Anonymously Scan a Remote Website Using Nmap

April 4, 2017 | Views: 22406

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

4 SIMPLE STEPS TO ANONYMOUSLY SCAN A REMOTE WEBSITE USING NMAP

Here are the materials required to successfully follow this tutorial:

  • A laptop with an access to the internet

  • A remote website that you own or that you have permission to access. In this tutorial, we will use the publicly available domain example.com

For this tutorial, I will suppose that you are using a Debian-based distribution, such as the popular ubuntu.

Note: Kali Linux comes with all these tools right from the box. So, if you have a working installation of Kali Linux, just skip the installation steps and go to step 4.

1. Install Nmap

Nmap is the tool most hackers use to conduct reconnaissance on a remote target.

So, in this tutorial, we will suppose that you have a minimal knowledge of how to use this tool.

To install Nmap, use the command line below:

sudo apt-get install nmap

2. Install TOR

Tor is the most used software in the world to protect privacy while surfing the internet and sometimes to access the deep/dark web.  So, in order to protect your privacy, you just have to download and install the tor browser from; https://www.torproject.org But, in this tutorial, we are going to use the command line version of TOR.

To install it, just type the following command:

sudo apt-get install tor

3. Install Proxychains

Proxychains is the tool used to send an application’s traffic through the network while staying anonymous. It is used to route all network traffic incoming and outgoing from an application to a local or remote proxy address. We will use it to route all the Nmap traffic through the anonymous network TOR.

To install proxy chains, just type:

sudo apt-get install proxychains

4. Start scanning anonymously

Once all these tools are installed, everything is correctly configured with the default setting, so you can start surfing anonymously without any problem.

sudo proxychains nmap -sT example.com

 

Note: Here we have used Nmap with proxy chains, but you can use any other command line or GUI tool you know with proxy chains and TOR as explained.

Thanks for reading this tutorial!

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
2 Comments
  1. how to configure proxychains in ubuntu ?

    • Hello,

      To configure proxychains, you have to modify its configuration file situated in : /etc/proxychains.conf

      Just type the following:
      #nano /etc/proxychains.conf

      when it opens the file, go to the last line, and you should see this:
      socks4 1327.0.0.1 9050

      This line refers to the default port on which tor is connected to.
      But, you can add as much lines as you want in order to add proxy sites.

      NB: You have to be root in order to modify this file, otherway the modification will not be applied.

      Since efficient use of proxychains is very large to talk about, I am going to write another
      article on How to efficiently use proxychains to hide your online presence.

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel