[{"data":1,"prerenderedAt":301},["ShallowReactive",2],{"\u002F2025\u002Fwhat-is-a-proxy":3,"surround-\u002F2025\u002Fwhat-is-a-proxy":292},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"title":8,"description":9,"date":10,"updated":10,"image":11,"categories":12,"tags":14,"recommend":6,"draft":6,"readingTime":15,"body":20,"_type":285,"_id":286,"_source":287,"_file":288,"_stem":289,"_extension":290,"_original_dir":291},"\u002F2025\u002Fwhat-is-a-proxy","2025",false,"","What is a Proxy?","In this article, we will talk about what a proxy is, what it does and what is its role in cyber security, and we will talk about examples with Burpsuite.","2025-08-07T08:58:18.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Fwhat-is-a-proxy\u002F1.jpg",[13],"Network",[],{"text":16,"minutes":17,"time":18,"words":19},"3 min read",2.04,122400,408,{"type":21,"children":22,"toc":273},"root",[23,39,44,49,56,61,68,73,121,128,133,146,152,157,196,202,207,268],{"type":24,"tag":25,"props":26,"children":27},"element","p",{},[28,31,37],{"type":29,"value":30},"text","A proxy is an intermediary server that intervenes between you and your destination (for example a website) ",{"type":24,"tag":32,"props":33,"children":34},"strong",{},[35],{"type":29,"value":36},"when you connect to the internet",{"type":29,"value":38},". The requests we make first go to the proxy, which forwards the request to the destination on your behalf and returns the response back to you. The most important feature is that this intermediary server can inspect, modify or block the content of your network traffic. It has more functions than the usual perception of hiding the IP address.",{"type":24,"tag":40,"props":41,"children":43},"pic",{"src":42},"https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Fwhat-is-a-proxy\u002F2.jpg",[],{"type":24,"tag":25,"props":45,"children":46},{},[47],{"type":29,"value":48},"Proxies do not just forward data packets like a simple gateway, they understand the data at the application layer (e.g. HTTP requests).",{"type":24,"tag":50,"props":51,"children":53},"h2",{"id":52},"basic-proxy-types",[54],{"type":29,"value":55},"Basic Proxy Types",{"type":24,"tag":25,"props":57,"children":58},{},[59],{"type":29,"value":60},"Proxies are divided into basic types according to who they work for and for what purpose.",{"type":24,"tag":62,"props":63,"children":65},"h3",{"id":64},"forward-proxy",[66],{"type":29,"value":67},"Forward Proxy",{"type":24,"tag":25,"props":69,"children":70},{},[71],{"type":29,"value":72},"This proxy is the intermediary that the user (client) uses to access the internet.",{"type":24,"tag":74,"props":75,"children":76},"ul",{},[77,99,110],{"type":24,"tag":78,"props":79,"children":80},"li",{},[81,91,93],{"type":24,"tag":82,"props":83,"children":88},"code",{"className":84,"id":86,"style":87},[85],"example-info","just-like-this","color: #00bb66",[89],{"type":29,"value":90},"Flow",{"type":29,"value":92},": ",{"type":24,"tag":82,"props":94,"children":96},{"className":95},[],[97],{"type":29,"value":98},"You -> Proxy -> Internet",{"type":24,"tag":78,"props":100,"children":101},{},[102,108],{"type":24,"tag":82,"props":103,"children":105},{"className":104,"id":86,"style":87},[85],[106],{"type":29,"value":107},"Purpose",{"type":29,"value":109},": It is often used in companies or schools to filter and secure internet traffic and block access to certain sites.",{"type":24,"tag":78,"props":111,"children":112},{},[113,119],{"type":24,"tag":82,"props":114,"children":116},{"className":115,"id":86,"style":87},[85],[117],{"type":29,"value":118},"Feature",{"type":29,"value":120},": For it to work, the proxy settings must be set in the user's browser or operating system (Non-Transparent Proxy)",{"type":24,"tag":122,"props":123,"children":125},"h4",{"id":124},"transparent-proxy",[126],{"type":29,"value":127},"Transparent Proxy",{"type":24,"tag":25,"props":129,"children":130},{},[131],{"type":29,"value":132},"It is a type of proxy that the user does not know exists and does not need to make any settings.",{"type":24,"tag":74,"props":134,"children":135},{},[136],{"type":24,"tag":78,"props":137,"children":138},{},[139,144],{"type":24,"tag":82,"props":140,"children":142},{"className":141,"id":86,"style":87},[85],[143],{"type":29,"value":107},{"type":29,"value":145},": It is often used by internet service providers (ISPs) to filter content without users' knowledge or for caching to load frequently visited sites faster.",{"type":24,"tag":62,"props":147,"children":149},{"id":148},"reverse-proxy",[150],{"type":29,"value":151},"Reverse Proxy",{"type":24,"tag":25,"props":153,"children":154},{},[155],{"type":29,"value":156},"This proxy is a tool that the server uses to protect itself from the internet. It handles requests from the outside to the server.",{"type":24,"tag":74,"props":158,"children":159},{},[160,175,185],{"type":24,"tag":78,"props":161,"children":162},{},[163,168,169],{"type":24,"tag":82,"props":164,"children":166},{"className":165,"id":86,"style":87},[85],[167],{"type":29,"value":90},{"type":29,"value":92},{"type":24,"tag":82,"props":170,"children":172},{"className":171},[],[173],{"type":29,"value":174},"Internet -> Proxy -> Your Server",{"type":24,"tag":78,"props":176,"children":177},{},[178,183],{"type":24,"tag":82,"props":179,"children":181},{"className":180,"id":86,"style":87},[85],[182],{"type":29,"value":107},{"type":29,"value":184},": Protecting servers from DDos attacks, scanning incoming requests and blocking harmful ones (WAF - Web Application Firewall), load balancing.",{"type":24,"tag":78,"props":186,"children":187},{},[188,194],{"type":24,"tag":82,"props":189,"children":191},{"className":190,"id":86,"style":87},[85],[192],{"type":29,"value":193},"Example",{"type":29,"value":195},": Cloudflare",{"type":24,"tag":50,"props":197,"children":199},{"id":198},"lets-visualize-with-burp-suite",[200],{"type":29,"value":201},"Let's Visualize with Burp Suite",{"type":24,"tag":25,"props":203,"children":204},{},[205],{"type":29,"value":206},"Let's visualize what a proxy is by using the proxy inside BurpSuite.",{"type":24,"tag":208,"props":209,"children":210},"ol",{},[211,236,245,254,263],{"type":24,"tag":78,"props":212,"children":213},{},[214,216,222,224,230,232],{"type":29,"value":215},"First let's open a default BurpSuite project and go to the top tabs ",{"type":24,"tag":82,"props":217,"children":219},{"className":218},[],[220],{"type":29,"value":221},"proxy",{"type":29,"value":223}," and then ",{"type":24,"tag":82,"props":225,"children":227},{"className":226},[],[228],{"type":29,"value":229},"Intercept",{"type":29,"value":231},".",{"type":24,"tag":40,"props":233,"children":235},{"src":234},"https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Fwhat-is-a-proxy\u002F3.jpg",[],{"type":24,"tag":78,"props":237,"children":238},{},[239,241],{"type":29,"value":240},"Now let's open interception and then open browser to create a request. This will open the brupsuite browser which is already proxied.",{"type":24,"tag":40,"props":242,"children":244},{"src":243},"https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Fwhat-is-a-proxy\u002F4.jpg",[],{"type":24,"tag":78,"props":246,"children":247},{},[248,250],{"type":29,"value":249},"Let's open a website in the browser, the goal is to create a request.",{"type":24,"tag":40,"props":251,"children":253},{"src":252},"https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Fwhat-is-a-proxy\u002F5.jpg",[],{"type":24,"tag":78,"props":255,"children":256},{},[257,259],{"type":29,"value":258},"Now if we look at our burpsuite screen, we can see the blocked requests and change them if we want.",{"type":24,"tag":40,"props":260,"children":262},{"src":261},"https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Fwhat-is-a-proxy\u002F6.jpg",[],{"type":24,"tag":78,"props":264,"children":265},{},[266],{"type":29,"value":267},"As you can see, our requests are blocked and the page does not open. In this section, we can forward requests by saying forward or other operations.",{"type":24,"tag":25,"props":269,"children":270},{},[271],{"type":29,"value":272},"As you can see, with BrupSuit's proxy we were able to intercept requests from the browser and inspect or modify them. This simple but effective step hopefully gave a better understanding of the concept of proxy.",{"title":7,"searchDepth":274,"depth":274,"links":275},4,[276,284],{"id":52,"depth":277,"text":55,"children":278},2,[279,283],{"id":64,"depth":280,"text":67,"children":281},3,[282],{"id":124,"depth":274,"text":127},{"id":148,"depth":280,"text":151},{"id":198,"depth":277,"text":201},"markdown","content:posts:2025:what-is-a-proxy.md","content","posts\u002F2025\u002Fwhat-is-a-proxy.md","posts\u002F2025\u002Fwhat-is-a-proxy","md","\u002Fposts",[293,297],{"_path":294,"title":295,"date":296},"\u002F2025\u002F2-dev-null-command-what-is-and-what-is-useful","What is the 2>\u002Fdev\u002Fnull Command and What Does It Do?","2025-05-03T12:55:53.000Z",{"_path":298,"title":299,"date":300},"\u002F2025\u002Fbasic-structure-of-ipv4-subnetting","Basic Structure of IPv4 - Subnetting","2025-08-07T18:08:26.000Z",1777022959492]