Testing like a Ghost

Leverage SSH jump boxes and abuse privacy enhancing networks to maintain anonymity during your penetration test. We'll walk through establishing some simple threat models concerning anonymity and guide participants through solving each problem as they arise. In the end participants will understand the basics of chaining common and powerful tools such as SSH, netcat, Proxies, Metasploit and Meterpreter with the TOR anonymity network to maintain their anonymity while still being able to get their reverse shell.

Requirements will be a copy of Kali Linux.


He has three great loves in his life, his wife, his whiskey, and his computer.