Do you have a question? Post it now! No Registration Necessary. Now with pictures!
- Posted on
January 2, 2006, 9:33 am
rate this thread
when i use socat to relay for example port 80 at 127.0.0.1 to some other
server with tor, i get access to that page in my browser at 127.0.0.1.
When i scan it with nessus, i get to know that a webserver is running but not
much more, however, when im scaning the targethost directly, i get a lot more
information about the server, why?
I would be gratefull if someone could help me with this.
First, tor being a TCP thingee cannot technically anonymize all the
goodies Nessus uses in terms of variously crafted packets in order to
do its thing.
Second, for what legitimate, legal, white hat purposes are you in need
of Nessus scanning over tor? If your aims are not legal and do not
have consent of the owners of the target boxes, then I'm afraid the
legit security community won't be eager to assist.
- » Spy Sheriff - so how do people get infected w/ this thing?
- — Previous thread in » General Computer Security