Friday, April 20, 2012

emoticone facebook sur le tchat

 

Heureuxliste smileys tchat Facebook:-):):]=)
Très heureux:-D;D:D=D
Tire la langue:-P;P:P:-p:p
Clin d’œil;-);)
Surpris:-O:O:-o:o
Lunettes de soleil8-|8|B-|B|
Lunettes8-)8)B-)B)
AngeO:)O:-)
Diable3:)3:-)
Énervé>:(>:-(
En colère>:O>:o>:-o
Triste:-(:(:[=(
Déçu:/:-/::-
Pleure:'(
Surpriso.OO.o
Bisou:-*:*
Très amusé^_^
Sourire de chat:3
Satisfait-_-
Cœur<3
Pacman:v
Robot:|]
Requin(^^^)
Manchot<(")
Chris Putnam:putnam:
42:42:

J'aimesmiley j'aime facebook(y)(Y)
Readmore...
Tuesday, April 10, 2012

Utilisation Google Earth avec un serveur proxy

 

Utilisation avec un serveur proxy

Pour configurer les paramètres proxy HTTP pour Google Earth, procédez comme suit :
  1. Ouvrez le menu Pomme.
  2. Sélectionnez Préférences système > Réseau.
  3. Sélectionnez l'onglet Proxys.
  4. Assurez-vous que l'option Proxy Web (HTTP) est sélectionnée.
  5. Entrez les informations du proxy HTTP relatives à votre réseau dans le champ Serveur Proxy Web. Vous pouvez obtenir ces informations auprès de votre fournisseur de services Internet ou de votre administrateur système.
Readmore...

PROXY POUR SKYPE

 

GTunnel est un petit proxy (pour windows) qui permet d'éviter la censure en faisant passer toutes vos connexions via TOR (classique quoi) ou Skype !
Basé sur une initiative du Global Information Freedom Consortium, Gtunnel en passant par Skype assure que les paquets soient chiffrés du début à la fin. Votre IP est inconnue du serveur final et n'hésitez pas à coupler ce proxy avec des softs comme UltraSurfFreeGateFirePhoenixGPass, et Ranking pour être sûr de passer à travers toutes les cyber murailles du web.
4186234042 69cd2f82e3 o Gtunnel   Le proxy qui passe par Skype
Attention quand même si vous êtes en Chine, ne téléchargez pas la version chinoise de Skype qui contient peut être un mouchard, mais utilisez la version internationale dispo sur Skype.com
Readmore...
Monday, April 9, 2012

free proxy for android

 
Youhide est un service de proxy anonyme. ... d'autres serveur de navigation anonyme, YouHide est un un proxy en PHP and free proxy for android

Readmore...

Comment utiliser un Proxy avec un navigateur Chrome ?

 

Proxy avec un navigateur Chrome

Si vous avez un navigateur Google Chrome, Cliquez sur la clé en haut à droite, Options, Options Avancées et cliquez sur Modifier les paramètres du proxy.
proxy google chrome Cest quoi un proxy et comment bien l’utiliser ?
Dans la nouvelle fenêtre, cliquez sur “Paramètres réseau”, cochez “Utiliser un serveur Proxy”, puis entrez l’adresse IP de votre proxy et le port.

chrome2 Cest quoi un proxy et comment bien l’utiliser ?


Readmore...

Comment utiliser un proxy avec un navigateur Firefox ?

 

Comment utiliser un proxy  avec un navigateur Firefox ?

Nous allons voir dans cet article comment bien utiliser un proxy sous les différents navigateurs Internet Explorer, Firefox, Chrome  afin de changer, modifier son adresse IP.

Proxy avec un navigateur Firefox

Pour utiliser un proxy sous Firefox , rien de plus simple. En fait je vous propose deux méthodes simples et efficaces :
  •  La première méthode consiste sur la configuration manuelle du proxy
  •  La deuxième consiste sur utilisation d’un addon Firefox.
Première méthode
Pour la première méthode, allez dans Firefox, cliquez sur Outils, Options, cliquez sur l’onglet avancé et sur l’onglet Réseau.
Cliquez ensuite sur le bouton paramètres : Vous devriez avoir la fenêtre suivante à l’écran :
proxy firefox Cest quoi un proxy et comment bien l’utiliser ?
Cochez le bouton radio configuration manuelle du proxy, entrez l’adresse IP de votre proxy et le port. En général, les proxy sont donnés sous la forme adresse IP:Port (exemple: 40.72.124.20:80). Voilà c’est fini, vous faites ok et testez le proxy sur un site.
Problème
Ce qui est chiant dans cette méthode est de trouver un bon proxy valide, performant et  fiable.  C’est vraiment très dure mais comme je suis sympa je vous facilite la tache et je vous donne le site que j’utilise régulièrement pour trouver des serveurs proxy performant, c’estfreeproxylists.com. Il est plutôt bien fait. Il suffit de choisir une liste de proxy qui vous intéresse parmi la liste proposée.
Une fois sur la page correspondante à votre choix, sélectionnez une liste de proxy. Je vous conseille de prendre la première, car c’est celle qui est la plus à jour.
Deuxième méthode
Pour la deuxième méthode, nous allons utiliser une petite application,  il s’agit d’une extension Firefox qui s’appelle AnonymoX et qui permet très simplement d’établir de connexion pour vos sites par l’intermédiaire d’un proxy aux US, en Angleterre, en Allemagne…etc.
AnonymoX est gratuit, la connexion est rapide et ça évite de devoir chercher des proxys. Le point fort d’AnonymoX c’est le côté simplicité d’utilisation que j’adore ! Pour l’utiliser il faut simplement télécharger l’extension sur : https://addons.mozilla.org/en-US/firefox/addon/anonymox/ et l’installer
Apres redemandez votre navigateur, activez le serveur proxy  et choisissez le pays de votre proxy, comme la montre l’image ci-dessous :
anonymoux1 Cest quoi un proxy et comment bien l’utiliser ?
Vous pouvez maintenant surfer sur votre site préféré et bloqué dans un anonymat relatif avec une IP différente de la vôtre. Il existe d’autres extensions qui permettent de faire la même chose que anonymox comme foxyproxy et proxy tool. Ne t’inquiétez pas, je vais en parler en détails dans un autre billet.
Readmore...

comment fonctionne un proxy ?

 

Comment fonctionne ?

L’utilisation des proxys est courante pour accéder à un site réservé à certaines adresses IP, ou pour échapper au filtre HTTP de son entreprise ou encore pour surfer en mode anonyme.
Par exemple, je suis au boulot et lors de ma pause de 10h, je veux aller faire un petit tour sur facebook, impossible d’afficher la page, car mon entreprise vient de faire installer un pare-feu qui m’interdit l’accès à Facebook. Hop, je passe par un petit proxy et je peux enfin voir mes notifications.  icon biggrin Cest quoi un proxy et comment bien l’utiliser ?
Explication:
Voici une Requête HTTP sans proxy
En tapant une adresse comme http://www.funinformatique.com/index.php, votre ordinateur va se connecter sur le serveur www.funinformatique.com et demander la page index.php.
requere proxy sans Cest quoi un proxy et comment bien l’utiliser ?
Requête HTTP avec proxy
Avec l’utilisation d’un proxy, quand vous tapez http://www.funinformatique.com/index.php, votre ordinateur va se connecter au proxy et lui demande d’aller chercher la page sur le serveur www.funinformatique.com.
requere proxy Cest quoi un proxy et comment bien l’utiliser ?
Readmore...
Sunday, April 8, 2012

Your Free Web Proxy / UK Based Proxy Server

 

If you require a UK proxy server that lets you anonymously surf the web, DaveProxy is one of the most stable of UK proxies on the net. If you're blocked from top sites like facebook, Spotify, Twitter, youtube, bebo, myspace, ebay, and other sites, then you can use our UK based free proxy server to access them.
DaveProxy provides an anonymous free public proxy service. We're British with our server based within the UK so you can access UK only content and helps you bypass any geoip restrictions.

Readmore...

proxy server uk

 

You can interact with our frequently updated proxy database by means of the listboxes below. By choosing some options like proxy type orconnection latency you can select proxies you need.
By clicking on the column headers you can sort this list. You can retreive this list by clicking on the link 'Get This Proxylist' and choosing convinient method.


Readmore...

What's proxy bidding?

 
Like most auction sites including eBay, we use proxy bidding on your behalf when you bid

This means that if you can win the auction without bidding your maximum bid, you will. For example, if someone else has bid $1 and you've bid $5, your bid will only be increased to $1.10 to outbid them and become the high bidder. Your maximum bid is never revealed to others, and in case of a tie for high bidder, the earlier bid takes precedence. 

Proxy bidding is a way of ensuring you're always getting the best deal, while still allowing you, as an advertiser, to name your price when it comes to what you're willing to pay!
Readmore...

How Proxy Bidding Works ?

 

How Proxy Bidding Works

Though many people only associate proxy bidding with online auction sites, it happens in physical auctions as well. In a physical auction, the bidder who wants to bid by proxy usually calls or e-mails his maximum bid to the house before the auction begins; in an online auction, he gives this information to the auction site at any point once the auction is open. In both cases, the bidding process is automatic, and the proxy bidder doesn't have to do anything further unless his maximum amount is reached. If that happens, the auction holder calls or e-mails the person bidding by proxy, who can decide whether he wants to keep on bidding beyond his initially identified maximum price. If the maximum amount is not reached but other bidders give up, then the proxy bidder only pays the last bid amount, not his maximum price.
Proxy bidding is used in second-price auctions, which are those in which the winning bid is one bidding increment higher than the second place bidder. This means that the highest bid — which is the highest maximum placed by any proxy bidder — is sealed, but the second-highest is always public because the current high bid is one increment higher.
For example, two people are bidding on an item. Bidder A sets a maximum proxy bid of $100 US Dollars (USD). If bids increase in units of $10 USD and A is the only bidder, he'll have the high bid with $10 USD. If bidder B joins the auction and sets a maximum proxy bid of $150 USD, the high bid is now $110 USD — the maximum of the second-highest bid ($100 USD) plus the unit increase ($10 USD). The actual maximum that B is willing to pay — $150 USD — is not known unless someone else bids more and it becomes the second-highest bid.
Readmore...

BypassThat - Free Proxy Service

 

BypassThat - Free Proxy Service



Bypass That is a PHP application that allows people to bypass filters and firewalls blocked for a number of different reasons. By utilizing this PHP anonymous proxy, you will be able to view the blocked website because we download the requested resource and display the webpage you want from our servers, making it appear that you are only accessing our website. Bypass That will also keep your identity anonymous because requests for the websites you visit through this service will only appear to come from our server and not from any individual person. 



Readmore...

proxy bypass

 

Michael Jordon, David Robinson, October 2011
In this blog I will describe a new type of security vulnerability which can allow full internal system access from the internet from an unauthenticated perspective. This technique exploits insecurely configured reverse web proxies to gain access to internal/DMZ systems.
Apache web server is affected by this issue when running in reverse proxy mode; Context have worked with Apache to produce a patch which reduces the risk of exploitable misconfigurations (CVE-2011-3368).
Reverse proxies are common place in the head-end infrastructure of organisations. They route web (HTTP and HTTPS) protocols from an external request to one of several internal web servers. The common usages are for providing load balancing, separating static content from dynamic content, or to present a single web server which is actually made up of several different web servers at different paths.
Context have proven this attack against Apache web servers which are using “mod_rewrite” to proxy web requests internally. Other proxies may suffer from this issue.
If the Apache configuration file is configured like this (prior to Apache's recent update):
RewriteRule ^(.*) http://internalserver:80$1 [P]
And not like this:
RewriteRule ^(.*) http://internalserver:80/$1 [P]
Then access from the internet to any internal system that is accessible from the inside of the proxy is possible; the difference is the trailing slash after the port number. Both lines appear to work in the same manner from the outside; what the rule says is, if any pages are requested from the Apache proxy server (as defined by the regular expression) then change the request to the internal server on port 80 (the port number is optional and does not change this attack) and append the path requested to the end of the URL ($1). The [P] indicates that the request should then be proxied. I control the $1 part of the URL rewrite. Now what is needed is to change the URL so that it accesses any arbitrary internal system, firstly changing the port number which is easy. If I requested a page of “80” then the port number will be changed to 8080. So, using CAT (http://cat.contextis.com/) the raw HTTP request would look like this:
GET 80/console HTTP/1.0
Causing the proxy to try to connect to:
http://internalserver:8080/console
That’s fine, but the chances of there being anything of interest on port 8080 are pretty low; we want full control over the URL being generated. At first glance however, it appears that it is too late in the URL to be able to change which domain is being requested. Time to go back to basics on the structure of a URL.
The URL specification takes the following form: (http://en.wikipedia.org/wiki/URI_scheme).
Most parts are familiar however the authentication details are not so commonly used but is part of the specification. Therefore, Apache will understand and honour the credentials and forward them on as part of any request. Using this part of the specification we can change the resulting rewrite rule to make the ‘internalserver’ and port ‘80’ into a username and password. We then have full control of the domain, path and arguments. So in CAT the attack string would be:
GET @InternalNotAccessibleServer/console HTTP/1.0
Which the Apache reverse proxy will interpret and create the following request:
http://internalserver:80@InternalNotAccessibleServer/console
When the request is made it will send a username of internalserver with a password of 80 to the InternalNotAccessibleServer and load the page ‘console’. The username and password will be ignored by the internal server and it will respond with its standard response. We can access any internal/DMZ system which the proxy can access including administration interfaces on firewalls, routers, web servers, databases etc. Context has had plenty of success with this attack where credentials are weak on the internal systems allowing for full network compromise e.g. uploading Trojan WAR files on to JBoss servers. The full request is proxied including the method, cookies and any POST data.
This issue could also affect configurations where the proxy is configured to serve requests to certain paths from a different web server. The recent Apache update does not protect against this type of mis-configuration. For example a proxy setting of:
Rewriterule ^/images(.*) http://InternalImageServer$1
Means requests for anything in the images directory should be sent to the internal image server; where as other requests would be handled by another rule. Therefore we can modify the attack string to the following which would cause the same attack to work:
GET /images@InternalNotAccessibleServer/console HTTP/1.0
Resulting URL:
http://InternalImageServer@InternalNotAccessibleServer/console
The mod_rewrite rule does not have to have a port specified. In which case the above attack will have the domain interpreted as a hostname but with no password and will still work. However, if a port was to be specified on the attack string then Apache will interpret the extra colon as being a password. For example, if the mod_rewrite rule is:
RewriteRule ^(.*) http://InternalImageServer$1
And a request is to be made to an internal server on port 8080 the following attack string would not work:
GET @InternalNotAccessibleServer:8080 HTTP/1.0
Because the following string would be generated:
http://InternalImageServer@InternalNotAccessibleServer:8080/console
The section in green will be interpreted as being the username and the “8080” as the password. Therefore in the case where a port is being specified in the targeted server and the rewrite rule does not contain a port it is necessary to add in a colon at the start to act as a blank password.
GET :@InternalNotAccessibleServer:8080 HTTP/1.0
Resulting in the following URL which would allow for internal access on port 8080:
http://InternalImageServer:@InternalNotAccessibleServer:8080/console

Detection

The easiest way to test for this issue is to request an external website by pre-pending the URL with an “at” symbol. If the proxy returns that site then there is an issue.
However, if the proxy cannot route outbound to the Internet then an alternative is to connect to localhost and check for the original page. This test can be extended to connect to different ports on the local host and check for a timing difference. These tests would need to be performed on all directories on the webserver. The following table shows example test strings that could be used to detect a reverse proxy bypass vulnerability: 
Attack StringResult if VulnerableResult if Not Vulnerable
GET @www.contextis.com HTTP/1.0Displays Context’s website400 Error page or a generic error page.
GET @localhost HTTP/1.0Displays the original website
GET :@localhost HTTP/1.0
GET @targetdomain HTTP/1.0
Where target domain is the domain name for the website under test.
GET :@localhost:8123 HTTP/1.0
8123 Is a port which is assumed to not have anything listening.
Delay before displaying an error page.Immediate error page.
GET @10.0.0.1 HTTP/1.0
The IP address is assumed to be an IP that does not have a web server.
Delay before displaying an error page.
Or an internal server if you are lucky.
GET :@localhost:80 HTTP/1.0Displays the original website
If this is found then an attacker would need to know about, or brute force, the internal IP address configuration or hostnames. Of course, the web application running on the site might reveal this in an error message, HTTP headers etc. CAT’s fuzzer can then be used to scan the internal address range to find valid machines, which can then be port scanned to find web interfaces.

Recommendations

So what can people do about this? Patch, to ensure that you are using the latest version of Apache. Second, it is important for reverse proxy configurations to be reviewed, to ensure that the rewrite rules cannot be used to access internal systems. As can be seen in this blog, rewrite rules have a great deal of flexibility but the implications of mis-configuration are critical. Context therefore recommends this new type of security vulnerability, which affects Apache and potentially other proxy configurations is included in any penetration tests and security configuration reviews.
Readmore...