0

If a user is to fingerprint a server via SQL injection and doesn't want the server to be able to trace back. Is the only way to use a proxy/VPN?

Can queries and requests be sent through TOR network? Or would a user have to use multi-layer VPNs, bounces through different proxies before actual request?

techraf
  • 9,141
  • 11
  • 44
  • 62
John
  • 1
  • 1
  • The answers to this question will vary based on who your target is. If it's your friend's web server, then VPN is probably good enough. If the target can involve law enforcement, then VPN becomes very dubious. If the NSA is involved, then even Tor has questionable value. – Neil Smithline Apr 02 '16 at 17:08

1 Answers1

0

Yes all queries that can be sent over TCP can be sent over TOR.

v7d8dpo4
  • 267
  • 1
  • 5
  • While you answered one of the questions asked in the OP, I believe the OP is actually asking how to use the internet anonymously. You would need to expand your answer significantly to really answer that. – Neil Smithline Apr 02 '16 at 17:04