this in an application-specific way, we are also able to use this configuration for web browsers and other application that allow proxy redirection settings.
Depending on where the proxy is, we can also get around geolocation filters to access regionally-restricted websites. This useful ability can fight censorship and be used to get around many types of network restrictions.
Some organizations, like school and governments, use proxies in their network for almost the exact opposite reason. They configure proxies to actually filter blacklisted websites, like porn or social media, so people in the organization do their work and without getting distracted.
In that example, a client sends a request to the proxy server to fetch a file or webpage. When the proxy server receives the data, it will interpret the request and decide if that data will be sent back, depending on the settings and rules applied to the proxy server, such as blocking pornography. The client will then receive the file or webpage they requested, provided it passed the proxy filter.
Again, since proxy servers also cache webpages, if an organization's network has hundreds or thousands of users searching for the same thing, it cuts down the search index times on the network and reduces upstream demand.
In the end, we connected our torrent client to redirect our internet traffic to Private Internet Access's proxy servers. This ensured that our private information is concealed while torrenting. Since we did this in an application-specific way, we are also able to use this configuration for web browsers and other application that allow proxy redirection settings.
Depending on where the proxy is, we can also get around geolocation filters to access regionally-restricted websites. This useful ability can fight censorship and be used to get around many types of network restrictions.
Some organizations, like school and governments, use proxies in their network for almost the exact opposite reason. They configure proxies to actually filter blacklisted websites, like porn or social media, so people in the organization do their work and without getting distracted.
In that example, a client sends a request to the proxy server to fetch a file or webpage. When the proxy server receives the data, it will interpret the request and decide if that data will be sent back, depending on the settings and rules applied to the proxy server, such as blocking pornography. The client will then receive the file or webpage they requested, provided it passed the proxy filter.
Again, since proxy servers also cache webpages, if an organization's network has hundreds or thousands of users searching for the same thing, it cuts down the search index times on the network and reduces upstream demand.
Here is the complete list of Gmail keyboard shortcuts:
Compose and Chat
<Shift> + <Esc> : Focus main window
<Esc> : Focus latest chat or compose
<Ctrl> + . : Advance to next chat or compose
<Ctrl> + , : Advance to previous chat or compose
<Ctrl> + <Enter> : Send
<Ctrl> + <Shift> + c : Add cc recipients
<Ctrl> + <Shift> + b : Add bcc recipients
<Ctrl> + <Shift> + f : Access custom from
<Ctrl> + k : Insert a link
<Ctrl> + ; : Go to previous misspelled word
<Ctrl> + ' : Go to next misspelled word
<Ctrl> + m : Open spelling suggestions
Formatting
<Ctrl> + <Shift> + 5 : Previous font
<Ctrl> + <Shift> + 6 : Next font
<Ctrl> + <Shift> + - : Decrease text size
<Ctrl> + <Shift> + + : Increase text size
<Ctrl> + b : Bold
<Ctrl> + i : Italics
<Ctrl> + u : Underline
<Ctrl> + <Shift> + 7 : Numbered list
<Ctrl> + <Shift> + 8 : Bulleted list
<Ctrl> + <Shift> + 9 : Quote
<Ctrl> + [ : Indent less
<Ctrl> + ] : Indent more
<Ctrl> + <Shift> + l : Align left
<Ctrl> + <Shift> + e : Align center
<Ctrl> + <Shift> + r : Align right
<Ctrl> + <Shift> + , : Set right-to-left
<Ctrl> + <Shift> + . : Set left-to-right
<Ctrl> + \ : Remove formatting
Jumping
g then i : Go to Inbox
g then s : Go to Starred conversations
g then t : Go to Sent messages
g then d : Go to Drafts
g then a : Go to All mail
g then c : Go to Contacts
g then k : Go to Tasks
g then l : Go to Label
Threadlist selection
* then a : Select all conversations
* then n : Deselect all conversations
* then r : Select read conversations
* then u : Select unread conversations
* then s : Select starred conversations
* then t : Select unstarred conversations
Navigation
u : Back to threadlist
k / j : Newer/older conversation
o or <Enter> : Open conversation; collapse/expand conversation
p / n : Read previous/next message
` : Go to next inbox section
~ : Go to previous inbox section
Application
c : Compose
d : Compose in a tab (new compose only)
/ : Search mail
q : Search chat contacts
. : Open "more actions" menu
v : Open "move to" menu
l : Open "label as" menu
? : Open keyboard shortcut help
Actions
, : Move focus to toolbar
x : Select conversation
s : Rotate superstar
y : Remove label
e : Archive
m : Mute conversation
! : Report as spam
# : Delete
r : Reply
<Shift> + r : Reply in a new window
a : Reply all
<Shift> + a : Reply all in a new window
f : Forward
<Shift> + f : Forward in a new window
<Shift> + n : Update conversation
] / [ : Remove conversation from current view and go previous/next
} / { : Archive conversation and go previous/next
z : Undo last action
<Shift> + i : Mark as read
<Shift> + u : Mark as unread
_ : Mark unread from the selected message
+ or = : Mark as important
- : Mark as not important
<Shift> + t : Add conversation to Tasks
@carding_home
Share for more hacking & carding
Compose and Chat
<Shift> + <Esc> : Focus main window
<Esc> : Focus latest chat or compose
<Ctrl> + . : Advance to next chat or compose
<Ctrl> + , : Advance to previous chat or compose
<Ctrl> + <Enter> : Send
<Ctrl> + <Shift> + c : Add cc recipients
<Ctrl> + <Shift> + b : Add bcc recipients
<Ctrl> + <Shift> + f : Access custom from
<Ctrl> + k : Insert a link
<Ctrl> + ; : Go to previous misspelled word
<Ctrl> + ' : Go to next misspelled word
<Ctrl> + m : Open spelling suggestions
Formatting
<Ctrl> + <Shift> + 5 : Previous font
<Ctrl> + <Shift> + 6 : Next font
<Ctrl> + <Shift> + - : Decrease text size
<Ctrl> + <Shift> + + : Increase text size
<Ctrl> + b : Bold
<Ctrl> + i : Italics
<Ctrl> + u : Underline
<Ctrl> + <Shift> + 7 : Numbered list
<Ctrl> + <Shift> + 8 : Bulleted list
<Ctrl> + <Shift> + 9 : Quote
<Ctrl> + [ : Indent less
<Ctrl> + ] : Indent more
<Ctrl> + <Shift> + l : Align left
<Ctrl> + <Shift> + e : Align center
<Ctrl> + <Shift> + r : Align right
<Ctrl> + <Shift> + , : Set right-to-left
<Ctrl> + <Shift> + . : Set left-to-right
<Ctrl> + \ : Remove formatting
Jumping
g then i : Go to Inbox
g then s : Go to Starred conversations
g then t : Go to Sent messages
g then d : Go to Drafts
g then a : Go to All mail
g then c : Go to Contacts
g then k : Go to Tasks
g then l : Go to Label
Threadlist selection
* then a : Select all conversations
* then n : Deselect all conversations
* then r : Select read conversations
* then u : Select unread conversations
* then s : Select starred conversations
* then t : Select unstarred conversations
Navigation
u : Back to threadlist
k / j : Newer/older conversation
o or <Enter> : Open conversation; collapse/expand conversation
p / n : Read previous/next message
` : Go to next inbox section
~ : Go to previous inbox section
Application
c : Compose
d : Compose in a tab (new compose only)
/ : Search mail
q : Search chat contacts
. : Open "more actions" menu
v : Open "move to" menu
l : Open "label as" menu
? : Open keyboard shortcut help
Actions
, : Move focus to toolbar
x : Select conversation
s : Rotate superstar
y : Remove label
e : Archive
m : Mute conversation
! : Report as spam
# : Delete
r : Reply
<Shift> + r : Reply in a new window
a : Reply all
<Shift> + a : Reply all in a new window
f : Forward
<Shift> + f : Forward in a new window
<Shift> + n : Update conversation
] / [ : Remove conversation from current view and go previous/next
} / { : Archive conversation and go previous/next
z : Undo last action
<Shift> + i : Mark as read
<Shift> + u : Mark as unread
_ : Mark unread from the selected message
+ or = : Mark as important
- : Mark as not important
<Shift> + t : Add conversation to Tasks
@carding_home
Share for more hacking & carding
http://feedproxy.google.com/~r/TheHackersNews/~3/AtLQNkwBHgU/yahoo-email-hacker.html
The Hacker News
22-Year-Old Hacker Pleads Guilty to 2014 Yahoo Hack, Admits Helping Russian Intelligence
Karim Baratov, a 22-year-old Kazakhstan-born Canadian citizen, has pleaded guilty to hacking charges over his involvement in massive 2014 Yahoo data breach that affected all three billion yahoo accounts.
In March, the US Justice Department announced charges against two Russian intelligence officers (Dmitry Dokuchaev and Igor Sushchin) from Russia's Federal Security Service (FSB) and two
The Hacker News
22-Year-Old Hacker Pleads Guilty to 2014 Yahoo Hack, Admits Helping Russian Intelligence
Karim Baratov, a 22-year-old Kazakhstan-born Canadian citizen, has pleaded guilty to hacking charges over his involvement in massive 2014 Yahoo data breach that affected all three billion yahoo accounts.
In March, the US Justice Department announced charges against two Russian intelligence officers (Dmitry Dokuchaev and Igor Sushchin) from Russia's Federal Security Service (FSB) and two
The Hacker News
22-Year-Old Hacker Pleads Guilty to 2014 Yahoo Hack, Admits Helping Russian Intelligence
Karim Baratov, a 22-year-old hacker has pleaded guilty to his involvement in 2014 Yahoo data breach and helping Russia Intelligence.
I would like to introduce you to a very powerful tool am sure alot of you will be interested in
ENIGMA​
The Enigma is a tool that is used to gather information from a computer and perform special actions such as enabling RDP and creating a hidden user for you to sign in with and many more functions
The Enigma is a tool that is used to gather information from a computer and perform special actions such as enabling RDP and creating a hidden user for you to sign in with and many more functions
There are two versions: The ​FREE​ and the ​PAID​.
With the ​FREE​ version, the information you gather will be sent to your removable storage device (Eg. pendrive, external hard drive).
With the ​PAID​ Version, the information you gather will be sent to your computer or any remote server that you specify.
With the ​FREE​ version, the information you gather will be sent to your removable storage device (Eg. pendrive, external hard drive).
With the ​PAID​ Version, the information you gather will be sent to your computer or any remote server that you specify.
FREE VERSION​
There are three main modules of the free version.
​1. RDP Activator:​
Enables RDP on the target computer and creates a user. It then sends you the IP address for you to connect to it.
​2. Scraper:​
It copies all files from Desktop, Documents, Downloads, Pictures, Music, Videos and sends them to your removable storage device.
​3. RDP-Scraper:​
It enables RDP, creates a user with Administrator privileges and hides it from the login screen, copies the IP address, steals the system passwords, and copies files from specific directories.
There are three main modules of the free version.
​1. RDP Activator:​
Enables RDP on the target computer and creates a user. It then sends you the IP address for you to connect to it.
​2. Scraper:​
It copies all files from Desktop, Documents, Downloads, Pictures, Music, Videos and sends them to your removable storage device.
​3. RDP-Scraper:​
It enables RDP, creates a user with Administrator privileges and hides it from the login screen, copies the IP address, steals the system passwords, and copies files from specific directories.
PAID VERSION​
There are four modules of the paid version.
​1. RDP ACTIVATOR​
Enables RDP, creates a user with Administrator privileges and hides that user from the login screen. Then it sends the IP address of that computer to your computer or your server.
​2. RDP-PASSWORD:​
Enables RDP, creates a user with Administrator privileges and hides that user from the login screen. Steals the system passwords, logs the IP address and sends the results to your server or computer (Your choice).
​3. SCRAPER​
Copies all files from the most common directories: Desktop, Documents, Downloads, Pictures, Music, Videos, Onedrive, and sends them to your server or computer.
​4. RDP-SCRAPER:​
Enables RDP, creates a user with Administrator privileges and hides that user from the login screen. Copies all files from the following directories: AppData, Desktop, Documents, Downloads, Pictures, Music, Videos, Searches, Onedrive. The system and browser passwords are stolen as well. You also get to install a key logger on the computer(optional).
When all that's done the results are sent to your computer or your server.
​1. RDP ACTIVATOR ($10)​
​2. RDP-PASSWORD ($15)​
​3. SCRAPER($30)​
​4. RDP-SCRAPER($50)​
There are four modules of the paid version.
​1. RDP ACTIVATOR​
Enables RDP, creates a user with Administrator privileges and hides that user from the login screen. Then it sends the IP address of that computer to your computer or your server.
​2. RDP-PASSWORD:​
Enables RDP, creates a user with Administrator privileges and hides that user from the login screen. Steals the system passwords, logs the IP address and sends the results to your server or computer (Your choice).
​3. SCRAPER​
Copies all files from the most common directories: Desktop, Documents, Downloads, Pictures, Music, Videos, Onedrive, and sends them to your server or computer.
​4. RDP-SCRAPER:​
Enables RDP, creates a user with Administrator privileges and hides that user from the login screen. Copies all files from the following directories: AppData, Desktop, Documents, Downloads, Pictures, Music, Videos, Searches, Onedrive. The system and browser passwords are stolen as well. You also get to install a key logger on the computer(optional).
When all that's done the results are sent to your computer or your server.
​1. RDP ACTIVATOR ($10)​
​2. RDP-PASSWORD ($15)​
​3. SCRAPER($30)​
​4. RDP-SCRAPER($50)​