| Signature Detail | |
| Sid | 1100686 |
| Summary | TOR is a proxy utility that allows internet users to surf anonymously |
| Impact | Bypass content filtering restrictions placed on the firewall |
| Detailed Information | TOR is the proxy surfing utility , executable file which changes the browser settings once executed and searches the fastest available proxy servers and establishes the encrypted connections with them. Thereby allowing the users to surf anonymously bypassing all the content filtering restrictions placed on the firewall . |
| Affected Systems | NA |
| Attack Scenarios | Executable that bypass the internet surfing restrictions thereby can surf any website |
| Ease of Attack | Application Available |
| False Positives | Not Known |
| False Negatives | Not Known |
| Corrective Action | Configure your security Devices to detect and block TOR |
| Contributors | CR Vulnerability Research Team |
| Additional References | NA |