May 2017
Intermediate to advanced
416 pages
21h 33m
English
Open a terminal and enter the following command:
# nmap -sV -Pn -n --proxies <comma separated list of proxies> <target>
This feature is implemented within Nsock, and not all Nmap features are supported. You need to be careful to avoid accidentally disclosing your origin IP address. For example, to scan a host through TOR, we can use this:
# nmap -sV -Pn -n --proxies socks4://127.0.0.1:9050 scanme.nmap.org Nmap scan report for scanme.nmap.org (45.33.32.156) Host is up (0.13s latency). Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.7 ((Ubuntu)) Service detection performed. Please report any incorrect results at https://nmap.org/submit/ ...
Read now
Unlock full access