Thursday, May 20, 2010

Nmap Using TOR Networks


A good video showing how to scan networks with Nmap using Tor network to stay anonymous.
An Attacker downloads and configure TorTunnel,TOR bundle and proxychains. After setting up everything, an attacker uses nmap to find out the services running on different IP addresses. The main purpose of this video to stay anonymous while scanning different networks.

1 comment:

  1. If you are interested in leaning more about wireless security my client Cisco is hosting Cisco Live at The Mandalay Bay Resort in Las Vegas...June 27th-July 1st.


Certified Ethical Hacker Network Security Internet Security Computer Security Wireless Network Security