Nmap Development mailing list archives
Re: [tor-talk] Fwd: CALL FOR TESTING: new port scanning subsystem (allows scanning behind proxies, including Tor!)
From: Daniel Miller <bonsaiviking () gmail com>
Date: Fri, 3 Jul 2015 21:29:12 -0500
Jasey, Nsock supports HTTP proxies, so this should work for you. Currently, all of our proxy options require local name resolution, so they suffer from the classic "DNS leak" problem. This is something that we are aware of and working to address, but it requires more of an architectural redesign of the proxy chain mechanism, so it will take longer to accomplish. Dan On Fri, Jul 3, 2015 at 6:47 PM, Jasey DePriest <jrdepriest () gmail com> wrote:
I manage our corporate proxy, but we only support HTTP, SOCKS5, and FTP proxies. SOCKS4 is right out. Before downloading this, I'd like to know if it will even work with our setup. Thanks! Jasey On Fri, Jul 3, 2015 at 4:25 PM, Jacek Wielemborek <d33tah () gmail com> wrote:W dniu 03.07.2015 o 22:01, grarpamp pisze:One of the features that my modifications enable is performing port scanning behind proxies. I only scanned it using SOCKS4 server built into Tor ./nmap -sT --proxy socks4://localhost:9050 scanme.nmap.org Please do note that even though port scanning within Tor is possible, you cannot scan .onion names due to lack of SOCKS4A support.SOCKS4 and SOCKS4A are old and deprecated and should not be implemented (unless you're also implementing the current SOCKS5 and adding in 4/4A as a bonus). Tor supports SOCKS5 (and the deprecated 4/4A but it will complain). So scanning onions and anything else by name should be possible. SOCKS5 also supports IPv6 which is becoming the way of things. Therefore, implement SOCKS5 :)I think that SOCKS5 support within Nsock library (on which my modification depends) is planned. SOCKS5 also supports UDP, so it could bring even more benefits. For now, SOCKS4 has to do though. _______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- CALL FOR TESTING: new port scanning subsystem (allows scanning behind proxies, including Tor!) Jacek Wielemborek (Jul 03)
- Message not available
- Message not available
- Re: [tor-talk] Fwd: CALL FOR TESTING: new port scanning subsystem (allows scanning behind proxies, including Tor!) Jacek Wielemborek (Jul 03)
- Re: [tor-talk] Fwd: CALL FOR TESTING: new port scanning subsystem (allows scanning behind proxies, including Tor!) Jasey DePriest (Jul 03)
- Re: [tor-talk] Fwd: CALL FOR TESTING: new port scanning subsystem (allows scanning behind proxies, including Tor!) Daniel Miller (Jul 03)
- Re: [tor-talk] Fwd: CALL FOR TESTING: new port scanning subsystem (allows scanning behind proxies, including Tor!) David Fifield (Jul 04)
- Message not available
- Message not available
- Re: CALL FOR TESTING: new port scanning subsystem (allows scanning behind proxies, including Tor!) David Fifield (Jul 04)
- Re: CALL FOR TESTING: new port scanning subsystem (allows scanning behind proxies, including Tor!) Jacek Wielemborek (Jul 04)
- Re: CALL FOR TESTING: new port scanning subsystem (allows scanning behind proxies, including Tor!) David Fifield (Jul 04)
- Re: CALL FOR TESTING: new port scanning subsystem (allows scanning behind proxies, including Tor!) Jacek Wielemborek (Jul 14)
- Re: CALL FOR TESTING: new port scanning subsystem (allows scanning behind proxies, including Tor!) Jacek Wielemborek (Jul 04)
- Re: CALL FOR TESTING: new port scanning subsystem (allows scanning behind proxies, including Tor!) David Fifield (Jul 04)
- Re: CALL FOR TESTING: new port scanning subsystem (allows scanning behind proxies, including Tor!) Jacek Wielemborek (Jul 04)