[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] torifying applications


Thank you grarpamp for your reply. Rest assured I am doing my research for legit purposes. I am trying to see if it is possible to determine the identity of an attacker if he uses these applications behind tor. There are a few points I would like to understand. First, by bad performance do you mean throughput, cpu performance or latency( how quickly the replies are coming back). Also a socks proxy would not give the advantages of tor (as in the connections switching every n secs)??. Thank you for all your help.


Message: 6
Date: Sat, 18 Jun 2011 01:47:46 -0400
From: grarpamp <grarpamp@xxxxxxxxx>
Subject: Re: [tor-talk] Question regarding torifying applications
To: tor-talk@xxxxxxxxxxxxxxxxxxxx
Message-ID: <BANLkTi=LgdFYTZrnUT-ves0YAGZtVLR=gw@xxxxxxxxxxxxxx>
Content-Type: text/plain; charset=UTF-8

> is possible to build an application using TOR for
> anonymizing traffic from security applications like NMAP or NESSUS?

Yes. Use a SOCKS proxy or funnel all your traffic through
Tor with a packet filter. Many OS's deny LD_PRELOAD in
various cases, and raw packet generation doesn't apply.
Also, your performance will be absymal. Assuming for
the moment you're doing authorized/legitimate security
research, you'd be better off renting a commercial VPS.
As far as the specifics on how to do any of this, it's
pretty much outside the bounds of Tor, so check
with google or bing on that aspect
tor-talk mailing list