Penetration Testing mailing list archives
RE: Pen-Testing via TOR
From: "Hagen, Eric" <ehagen () DenverNewspaperAgency com>
Date: Fri, 22 Jul 2005 09:35:37 -0600
TOR endpoint nodes also can enforce individual port preferences, in addition to the default blocked ports. For example, most TOR nodes won't relay NNTP. Many of them relay ONLY port 80 and 443. Some block port 21 too. Using TOR is a poor way to get some sort of reasonable pen-testing, because from minute to minute, the ports you can relay to are going to change and will make scanning and such things very unpredictable and hard to interpret. Eric -----Original Message----- From: andrew.thornton [mailto:andrew.thornton () thorntonindustries com] Sent: Thursday, July 21, 2005 6:10 PM To: Whodini Cc: pen-test () securityfocus com Subject: Re: Pen-Testing via TOR Importance: Low Tor will forward all SOCKS (versions 4, 4a and 5) compliant protocols. There is some packet enforcement going on by default within tor. It is called an exit policy. Here is the what is blocked by default: reject *:1214 reject *:4661-4666 reject *:6346-6429 reject *:6881-6999 The following sites may be helpful to you: http://www.infosecninja.org/content/view/16/28/ http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#CompatibleApplications http://www.socks.permeo.com/AboutSOCKS/SOCKSOverview.asp Whodini wrote:
I am trying to pentest a box of mine "remotely" by using TOR to make me hit the cloud first and then double back. What specific pen-test can I use, either for Win32 or Linux that will work through TOR, or a proxy?
Current thread:
- Pen-Testing via TOR Whodini (Jul 21)
- Re: Pen-Testing via TOR andrew.thornton (Jul 21)
- RE: Pen-Testing via TOR M. Shirk (Jul 21)
- <Possible follow-ups>
- RE: Pen-Testing via TOR Hagen, Eric (Jul 22)
- Re: Pen-Testing via TOR Jerome Athias (Jul 22)