1
Hacking and Security / Anonymous vulnerability scanning
« on: February 15, 2015, 02:12:55 am »
These tutorials are from 2012:
http://www.andrehonsberg.com/article/anonymously-scan-targets-tor-nessus-socat-fedora-16-verne-linux
http://archive.oreilly.com/pub/post/launching_attacks_via_tor.html
What are people doing nowadays? Using VPN's to hide their ip instead? Tor can't handle the ICMP messages but it looks like VPNs can.
How would you prevent Nessus or openVAS from sending ICMP?
In those tutorials it looks like they are forwarding one port to one port:
but don't vulnerability scanners scan many ports? So would other ports still go through the socat tunnel? thanks
http://www.andrehonsberg.com/article/anonymously-scan-targets-tor-nessus-socat-fedora-16-verne-linux
http://archive.oreilly.com/pub/post/launching_attacks_via_tor.html
What are people doing nowadays? Using VPN's to hide their ip instead? Tor can't handle the ICMP messages but it looks like VPNs can.
How would you prevent Nessus or openVAS from sending ICMP?
In those tutorials it looks like they are forwarding one port to one port:
Code: [Select]
./socat TCP4-LISTEN:8080,fork SOCKS4:127.0.0.1:10.0.0.1:80,
but don't vulnerability scanners scan many ports? So would other ports still go through the socat tunnel? thanks