Overview

In this section we will be showing how to use Offensive Tor Toolkit for pentesting over Tor. This suite of tools will allow us to execute exploitation and post-exploitation tasks from the victim preserving the attacker anonymity.

First of all, we have the following vulnerable scenario:

  • Victim1 serves a vulnerable service to Internet.

  • Victim2 serves a vulnerable service to the internal network and it has no access to Internet.

Last updated