SlideShare a Scribd company logo
Anonymous Scan
Topics to be Covered
• Why to be Anonymous – Scans and Browsing
• What is TOR
• Socks Proxy , DNS Leaks
• Using TOR – Browser Level , Terminal (config)
• Proxy chains ( config)
• Using Nmap, nikto, burp with Tor
Why to be Anonymous
• Privacy reasons – Citizens
• Business need to keep Trade Secrets, Network
security
• Govt – for its security
• Military, Law enforcement orgs needs
anonymity to get their job done
• Anonymity isn't cryptography, steganography
Operating Systems and Applications leak your
info
Info. Getting leaked via
• Browser Plug-in, Cookies, Extensions,
• Shockwave/Flash, Java, QuickTime and even
PDF
TOR “The onion router”
• online anonymity software and network
• open source, freely available
• active research environment
Estimated 3,00,000
daily Tor users
Works on Relay Principle
Each node knows only the previous hop and the next
hop. No node in the path can discover the full path
• TOR uses Onion Routing
• Onion Routing  technique for anonymous
communication over a network.
• Messages are encapsulated in layers of
encryption.
Socks Proxy
• It’s a Protocol / Socks – Socket Secure
• A SOCKS server is a general
purpose proxy server that establishes a TCP
connection to another server on behalf of a
client
TOR Browser Level
• Download TOR
• Run
Steps to Install
1. Install TOR
sudo apt-get install tor
2. Install proxychains
sudo apt-get install proxychains
3. Open /etc/proxychains.conf & add
[ProxyList] # add proxy here ...
# meanwile
# defaults set to "tor"
socks4 127.0.0.1 9050
Start and Test TOR
1. sudo service tor start (llly, stop and restart)
2. sudo tor status (to check the status)
3. sudo proxychains firefox www.ipchicken.com
Anonymous Security Scanning and Browsing
Anonymous Security Scanning and Browsing
Anonymous Security Scanning and Browsing
DNS Leaks
• traffic leaks outside of the secure connection
to the network
• Under certain conditions,
• OS will continue to use its default DNS servers
instead of the anonymous DNS servers 
• Results in DNS Leaks
Nmap, nikto
• sudo proxychains nmap -sT –PN < IP address>
• sudo nikto proxychains <host>
• For all command line scans…..
Scan on abc.com
IP belongs china’s ISP
Burp suite
• Install TOR
• Go to <OPTIONS>
• Set SOCKS as 127.0.0.1 9050
• NOTE :
– Proxy settings in foxy proxy and burp suite will
same as 127.0.0.1 8080

More Related Content

PPTX
PPTX
Network scanning
PPTX
PPT
Nmap(network mapping)
PPT
Dynamic Port Scanning
PPTX
PDF
Irc how to sept 2012
PPTX
Internet and world wide web protocol (draft 2)
Network scanning
Nmap(network mapping)
Dynamic Port Scanning
Irc how to sept 2012
Internet and world wide web protocol (draft 2)

What's hot (20)

PPTX
Nmap and metasploitable
PPTX
Security Onion Advance
PPTX
Recon with Nmap
PPTX
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
PPTX
N map presentation
PDF
SSH Tunneling Recipes
PPTX
PDF
CNIT 50: 6. Command Line Packet Analysis Tools
PPTX
ODP
Wireless security beyond password cracking by Mohit Ranjan
PPTX
Netcat - A Swiss Army Tool
PPTX
Snort by SecArmour
PPT
Introduction to SSH
PPT
Sniffing in a Switched Network
KEY
Netscreen Policy Based Routing
PPTX
DRAFT Internet and world wide web protocol ; pu t ty ; telnet ; wireshark
PPTX
Team 5 presentation
PDF
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
PDF
Nmap commands
Nmap and metasploitable
Security Onion Advance
Recon with Nmap
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
N map presentation
SSH Tunneling Recipes
CNIT 50: 6. Command Line Packet Analysis Tools
Wireless security beyond password cracking by Mohit Ranjan
Netcat - A Swiss Army Tool
Snort by SecArmour
Introduction to SSH
Sniffing in a Switched Network
Netscreen Policy Based Routing
DRAFT Internet and world wide web protocol ; pu t ty ; telnet ; wireshark
Team 5 presentation
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Nmap commands
Ad

Viewers also liked (16)

PPTX
Mobile Application Security Testing (Static Code Analysis) of Android App
PPTX
The End of Anonymity on Anonymous Networks
PPTX
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
PPTX
Tor network seminar by 13504
PDF
Anonymizing Networks
PPTX
Onion protocol
PPTX
Tor Pivoting Networks Share
PPTX
Onion routing and tor: Fundamentals and Anonymity
PDF
I2P and the Dark Web
PPTX
Introduction to anonymity network tor
PPTX
Tor the onion router
PPT
Tor Presentation
PPTX
TOR NETWORK
PPT
Data collection methods
PPSX
Research tools &amp; data collection method_vipin
PPTX
Big Data - 25 Amazing Facts Everyone Should Know
Mobile Application Security Testing (Static Code Analysis) of Android App
The End of Anonymity on Anonymous Networks
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Tor network seminar by 13504
Anonymizing Networks
Onion protocol
Tor Pivoting Networks Share
Onion routing and tor: Fundamentals and Anonymity
I2P and the Dark Web
Introduction to anonymity network tor
Tor the onion router
Tor Presentation
TOR NETWORK
Data collection methods
Research tools &amp; data collection method_vipin
Big Data - 25 Amazing Facts Everyone Should Know
Ad

Similar to Anonymous Security Scanning and Browsing (20)

PPTX
Meek and domain fronting public
PDF
Penetration Testing Services Technical Description Cyber51
PDF
osint + python: extracting information from tor network and darkweb
PDF
TOR... ALL THE THINGS
PDF
Darknet
PPTX
501 ch 3 network technologies tools
PPTX
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
PDF
Setting Up .Onion Addresses for your Enterprise, v3.5
PPTX
wireshark
PPT
Proxy servers
PDF
Chap 1 Network Theory & Java Overview
PPT
Security attacks
PPTX
Network Penetration Testing
PDF
CNIT 121: 9 Network Evidence
PPTX
Shmoocon Epilogue 2013 - Ruining security models with SSH
PDF
CNIT 152: 9 Network Evidence
PDF
CNIT 152: 9 Network Evidence
PDF
Introduction to Tor
PPTX
port forwarding.pptx
PPT
Network security chapter 6 and 7 internet architecture
Meek and domain fronting public
Penetration Testing Services Technical Description Cyber51
osint + python: extracting information from tor network and darkweb
TOR... ALL THE THINGS
Darknet
501 ch 3 network technologies tools
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Setting Up .Onion Addresses for your Enterprise, v3.5
wireshark
Proxy servers
Chap 1 Network Theory & Java Overview
Security attacks
Network Penetration Testing
CNIT 121: 9 Network Evidence
Shmoocon Epilogue 2013 - Ruining security models with SSH
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence
Introduction to Tor
port forwarding.pptx
Network security chapter 6 and 7 internet architecture

Recently uploaded (20)

PPT
tcp ip networks nd ip layering assotred slides
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Introduction to the IoT system, how the IoT system works
PDF
Testing WebRTC applications at scale.pdf
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Internet___Basics___Styled_ presentation
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
DOCX
Unit-3 cyber security network security of internet system
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
Funds Management Learning Material for Beg
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Paper PDF World Game (s) Great Redesign.pdf
tcp ip networks nd ip layering assotred slides
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Decoding a Decade: 10 Years of Applied CTI Discipline
Introduction to the IoT system, how the IoT system works
Testing WebRTC applications at scale.pdf
Sims 4 Historia para lo sims 4 para jugar
Internet___Basics___Styled_ presentation
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
SAP Ariba Sourcing PPT for learning material
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Unit-3 cyber security network security of internet system
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
WebRTC in SignalWire - troubleshooting media negotiation
Funds Management Learning Material for Beg
522797556-Unit-2-Temperature-measurement-1-1.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Cloud-Scale Log Monitoring _ Datadog.pdf
Paper PDF World Game (s) Great Redesign.pdf

Anonymous Security Scanning and Browsing

  • 1. Anonymous Scan Topics to be Covered • Why to be Anonymous – Scans and Browsing • What is TOR • Socks Proxy , DNS Leaks • Using TOR – Browser Level , Terminal (config) • Proxy chains ( config) • Using Nmap, nikto, burp with Tor
  • 2. Why to be Anonymous • Privacy reasons – Citizens • Business need to keep Trade Secrets, Network security • Govt – for its security • Military, Law enforcement orgs needs anonymity to get their job done • Anonymity isn't cryptography, steganography Operating Systems and Applications leak your info
  • 3. Info. Getting leaked via • Browser Plug-in, Cookies, Extensions, • Shockwave/Flash, Java, QuickTime and even PDF
  • 4. TOR “The onion router” • online anonymity software and network • open source, freely available • active research environment Estimated 3,00,000 daily Tor users
  • 5. Works on Relay Principle Each node knows only the previous hop and the next hop. No node in the path can discover the full path
  • 6. • TOR uses Onion Routing • Onion Routing  technique for anonymous communication over a network. • Messages are encapsulated in layers of encryption.
  • 7. Socks Proxy • It’s a Protocol / Socks – Socket Secure • A SOCKS server is a general purpose proxy server that establishes a TCP connection to another server on behalf of a client
  • 8. TOR Browser Level • Download TOR • Run
  • 9. Steps to Install 1. Install TOR sudo apt-get install tor 2. Install proxychains sudo apt-get install proxychains 3. Open /etc/proxychains.conf & add [ProxyList] # add proxy here ... # meanwile # defaults set to "tor" socks4 127.0.0.1 9050
  • 10. Start and Test TOR 1. sudo service tor start (llly, stop and restart) 2. sudo tor status (to check the status) 3. sudo proxychains firefox www.ipchicken.com
  • 14. DNS Leaks • traffic leaks outside of the secure connection to the network • Under certain conditions, • OS will continue to use its default DNS servers instead of the anonymous DNS servers  • Results in DNS Leaks
  • 15. Nmap, nikto • sudo proxychains nmap -sT –PN < IP address> • sudo nikto proxychains <host> • For all command line scans…..
  • 18. Burp suite • Install TOR • Go to <OPTIONS> • Set SOCKS as 127.0.0.1 9050 • NOTE : – Proxy settings in foxy proxy and burp suite will same as 127.0.0.1 8080