[tor-talk] Automatic vulnerability scanning of Tor Network?

Fabio Pietrosanti (naif) lists at infosecurity.ch
Fri Dec 23 02:13:33 PST 2011

On 12/22/11 12:35 PM, Jacob Appelbaum wrote:
> I really appreciate that you're not working for people who wish to do
> the Tor network harm. Please do consider the concerns of people in this
> thread and weight your actions against those people. They too are trying
> to help the network, the project, and the users.

Yes, i agree, we can find a common point.
We just all need to move in the same direction, with conflicts and
constructive criticism, but in the same direction.

> Hopefully we'll all meet at CCC for a mate to discuss this in person!

Let's try to sketch down on a etterpad or trac ticket an idea on how to
implement something like this in order to:
- evaluating and pushing hardening of system/network security of Tor nodes
- avoid/mitigate alerts and risks for Tor Operators

That way we can try to match the needs perceived by all different
parties, balancing the risk/return of the initiative.

I'm gonna dump in this email a set of useful links collected during
browsing to do that.

We are probably not interested in Nessus & Metasploit AutoPwn, but it's
important to know that anyone can just aggregate everything into a chain
of automatic portscanning + vulnerability scanning + vulnerability

Python NMAP (A python library which helps in using nmap port scanner):

Python NMAP XML Parsing Scripts (nmap xml to sqlite):

Plugin Spotlight: Import Nmap XML Results Into Nessus

MetaSploit AutoPwn Integration with Nessus:

Tor NetworkScanner/ExitAuthority:

Scripts to extract exit-node, relays and their listening port:

tor-talk mailing list
tor-talk at lists.torproject.org

----- End forwarded message -----
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

More information about the cypherpunks-legacy mailing list