Overview
Last updated
Was this helpful?
Last updated
Was this helpful?
In this section we will be showing how to use Offensive Tor Toolkit for pentesting over Tor. This suite of tools will allow us to execute exploitation and post-exploitation tasks from the victim preserving the attacker anonymity.
First of all, we have the following vulnerable scenario:
Victim1 serves a vulnerable service to Internet.
Victim2 serves a vulnerable service to the internal network and it has no access to Internet.