I read alot that hackers attack a server by using proxies but how proxies allow them to do this.I also use proxies but all I do with these proxies is hiding my IP.is there any way to use hacking tools through proxies.I don't think so then how hackers use proxies for implementing an attack?