Easy-Hide-IP protects your identity by replacing your real IP address with a different one. You will appear to access the
internet from a different location. never revealing your real location.
Normally, when a request is made on the internet, the end server is contacted directly. A proxy stands as an interface between your request and the server which your request is been made to. Your pc contacts it, and it makes the request on your behalf. When the end server gets the request and replies to the proxy, it sends the reply back to you. No direct contact occurs between you and the final destination, the proxy servers information is seen by the site instead of yours. As you learn about proxies, you’ll discover that, they are not allowed for some websites. You are asked to show your identification. But its rare
According to www.Wikipedia.org,
A proxy server has these potential purposes;
It keeps machines behind it anonymous (mainly for security).
To apply access policy to network services or content, e.g. to block undesired sites.
To log / audit usage, i.e. to provide company employee Internet usage reporting.
To bypass security/ parental controls.
To scan transmitted content for malware before delivery. To circumvent regional restrictions.
Most of these hacker tools can be found and downloaded using google and other search engines.
Network Stumbler(NetStumbler)–easily finds wireless signals being broadcast within range. It also has ability to
determine Signal/Noise info that can be used for site surveys. Kismet –Kismet will detect and display Service set identifier(SSIDs)that are not being broadcast which is very critical
in finding wireless networks. Airsnort –can be used to sniff and crack WEP keys
CowPatty –used as a brute force tool for cracking WPA-PSK, its the New WEP for home Wireless Security. ASLeap –can be used to gather the original data that is being passed across a network at a particular time, if its using
LEAP and these sniffed credentials can be cracked.
Port scanners Superscan; constitutes of port scanner, pinger, and resolver Angry IP Scanner : IP address and port scanner
Unicorn scan: Used for information gathering and correlation. Sniffer
A sniffer is a program that is used for monitoring and analyzing network traffic, problems and detection of bottlenecks.
Examples are, Tcpdump, airsport, kismet, Wireshark(Ethereal), Dsniff, Ettercap, Cain and Abel. Nmap(Network Mapper") It's used to discover computers and services on a computer network thereby creating a map of the network. It can be used to know, the types of operating system, firewalls a target is using and can scan large networks etc. It can be used on Windows, Linux and Mac.
Wireshark(Ethereal): Ethereal can scan wireless and ethernet data and comes with some robust filtering capabilities.
It can also be used to sniff-out 802.11 management beacons and probes and subsequently could be used as a tool to
sniff-out non-broadcast SSIDs.
Spyrecon is also another password theft device. Google it or to get a copy