Currently I am doing a pentest exercise and I'd like to be able to "take this tool with me." What I mean is, integrate some proxy support. I'd like to be able to run this through my reverse socks proxy tunnel. I've tried simply invoking proxychains but it doesnt seem to work (as in all responses come back filtered). When I run the proxychains and nmap commands manually (copy/pasted from the debug log) it works.
[DEBUG] Running: nmap -Pn -F -T5 -vvvv 10.1.1.27 -oA "/tmp/sparta-75r25q0h-running/nmap/20200613090946-nmapfasttcp-10.1.1.27"
[DEBUG] Adding process to DB: nmap
[+] Parsing nmap xml file: /home/kali/Documents/Labs/pwk-lab-tool-output/nmap/20200613090946-nmapfasttcp-10.1.1.27.xml
[+] The process is done!
[+] Finished in 0.9970197677612305 seconds.
Hello again,
Currently I am doing a pentest exercise and I'd like to be able to "take this tool with me." What I mean is, integrate some proxy support. I'd like to be able to run this through my reverse socks proxy tunnel. I've tried simply invoking proxychains but it doesnt seem to work (as in all responses come back filtered). When I run the proxychains and nmap commands manually (copy/pasted from the debug log) it works.