Visible to the public Anonymous port scanning: Performing network reconnaissance through Tor

TitleAnonymous port scanning: Performing network reconnaissance through Tor
Publication TypeConference Paper
Year of Publication2016
AuthorsRohrmann, R., Patton, M. W., Chen, H.
Conference Name2016 IEEE Conference on Intelligence and Security Informatics (ISI)
ISBN Number978-1-5090-3865-7
KeywordsAcceleration, anonymization, anonymizing port scanning tools, anonymous port scanning, computer communications software, Internet, IP networks, Linux, Management information systems, Network interfaces, Network reconnaissance, Nmap, Ports (Computers), pubcrawl, Reconnaissance, Resiliency, scan rate, scanning, scanning processes, Tor
Abstract

The anonymizing network Tor is examined as one method of anonymizing port scanning tools and avoiding identification and retaliation. Performing anonymized port scans through Tor is possible using Nmap, but parallelization of the scanning processes is required to accelerate the scan rate.

URLhttp://ieeexplore.ieee.org/document/7745475/
DOI10.1109/ISI.2016.7745475
Citation Keyrohrmann_anonymous_2016