+ All Categories
Home > Internet > Anonymous Security Scanning and Browsing

Anonymous Security Scanning and Browsing

Date post: 23-Feb-2017
Category:
Upload: abhilash-venkata
View: 436 times
Download: 2 times
Share this document with a friend
18
Anonymous Scan Topics to be Covered • Why to be Anonymous – Scans and Browsing • What is TOR • Socks Proxy , DNS Leaks • Using TOR – Browser Level , Terminal (config) • Proxy chains ( config) • Using Nmap, nikto, burp with Tor
Transcript
Page 1: Anonymous Security Scanning and Browsing

Anonymous Scan

Topics to be Covered• Why to be Anonymous – Scans and Browsing• What is TOR• Socks Proxy , DNS Leaks• Using TOR – Browser Level , Terminal (config)• Proxy chains ( config)• Using Nmap, nikto, burp with Tor

Page 2: Anonymous Security Scanning and Browsing

Why to be Anonymous

• Privacy reasons – Citizens • Business need to keep Trade Secrets, Network

security • Govt – for its security• Military, Law enforcement orgs needs

anonymity to get their job done • Anonymity isn't cryptography, steganography

Operating Systems and Applications leak your info

Page 3: Anonymous Security Scanning and Browsing

Info. Getting leaked via

• Browser Plug-in, Cookies, Extensions, • Shockwave/Flash, Java, QuickTime and even

PDF

Page 4: Anonymous Security Scanning and Browsing

TOR “The onion router”

• online anonymity software and network• open source, freely available• active research environment

Estimated 3,00,000 daily Tor users

Page 5: Anonymous Security Scanning and Browsing

Works on Relay Principle

Each node knows only the previous hop and the next hop. No node in the path can discover the full path

Page 6: Anonymous Security Scanning and Browsing

• TOR uses Onion Routing • Onion Routing technique for anonymous

communication over a network. • Messages are encapsulated in layers of

encryption.

Page 7: Anonymous Security Scanning and Browsing

Socks Proxy

• It’s a Protocol / Socks – Socket Secure• A SOCKS server is a general

purpose proxy server that establishes a TCP connection to another server on behalf of a client

Page 8: Anonymous Security Scanning and Browsing

TOR Browser Level

• Download TOR• Run

Page 9: Anonymous Security Scanning and Browsing

Steps to Install1. Install TORsudo apt-get install tor2. Install proxychainssudo apt-get install proxychains3. Open /etc/proxychains.conf & add

[ProxyList] # add proxy here ... # meanwile # defaults set to "tor" socks4 127.0.0.1 9050

Page 10: Anonymous Security Scanning and Browsing

Start and Test TOR

1. sudo service tor start (llly, stop and restart)2. sudo tor status (to check the status)3. sudo proxychains firefox www.ipchicken.com

Page 11: Anonymous Security Scanning and Browsing
Page 12: Anonymous Security Scanning and Browsing
Page 13: Anonymous Security Scanning and Browsing
Page 14: Anonymous Security Scanning and Browsing

DNS Leaks

• traffic leaks outside of the secure connection to the network

• Under certain conditions, • OS will continue to use its default DNS servers

instead of the anonymous DNS servers • Results in DNS Leaks

Page 15: Anonymous Security Scanning and Browsing

Nmap, nikto

• sudo proxychains nmap -sT –PN < IP address>• sudo nikto proxychains <host>• For all command line scans…..

Page 16: Anonymous Security Scanning and Browsing

Scan on abc.com

Page 17: Anonymous Security Scanning and Browsing

IP belongs china’s ISP

Page 18: Anonymous Security Scanning and Browsing

Burp suite

• Install TOR• Go to <OPTIONS> • Set SOCKS as 127.0.0.1 9050• NOTE : – Proxy settings in foxy proxy and burp suite will

same as 127.0.0.1 8080


Recommended