Abstract:
The anonymizing network Tor is examined as one method of anonymizing port scanning tools and avoiding identification and retaliation. Performing anonymized port scans thr...Show MoreMetadata
Abstract:
The anonymizing network Tor is examined as one method of anonymizing port scanning tools and avoiding identification and retaliation. Performing anonymized port scans through Tor is possible using Nmap, but parallelization of the scanning processes is required to accelerate the scan rate.
Date of Conference: 28-30 September 2016
Date Added to IEEE Xplore: 17 November 2016
ISBN Information: