Author Topic: Anonymous vulnerability scanning  (Read 822 times)

0 Members and 1 Guest are viewing this topic.

Offline anUser190

  • NULL
  • Posts: 2
  • Cookies: 0
    • View Profile
Anonymous vulnerability scanning
« on: February 15, 2015, 02:12:55 am »
These tutorials are from 2012:

http://www.andrehonsberg.com/article/anonymously-scan-targets-tor-nessus-socat-fedora-16-verne-linux

http://archive.oreilly.com/pub/post/launching_attacks_via_tor.html

What are people doing nowadays? Using VPN's to hide their ip instead? Tor can't handle the ICMP messages but it looks like VPNs can.

How would you prevent Nessus or openVAS from sending ICMP?



In those tutorials it looks like they are forwarding one port to one port:
Code: [Select]
./socat TCP4-LISTEN:8080,fork SOCKS4:127.0.0.1:10.0.0.1:80,
 but don't vulnerability scanners scan many ports? So would other ports still go through the socat tunnel? thanks