2
Most read
8
Most read
9
Most read
Proxy

© 2014, Triad Square Infosec Pvt. Ltd.
What is Proxy ?
Communication between two computers (shown in
grey) connected through a third computer (shown in
red) acting as a proxy.

© 2014, Triad Square Infosec Pvt. Ltd.
Types of Proxy
 Forward proxy
 Open proxy
 Reverse proxy

© 2014, Triad Square Infosec Pvt. Ltd.
Forward proxy

 A forward proxy taking requests from an internal network
and forwarding them to the Internet.

© 2014, Triad Square Infosec Pvt. Ltd.
Open proxy
 An open proxy forwarding requests from and to
anywhere on the Internet.

Reference: en.wikipedia.org
© 2014, Triad Square Infosec Pvt. Ltd.
Reverse proxy

 A reverse proxy taking requests from the Internet and
forwarding them to servers in an internal network.
 Those making requests connect to the proxy and may
not be aware of the internal network.

© 2014, Triad Square Infosec Pvt. Ltd.
Squid Web Proxy Server

© 2014, Triad Square Infosec Pvt. Ltd.
Security Advantages
 Terminates the TCP connection before relaying to target
host (in and out)
 Hide internal clients from external network
 Blocking of dangerous URLs
 Filter dangerous content
 Check consistency of retrieved content
 Single point of access, control and logging

© 2014, Triad Square Infosec Pvt. Ltd.
TCP connection termination
The incoming and outgoing TCP connections are terminated
Prevents a hacker from hijacking a stale (old) connection on a service
that is being proxied.
Example . HTTP page request
request
packet’

request
packet

Proxy

User
response packet

Connection remain
open until the proxy
closes it after receiving
response packet and
sending it back to user

Server
response packet’

Connection only remain
open until server closes the
connection after sending
the response packet

© 2014, Triad Square Infosec Pvt. Ltd.
Reference
 en.wikipedia.org

Thank You

© 2014, Triad Square Infosec Pvt. Ltd.

More Related Content

PDF
Wi-fi Hacking
PPTX
Security testing
PPTX
Web application attacks
PPTX
Vulnerabilities in modern web applications
PDF
FIREWALL
PPT
Web Proxy Server
PPTX
SQL INJECTION
Wi-fi Hacking
Security testing
Web application attacks
Vulnerabilities in modern web applications
FIREWALL
Web Proxy Server
SQL INJECTION

What's hot (20)

PPT
Proxy Server
PPTX
VPN & FIREWALL
PPTX
PPT on Phishing
PPTX
Cross Site Scripting ( XSS)
PPT
Phishing attacks ppt
PPTX
Firewall and its purpose
PPTX
Password cracking and brute force
PPT
Introduction to Web Application Penetration Testing
PPTX
Introduction to WAF and Network Application Security
PDF
Burp suite
PPTX
Google Dorks and SQL Injection
PDF
Lecture #24 : Cross Site Request Forgery (CSRF)
PPTX
Azure AD B2C Webinar Series: Custom Policies Part 2 Policy Walkthrough
PPTX
Mobile security
PDF
OWASP Secure Coding Practices - Quick Reference Guide
PPTX
Network Security Issues
PPT
Information Security Principles - Access Control
PPT
Cross Site Request Forgery Vulnerabilities
Proxy Server
VPN & FIREWALL
PPT on Phishing
Cross Site Scripting ( XSS)
Phishing attacks ppt
Firewall and its purpose
Password cracking and brute force
Introduction to Web Application Penetration Testing
Introduction to WAF and Network Application Security
Burp suite
Google Dorks and SQL Injection
Lecture #24 : Cross Site Request Forgery (CSRF)
Azure AD B2C Webinar Series: Custom Policies Part 2 Policy Walkthrough
Mobile security
OWASP Secure Coding Practices - Quick Reference Guide
Network Security Issues
Information Security Principles - Access Control
Cross Site Request Forgery Vulnerabilities
Ad

Similar to Proxy (20)

PPT
Proxy Servers
PPTX
cybersecurity unit 5 basics of cybersecurity
PPT
Proxy Servers & Firewalls
PPT
Proxy Servers
PPT
Uses of proxies
PDF
Proxy Server
PPT
Firewall with proxy server.
PPTX
Firewall vpn proxy
PDF
Web+proxy Posts - Page 1
PPT
Proxy servers-firewalls
PDF
Why are Proxy Servers Important for Cybersecurity
DOCX
May proxy be_with_you
PPTX
Proxy Server: A Comprehensive Guide
PPT
Proxies
PPT
Proxy servers
PPT
Introduction to stable proxies.
PDF
Ce hv6 module 54 proxy server technologies
PPT
Reverse proxy
PPT
Unrestricted Internet Access Using a Proxy Server
Proxy Servers
cybersecurity unit 5 basics of cybersecurity
Proxy Servers & Firewalls
Proxy Servers
Uses of proxies
Proxy Server
Firewall with proxy server.
Firewall vpn proxy
Web+proxy Posts - Page 1
Proxy servers-firewalls
Why are Proxy Servers Important for Cybersecurity
May proxy be_with_you
Proxy Server: A Comprehensive Guide
Proxies
Proxy servers
Introduction to stable proxies.
Ce hv6 module 54 proxy server technologies
Reverse proxy
Unrestricted Internet Access Using a Proxy Server
Ad

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Five Habits of High-Impact Board Members
PDF
STKI Israel Market Study 2025 version august
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Hybrid model detection and classification of lung cancer
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
DOCX
search engine optimization ppt fir known well about this
PDF
Getting started with AI Agents and Multi-Agent Systems
PPT
Geologic Time for studying geology for geologist
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A review of recent deep learning applications in wood surface defect identifi...
Getting Started with Data Integration: FME Form 101
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Five Habits of High-Impact Board Members
STKI Israel Market Study 2025 version august
A contest of sentiment analysis: k-nearest neighbor versus neural network
Hindi spoken digit analysis for native and non-native speakers
CloudStack 4.21: First Look Webinar slides
Hybrid model detection and classification of lung cancer
Final SEM Unit 1 for mit wpu at pune .pptx
Enhancing emotion recognition model for a student engagement use case through...
search engine optimization ppt fir known well about this
Getting started with AI Agents and Multi-Agent Systems
Geologic Time for studying geology for geologist
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Zenith AI: Advanced Artificial Intelligence
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
WOOl fibre morphology and structure.pdf for textiles
A review of recent deep learning applications in wood surface defect identifi...

Proxy

  • 1. Proxy © 2014, Triad Square Infosec Pvt. Ltd.
  • 2. What is Proxy ? Communication between two computers (shown in grey) connected through a third computer (shown in red) acting as a proxy. © 2014, Triad Square Infosec Pvt. Ltd.
  • 3. Types of Proxy  Forward proxy  Open proxy  Reverse proxy © 2014, Triad Square Infosec Pvt. Ltd.
  • 4. Forward proxy  A forward proxy taking requests from an internal network and forwarding them to the Internet. © 2014, Triad Square Infosec Pvt. Ltd.
  • 5. Open proxy  An open proxy forwarding requests from and to anywhere on the Internet. Reference: en.wikipedia.org © 2014, Triad Square Infosec Pvt. Ltd.
  • 6. Reverse proxy  A reverse proxy taking requests from the Internet and forwarding them to servers in an internal network.  Those making requests connect to the proxy and may not be aware of the internal network. © 2014, Triad Square Infosec Pvt. Ltd.
  • 7. Squid Web Proxy Server © 2014, Triad Square Infosec Pvt. Ltd.
  • 8. Security Advantages  Terminates the TCP connection before relaying to target host (in and out)  Hide internal clients from external network  Blocking of dangerous URLs  Filter dangerous content  Check consistency of retrieved content  Single point of access, control and logging © 2014, Triad Square Infosec Pvt. Ltd.
  • 9. TCP connection termination The incoming and outgoing TCP connections are terminated Prevents a hacker from hijacking a stale (old) connection on a service that is being proxied. Example . HTTP page request request packet’ request packet Proxy User response packet Connection remain open until the proxy closes it after receiving response packet and sending it back to user Server response packet’ Connection only remain open until server closes the connection after sending the response packet © 2014, Triad Square Infosec Pvt. Ltd.
  • 10. Reference  en.wikipedia.org Thank You © 2014, Triad Square Infosec Pvt. Ltd.