Offensive Tor Toolkit
  • Introduction
  • TL;DR
  • Toolkit Overview
    • Download
    • reverse-shell-over-tor
    • hidden-bind-shell
    • hidden-portforwarding
    • tcp2tor-proxy
  • PoC - Proof Of Concept
    • Overview
    • Gaining access with reverse-shell-over-tor
    • Multi-shell access with hidden-bind-shell
    • Pivoting with hidden-portforwarding and Chisel
    • Remote port forwarding with tcp2tor-proxy
Powered by GitBook
On this page

Was this helpful?

  1. PoC - Proof Of Concept

Overview

Previoustcp2tor-proxyNextGaining access with reverse-shell-over-tor

Last updated 3 years ago

Was this helpful?

In this section we will be showing how to use for pentesting over Tor. This suite of tools will allow us to execute exploitation and post-exploitation tasks from the victim preserving the attacker anonymity.

First of all, we have the following vulnerable scenario:

  • Victim1 serves a vulnerable service to Internet.

  • Victim2 serves a vulnerable service to the internal network and it has no access to Internet.

Offensive Tor Toolkit
Scenario