
r/Pentesting

Tor vs ShadowNet - Unlinkability Comparison
In this video I show you the comparison of Tor and ShadowNet in being anonymous and identifiably unlinkable.
ShadowNet v2.1.0 (Fixed) ICMP issue and Kill-Switch
Fixed 2 issues that were a problem:
ICMP (Was not consistently staying disabled)
Killswitch (Was leaking host ip due to weak ip rules)
All other features should be working fine. Enjoy being a Ghost on Kali Linux and Parrot os Boys!!!
ShadowNet Cover Traffic In Action!
In this video you can see the outgoing traffic to the internet is 100kbit-1mbit.
No browsers are opened up on my Parrot OS it's just the terminal and nothing else, still you see traffic leaving my computer in flows of 100kbit-1mbit.
This proves the cover traffic of ShadowNet!
Even when you are not doing anything and are idle, traffic flows to the internet and makes it seem like you are doing something even when you are not.
When this happens, the packets released to the internet are fixed at 1200bytes (1156-1186)
The NSA or CIA can never track via the packet analysis method ever again! Use ShadowNet Today (v2.0.0 Officially released) ONLY FOR KALI LINUX AND PARROT OS
if you deploy weekly and pentest annually, you have 50 untested deploys for every test. think about that.
ship weekly = 52 deploys/year.
annual pentest = 1 evaluation/year.
51 of those deploys are untested at the time of the next test. and the next test will only find what's currently exploitable, not what existed for 6 months in between.
[the math on this gets ugly](refer link):
1/ annual model MTTD: ~180 days
2/ sprint-cadence model MTTD: ~14 days
3/ bugs caught early: 6× cheaper to fix
annual pentesting is compliance theater for any team shipping more than once a month. change my mind.