Nmap Development mailing list archives

Re: New Snowden leak: British spy agency has secret program to enhance Nmap for stealthier scanning through Tor


From: Darren M <infodox () riseup net>
Date: Tue, 15 Jul 2014 19:44:20 +0000


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello list,

This is already pretty much implemented as part of nmap at this stage.

nmap --proxy socks4://127.0.0.1:9050 -sC -iL targets.txt

That does the trick for me, although if they have some way of
parallelizing it or something to make it "go faster" (I guess a set of
scripts that do this over a few tor instances and send NEWNYM signals
frequently to change the next connections source IP address?) it would
be nice to figure out.

- -Darren
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJTxYSUAAoJEKg+L8UULE9zWGIH/18KFtS+VQ3m0WEZCPA3jn0U
+/XTDjIPrcGnu3FOp8M61/PVC7nE1NI1VJWlqhblKqezp15ft+cNqbDkVcmvXF4S
SF/d0z0+R9JZyygBEvXUojiTTRHbY2KZnD8iE7/sRacQ3+ZVPaVjLjTbOrA3GlDL
kBEaX2hddl+eAqBStvqe+wjWejW/ZCm6KwsRhizCGfYQTjKGWLQX+pW+tYkOs3wH
6yFAfzlMRIBHViBOIhHir88STaFlGoy+HB2wBxMyB97K3Ehc6yb2c+Ox4tkqQjTJ
oY1rdL+a7ADQMjqp4jAPqNrJQqZLHSspjeWyg6b/z8YbgKBx2TqfPgdN+9LUmj8=
=sz1a
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: