Proxy List
Overview
Evidence: Proxy List Description: Collect information about proxy list Category: Network Platform: windows Short Name: prxy Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Background
Windows stores HTTP proxy configuration in the registry. Proxy settings control how Windows and Internet Explorer route HTTP/HTTPS traffic through proxy servers.
Proxy configuration can indicate normal corporate policy or malicious proxy settings used for traffic interception or C2 communication.
Data Collected
This collector gathers structured data about proxy list.
Proxy List Data
ProxyEnabled
Whether proxy is enabled
FALSE
ProxyAddress
Proxy server address and port
proxy.corp.local:8080
Collection Method
This evidence is collected as part of the System collector by reading:
HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings- ProxyEnable valueHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings- ProxyServer value
Forensic Value
Proxy configuration reveals network traffic routing and can indicate traffic interception. Investigators use this data to verify legitimate proxy usage, detect malicious proxy configurations, identify traffic interception attempts, correlate with network traffic patterns, and detect C2 proxy usage.
Last updated
Was this helpful?

