I’m working with a squad, and we want to make pentest ans security analisys.
It would greatly help if we can decide which exact gateways I can enter and exit.
Is there a way to do it? Or It has to be a new feature?
I’m working with a squad, and we want to make pentest ans security analisys.
It would greatly help if we can decide which exact gateways I can enter and exit.
Is there a way to do it? Or It has to be a new feature?
What exactly are you trying to test?
nym-vpn-cli allows you to specify an entry and exit gateway while connecting, if that’s what you’re looking for.
Thanks, I’m trying to see if I can track someone thru the von. But I need to know the rute at lrast thr entry and exit points to asure my results
You can just use wireshark to see entrance node assuming you are penetrating in accordance with what the nsa sees you can also run a testnet instance to test out local adversaries running malicious nodes (testnet of course seriously please don’t keep longs on mainnet its a breach on contract now)
Cli works similar to vpn just more selection options
https://sandbox-explorer.nymtech.net/network-components/nodes
Then just have nodes run wireshark and start testing and have several instances connected however
If it’s tracking someone else please do this on testnet for testing only
Currently as far as I am aware of the client will not connect to the same entrance as exit node nor the identity running the nodes (I’m pretty sure not 100%, new to this)
If they connect to you only have their exit node if you were doing nsa test then you could have a list of potential exit nodes then spam them and see witch entrance node gets more traffic and if they are in your simulated spying jurisdiction see weather the uptick in traffic is noticeable enough to deduce a user you could also see if one of the entrance nodes reports low uptime or be connected to all or many entrance nodes (except the exit node/ provider) and see when you launch witch node slows down then if you can find their entrance have a (testnet of course) node in their same jurisdiction setup since it’s normally focused on that to connect then you would knock their guard offline until they connect to yours though on nym this is harder then let’s say tor since you only have general measurements as opposed to byte for byte if trying to break through 5 hop ai will probably be required and sizable amount of nodes ran once again, please testnet only this is one of if not the best vpn / internet network layer based privacy tools and thank you for contributing to security analysis of the nym vpn / mixnet