- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 394字
- 2021-06-24 18:45:02
Using Tor for penetration testing
Sometimes, web penetration testing may include bypassing certain protections, filtering or blocking from the server side, or avoiding being detected or identified in order to test in a manner similar to a real-world malicious hacker. The Onion Router (Tor) provides an interesting option to emulate the steps that a black hat hacker uses to protect their identity and location. Although an ethical hacker trying to improve the security of a web application should not be concerned about hiding their location, using Tor gives you the additional option of testing the edge security systems such as network firewalls, web application firewalls, and IPS devices.
Black hat hackers employ every method to protect their location and true identity; they do not use a permanent IP address and constantly change it in order to fool cybercrime investigators. If targeted by a black hat hacker, you will find port scanning requests from a different range of IP addresses, and the actual exploitation will have the source IP address that your edge security systems are logging into for the first time. With the necessary written approval from the client, you can use Tor to emulate an attacker by connecting to the web application from an unknown IP address form which the system does not normally see connections. Using Tor makes it more difficult to trace back the intrusion attempt to the actual attacker.
Tor uses a virtual circuit of interconnected network relays to bounce encrypted data packets. The encryption is multilayered, and the final network relay releasing the data to the public internet cannot identify the source of the communication, as the entire packet was encrypted and only a part of it is decrypted at each node. The destination computer sees the final exit point of the data packet as the source of the communication, thus protecting the real identity and location of the user. The following diagram from Electronic Frontier Foundation (https://www.eff.org) explains this process:

Kali Linux includes Tor preinstalled. For more information on how to use Tor and security considerations, refer to the Tor project's website at: https://www.torproject.org/.
- Social Media Mining with R
- 從零開始寫Linux內核:一書學透核心原理與實現
- 白話區塊鏈
- Installing and Configuring Windows 10:70-698 Exam Guide
- SharePoint 2013 應用開發實戰
- 計算機系統開發與優化實戰
- AWS Development Essentials
- jQuery UI Cookbook
- Linux網絡配置與安全管理
- UI設計手繪表現從入門到精通
- Multi-Cloud for Architects
- Implementing Domain-Specific Languages with Xtext and Xtend(Second Edition)
- 操作系統之哲學原理第2版
- 每天5分鐘玩轉Docker容器技術
- 電腦辦公(Windows 7 + Office 2013)入門與提高