EvilZone

Hacking and Security => Hacking and Security => : anUser190 February 15, 2015, 02:12:55 AM

: Anonymous vulnerability scanning
: anUser190 February 15, 2015, 02:12:55 AM
These tutorials are from 2012:

http://www.andrehonsberg.com/article/anonymously-scan-targets-tor-nessus-socat-fedora-16-verne-linux (http://www.andrehonsberg.com/article/anonymously-scan-targets-tor-nessus-socat-fedora-16-verne-linux)

http://archive.oreilly.com/pub/post/launching_attacks_via_tor.html (http://archive.oreilly.com/pub/post/launching_attacks_via_tor.html)

What are people doing nowadays? Using VPN's to hide their ip instead? Tor can't handle the ICMP messages but it looks like VPNs can.

How would you prevent Nessus or openVAS from sending ICMP?



In those tutorials it looks like they are forwarding one port to one port:
:
./socat TCP4-LISTEN:8080,fork SOCKS4:127.0.0.1:10.0.0.1:80,
 but don't vulnerability scanners scan many ports? So would other ports still go through the socat tunnel? thanks