[tor-talk] torifying applications

nikhil dhar nikhildhar1 at gmail.com
Sat Jun 18 17:59:27 UTC 2011


Hi,

Thank you grarpamp for your reply. Rest assured I am doing my research for
legit purposes. I am trying to see if it is possible to determine the
identity of an attacker if he uses these applications behind tor. There are
a few points I would like to understand. First, by bad performance do you
mean throughput, cpu performance or latency( how quickly the replies are
coming back). Also a socks proxy would not give the advantages of tor (as in
the connections switching every n secs)??. Thank you for all your help.

Nikhil








Message: 6
Date: Sat, 18 Jun 2011 01:47:46 -0400
From: grarpamp <grarpamp at gmail.com>
Subject: Re: [tor-talk] Question regarding torifying applications
To: tor-talk at lists.torproject.org
Message-ID: <BANLkTi=LgdFYTZrnUT-ves0YAGZtVLR=gw at mail.gmail.com>
Content-Type: text/plain; charset=UTF-8

> is possible to build an application using TOR for
> anonymizing traffic from security applications like NMAP or NESSUS?

Yes. Use a SOCKS proxy or funnel all your traffic through
Tor with a packet filter. Many OS's deny LD_PRELOAD in
various cases, and raw packet generation doesn't apply.
Also, your performance will be absymal. Assuming for
the moment you're doing authorized/legitimate security
research, you'd be better off renting a commercial VPS.
As far as the specifics on how to do any of this, it's
pretty much outside the bounds of Tor, so check
with google or bing on that aspect
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20110618/5803225e/attachment.htm>


More information about the tor-talk mailing list