Metasploit, Tor

Launch attacks through the TOR network

Anonymity with Tor
Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. To launch our attacks through the TOR network, we will use the socat program.

Socat is a command line based utility that establishes two bidirectional byte streams and transfers data between them. Let’s assume that the IP address of our target machine is

We execute socat this way:

socat TCP4-LISTEN:3333,fork SOCKS4a:,socksport=9050

The above command sets up a socat proxy listening on our local system on port 3333 and forward any TCP requests to (port 80) via the SOCKS TOR proxy that is listening on on port 9050.

Now, to launch our attacks via tor and exploit the machine at IP address, we have to set the target IP to (RHOSTS) and remote port to 3333 (RPORT).

That’s it!