- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 394字
- 2021-06-24 18:45:02
Using Tor for penetration testing
Sometimes, web penetration testing may include bypassing certain protections, filtering or blocking from the server side, or avoiding being detected or identified in order to test in a manner similar to a real-world malicious hacker. The Onion Router (Tor) provides an interesting option to emulate the steps that a black hat hacker uses to protect their identity and location. Although an ethical hacker trying to improve the security of a web application should not be concerned about hiding their location, using Tor gives you the additional option of testing the edge security systems such as network firewalls, web application firewalls, and IPS devices.
Black hat hackers employ every method to protect their location and true identity; they do not use a permanent IP address and constantly change it in order to fool cybercrime investigators. If targeted by a black hat hacker, you will find port scanning requests from a different range of IP addresses, and the actual exploitation will have the source IP address that your edge security systems are logging into for the first time. With the necessary written approval from the client, you can use Tor to emulate an attacker by connecting to the web application from an unknown IP address form which the system does not normally see connections. Using Tor makes it more difficult to trace back the intrusion attempt to the actual attacker.
Tor uses a virtual circuit of interconnected network relays to bounce encrypted data packets. The encryption is multilayered, and the final network relay releasing the data to the public internet cannot identify the source of the communication, as the entire packet was encrypted and only a part of it is decrypted at each node. The destination computer sees the final exit point of the data packet as the source of the communication, thus protecting the real identity and location of the user. The following diagram from Electronic Frontier Foundation (https://www.eff.org) explains this process:

Kali Linux includes Tor preinstalled. For more information on how to use Tor and security considerations, refer to the Tor project's website at: https://www.torproject.org/.
- Linux設備驅動開發詳解:基于最新的Linux4.0內核
- Mastering ElasticSearch
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- Windows Vista基礎與應用精品教程
- Google系統架構解密:構建安全可靠的系統
- 構建可擴展分布式系統:方法與實踐
- Mastering KVM Virtualization
- Learning Magento 2 Administration
- 一學就會:Windows Vista應用完全自學手冊
- iOS 8開發指南
- Hadoop Real-World Solutions Cookbook
- Docker容器技術與運維
- 完美應用Ubuntu(第4版)
- Windows 8玩全不求人
- Android Telephony原理解析與開發指南