This tool demonstrates a system for identifying the real IP address of a web user, regardless of proxy settings, using a combination of client-side technologies and custom services. No vulnerabilities are exploited by this tool. A properly configured Tor setup should not result in any identifying information being exposed. Have you used Metasploit for your penetration testing? This article looks at the Decloaking Engine. If you want to learn more about this extension to Metasploit read on...

The link for this article located at Metasploit is no longer available.