Skip to content

Latest commit

 

History

History
17 lines (11 loc) · 734 Bytes

offsec-privacy.md

File metadata and controls

17 lines (11 loc) · 734 Bytes

Offensive Security Privacy

When conducting offensive security activities, it is often beneficial to employ stealth techniques to conceal our identity behind a veil of anonimity.
One such method is leveraging the Tor network to mask the IP address from which we are initiating our actions.

One can, for example, run a container that executes the Tor service and then launching enumeration and discovery tools using that container as a proxy (or running the tools directly from within the container):

FROM alpine:latest

RUN apk update && apk --no-cache add tor curl wget nmap jq # add other tools here

CDM tor