Pages

Rabu, 09 November 2011

windows下的sock代理 windows under the sock proxy

译:quack Translation: quack
参考资料:《ANONYMOUS CONNECTIONS OVER THE NET:Socks Chains in Windows》by zoa_chien Reference: "ANONYMOUS CONNECTIONS OVER THE NET: Socks Chains in Windows" by zoa_chien

一、概要 A summary

这份文档讲述如何在ms windows下通过socks chain接入internet,使你能够匿名地接入网络,别人想定位你也更不容易了。 This document describes how to ms windows socks chain access through the internet, allowing you to anonymously access the network, others do not want to locate you more easily.

二、原理 Second, the principle

你传输数据时用了越多跳板,要找出你的真实踪迹就越困难,就如下面: When you transfer data using a more springboard to find traces of the more difficult your true, as the following:

you --> socks1 --> socks2 --> socks3 --> ... --> socksx --> target you -> socks1 -> socks2 -> socks3 -> ... -> socksx -> target

想要找出你,就必须连接x个你所通过的机器,并且找出他们的log,如果碰巧有一个没有记录,线就断了:),即使都记录了,log里面登记的IP也是上一级跳板主机的IP…… Want to find you, you must be connected to x through the machine, and find their log, if you happen to have a no record, the line is broken:), even if all records, log the IP is registered on the inside a springboard for the host IP ... ...

这种技巧可以用于: This technique can be used:
. ICQ或者相似工具 . ICQ or similar tool
. ftp客户端 . Ftp client
. mail客户端 . Mail client
. telnet客户端 . Telnet client
. 端口扫描器 , Port scanner
. (以及几乎所有在网络中所使用的工具) . (And almost all the tools used by the network)

这可能不适用于某些IRC服务器,因为它们常常查看打开着的wingates及proxies。 This may not apply to certain IRC servers, because they often view open with the wingates and proxies.


三、开始吧 Third, get started

1、找到一些运行wingate的主机 1, find the host running wingate

因为wingates的默认安装打开端口1080并且不记录socks连接。 Because the default installation wingates open port 1080 and does not record socks connection.

你可以从 You can
http://proxys4all.cgi.net/win-tel-socks.shtml或者 http://proxys4all.cgi.net/win-tel-socks.shtml or
http://www.cyberarmy.com /lists/wingate/找到一些公布出来的wingate的IP,或者你可以自己找到它们,你可以用'代理猎手'(?我不知道是不是国内流行的那个,似乎不太象,懒得去看了),可以从http://www.securax.org/ZC/anon/proxyht300beta5.exe http://www.cyberarmy.com/lists/wingate/ wingate out to find some release of IP, or you can find them yourself, you can use the 'Proxy Hunter' (? I do not know is that the domestic epidemic, it seems not like, too lazy to look up), from http://www.securax.org/ZC/anon/proxyht300beta5.exe
下载。 Download the.

或者你可以用一个叫wingatescan的工具,下载连接在: Or you can use a tool called wingatescan, download link at:
http://www.securax.org/ZC/anon/wgatescan-22.zip http://www.securax.org/ZC/anon/wgatescan-22.zip

速度是非常重要的——因为我们要使用的多socks连接,所以klever dipstick可以帮助你断定哪个wingate是速度最快的,你可以从下面的连接下载: Speed ​​is very important - because we want to use more socks connection, so klever dipstick wingate can help you determine which is the fastest, you can download from the link below:
http://klever.net/kin/static/dipstick.exe http://klever.net/kin/static/dipstick.exe
(其实这个工具应该就是ping每台主机,看它的反应速度罢了,找出回应最快的) (In fact, this tool is to ping each host should see nothing of its speed of response, to find the quickest response)


2、确认列表中的主机的确运行着wingate 2, confirm the list of hosts is indeed running wingate

同样有很多工具能做这种事,比如server 2000,可以从 There are many tools that can do the same thing, such as server 2000, from
http://freespace.virgin.net/david.wood6/Server/Server.htm下载。 http://freespace.virgin.net/david.wood6/Server/Server.htm download.

3、安装一个能截取发送的信息包的软件 3, installation of a packet sent to intercept the software

我使用的是一个叫purpose的工具,你可以从 I used a tool called the purpose, you can
http://www.socks.nec.com/sockscap.html得到它。 http://www.socks.nec.com/sockscap.html get it.

要设置它,只要在socks server填上: 127.0.0.1 port 8000. To set it, just fill in the socks server: 127.0.0.1 port 8000.
选择'socks version 5'.再点击'resolve all names remotely'. Select the 'socks version 5'. And then click 'resolve all names remotely'.
不要选'supported authentication'。 Do not choose 'supported authentication'.

在主界面,选择new然后建立一个你希望socks支持的程序的快捷方式 In the main interface, select the new socks you want and then create a shortcut to the program support

对所有你想匿名的程序做同样的工作…… All you want to do the same anonymous program work ...

4、安装socks chainer 4, installation of socks chainer

从http://www.ufasoft.com/socks下载该工具 Download the tool from http://www.ufasoft.com/socks

在service菜单, 点击new。 In the service menu, click new. 在name段输入Chain,port则输入8000。 In the name section enter Chain, port, enter 8000.

点击new 并且将你找到最快的wingates的IP填进去,端口则填1080。 Click new and will you find the fastest wingates filled into the IP, port 1080 is filled.

使用'<' 和'>', 你可以添加或者移除socks. 记得一定要在使用前测试所有的socks. Use '<' and '>', you can add or remove socks. Remember to test before using all of the socks.


四、测试你的设置 Fourth, test your settings

要想检查你的电脑连接到哪些socks,可以使用工具x-ploiters totostat To check what your computer is connected to the socks, you can use the tool to x-ploiters totostat
(http://idirect.tucows.com/files/totostat_install.exe). (Http://idirect.tucows.com/files/totostat_install.exe).
检查端口1080的连接。 Check the connection to port 1080.

用你所建立的浏览器的快捷方式打开浏览器,连接到 Use your browser created a shortcut to open the browser, connect to the
http://cavency.virtualave.net/cgi-bin/env.cgi或者 http://cavency.virtualave.net/cgi-bin/env.cgi or
http://internet.junkbuster.com/cgi-bin/show-http-headers http://internet.junkbuster.com/cgi-bin/show-http-headers

同样,打开你的telnet客户端并尝试telnet到 Also, open your telnet client and try to telnet to
ukanaix.cc.ukans.edu ukanaix.cc.ukans.edu

你可以通过https://sites.inka.de:8001/cgi-bin/pyca/browser-check.py来检测SSL或者FTP到ftp.zedz.net——或者其它的FTP来验证你的IP。 You can https://sites.inka.de:8001/cgi-bin/pyca/browser-check.py to detect SSL or FTP to ftp.zedz.net-- or any other FTP to verify your IP.

在上面的测试中,远程主机上留下的将是你最后一个chain的IP地址。 In the above test, the remote host on the left will be your last IP address of a chain. 当然你可以在自己的网络里进行测试…… Of course, you can test your own networks ... ...


五、最后…… Five, the last ... ...

never use internet explorer to do tricky stuff as it might reveal your ip.my personal favorite browser is opera 4.0 (http://www.opera.com/) never use internet explorer to do tricky stuff as it might reveal your ip.my personal favorite browser is opera 4.0 (http://www.opera.com/)

if you looked carefully to what is displayed when you go to if you looked carefully to what is displayed when you go to
the http://internet.junkbuster.com/cgi-bin/show-http-headers page, you the http://internet.junkbuster.com/cgi-bin/show-http-headers page, you
might have noticed that a lot of stuff about our client is being sent. might have noticed that a lot of stuff about our client is being sent.
to avoid this, we could install another proxy between the sockscap and the sockschainer proxy that would filter out those things. to avoid this, we could install another proxy between the sockscap and the sockschainer proxy that would filter out those things.
A4proxy is an example of a proxy capable of doing such things. A4proxy is an example of a proxy capable of doing such things.

remember, if you want to do the real stuff, better switch to linux. remember, if you want to do the real stuff, better switch to linux.

============================== ==============================
好象没多大价值,将就着看吧…… If not much value will a Kanba ... ...

Tidak ada komentar:

Posting Komentar