Exercise ?: TOR.

Slides:



Advertisements
Similar presentations
Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
Advertisements

How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
LEARN THE QUICK AND EASY WAY! VISUAL QUICKSTART GUIDE HTML and CSS 8th Edition Chapter 21: Publishing Your Pages on the Web.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
© British Telecommunications plc Network Filtering.
Tutorial 1: Getting Started with Adobe Dreamweaver CS4.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Lexmark Wireless Printer Adaptor Instructions Step 1. For a Mac, go to network preferences/ select built-in-ethernet and click on TCP/IP tab and annotate.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
1 After completing this lesson, you will be able to: Transfer your files to the Internet. Choose a method for posting your Web pages. Use Microsoft’s My.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Family Connection Collaborative Webs A Tool for Creating and Managing Web sites.
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Can SSL and TOR be intercepted? Secure Socket Layer.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
Tutorial 1 Getting Started with Adobe Dreamweaver CS5.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Guest Wireless Service Overview Andrew Rader November, 2013.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Windows Tutorial 5 Protecting Your Computer
    Customer Profile: If you have tech savvy customers, having your site secured for mobile users is recommended. Business Needs: With the growing number.
What they are and how to protect against them
Hotspot Shield Protect Your Online Identity
VPN Joshua Turner.
Instructor Materials Chapter 6 Building a Home Network
CS590B/690B Detecting Network Interference (Fall 2016)
What is the Internet? © EIT, Author Gay Robertson, 2016.
Deep and Dark on the Web By: Todd Careless.
Unit 11 Using the Internet & Browsing the Web
Tor Internals and Hidden Services
Anonymous Communication
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Internet LINGO.
USING ADOBE ACROBAT READER DC
Deep and Dark on the Web By: Jim Martin.
Welcome To : Group 1 VC Presentation
Cloud Connect Seamlessly
Internet Basics.
Privacy Through Anonymous Connection and Browsing
Welcome and thank you for choosing SharkGate
Anupam Das , Nikita Borisov
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Anonymous Communication
The dark web By Riley. Sampare.
Cyber security and Computer Misuse
Bruce Maggs relying on materials from
Cybersecurity and Cyberhygiene
Designing IIS Security (IIS – Internet Information Service)
Anonymous Communication
Bruce Maggs relying on materials from
Bruce Maggs relying on materials from
Presentation transcript:

Exercise ?: TOR

Overview Tor Overview Tor Exercise: Exploring Tor Hidden Services The Network Tor Hidden Services Tor Exercise: Exploring Tor Hidden Services Defeating Tor Countermeasures: Staying Anonymous Conclusion

Tor Overview Tor (The Onion Router) is a system originally designed by the U.S. Naval Research Laboratory for protecting government communications. Now in the public domain, Tor has evolved to become a free-to-use distributed, anonymous network. Anyone can utilize Tor to anonymously browse the internet or anonymously host web-services (aka Tor Hidden Services).

Tor Overview: The Network Your smartphone is basically a computer...this is an example of how easy it would be to gain access to a computer

Tor Overview: The Network Your smartphone is basically a computer...this is an example of how easy it would be to gain access to a computer

Tor Overview: The Network Your smartphone is basically a computer...this is an example of how easy it would be to gain access to a computer

Tor Overview: Hidden Services Tor Hidden Services are web-services which are hosted anonymously on the Tor network. Combined with the anonymous payment system bitcoin, Tor hidden services have recently been utilized to host digital black markets.

Tor Hidden Services: Black Market

Tor Hidden Services: How it Works

Tor Hidden Services: How it Works

Tor Hidden Services: How it Works

Tor Hidden Services: How it Works

Tor Hidden Services: How it Works

Tor Hidden Services: How it Works

Accessing Tor: Exercise We will use the Tor Browser Bundle -- a pre-packaged suite available for Windows/OSX/Linux Freely available at: https://www.torproject.org/projects/torbrowser.html.en This suite contains everything needed to route your web-traffic through the Tor network and to access Tor Hidden Services

Exercise Part 1: Running Tor Browse to the “Tor Browser” folder and execute the “Start Tor Browser” shortcut. After Execution, the “Vidalia Control Panel” should appear. Once connected to the network (assuming network access) a browser window will open and confirm correct configuration.

Exercise Part 2: IP Comparison To confirm that our home IP is indeed obscured, we go to google.com and search for “my ip.” Subsequently, we compare the IP reported by google to that reported by an identical query made in a non-tor-enabled browser.

Exercise Part 3: Network Visualization After ensuring that our home IP is obscured, we can explore the Tor network and browse anonymously online. A visualization of the Tor network is provided by “View the Network” option in the Vidalia control panel.

Exercise Part 4: Network Visualization A list of available Tor relays is displayed to the left of the world-map.

Exercise Part 5: Changing IP Our apparent IP address can be changed at any time by clicking the “Use a New Identity” button on the Vidalia Control Panel. Once our identity has been changed, traffic will be routed through a new exit-node and will therefore appear to originate from a different IP address.

Exercise Part 6: Tor Hidden Services Tor Hidden services are accessed via a URL not unlike a normal web address (though less user-friendly) Sites like “The Hidden Wiki” provide an index of hidden services. Navigate your Tor-enabled browser to http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page WARNING: DO NOT CLICK ON RANDOM LINKS

Exercise Part 7: Tor Hidden Services The Hidden Wiki provides links to commonly known Tor Hidden Services. The Commercial services section is especially interesting.

Defeating Tor Tor does not protect traffic at the boundaries of the network. “Bad Apple Attack” can reveal IP addresses of BitTorrent users on Tor ESIEA (French School) claims attack capable of decrypting Tor network traffic via DDOS to redirect network traffic to malicious nodes and statistical attack against third encryption layer. Possible to identify Hidden Services hosts by shutting off internet access to hosts via ISP cooperation. http://lifehacker.com/5674972/how-to-break-into-a-windows-pc-and-prevent-it-from-happening-to-you http://lifehacker.com/5681710/how-to-break-into-a-mac-and-prevent-it-from-happening-to-you

Countermeasures: Stay Anonymous How secure is Tor? Very secure if used properly. Most de-anonymization attacks are academic/impractical How further anonymity is ensured Utilize VPN at entry and exit to Tor network Bounce traffic through botnet/busybox bounces Don’t use home internet connection (e.g. use a coffee shop)

Conclusion Tor provides easy way for masses to anonymize traffic Tor hidden services allow individuals to host web-services without revealing their home IP Ways to defeat Tor How to stay anonymous in the wake of novel attacks against Tor

Questions?