Tag: attacks

Metasploit, Tor

Launch attacks through the TOR network

Anonymity with Tor Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. To launch our attacks through the TOR network, we will use the socat program. Socat is a command line based utility that establishes two bidirectional byte streams and transfers data between them. …