From the course: Deep Dive into Open-Source Intelligence

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Introduction to VPN and anonymizers

Introduction to VPN and anonymizers

From the course: Deep Dive into Open-Source Intelligence

Start my 1-month free trial

Introduction to VPN and anonymizers

- [Instructor] There may be times when you want to use active reconnaissance techniques while remaining anonymous. Anonymizers, such as Tor or Tails operating system, and virtual private networks, or VPNs, will allow you to perform active reconnaissance while being somewhat untraceable. It's important to keep in mind that anonymizers and VPNs limit your target's ability to point the finger back at you during post-incident forensics. However, properly configured monitoring and detection tools will probably alert the target to your offensive intentions. So don't make the mistake of thinking anonymizers and VPNs make you invisible. VPNs can be utilized during some active reconnaissance activity by encrypting and routing network traffic through third party servers in different locations. By directing network traffic through a third party, it makes tracking your system difficult for the defenders. As an extra layer of security,…

Contents