Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors.

Slides:



Advertisements
Similar presentations
SOCIAL WEB MEDIA privacy and data mining part 2 4/12/2010.
Advertisements

SPATor: Improving Tor Bridges with Single Packet Authorization Paper Presentation by Carlos Salazar.
Tor: The Second-Generation Onion Router
A look into Bullet Proof Hosting November DefCamp 5 Silviu Sofronie – Head of Forensics
Tor – The Onion Router By: David Rollé. What is Tor?  Second generation Onion Routing  Aims to improve on first generation issues  Perfect Forward.
Module 5: Configuring Access to Internal Resources.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Firewalls and Intrusion Detection Systems
Server-Side vs. Client-Side Scripting Languages
A Usability Evaluation of the Tor Anonymity Network By Gregory Norcie.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
COEN 252: Computer Forensics Router Investigation.
Lesson 19 Internet Basics.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
4/19/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Aaron Johnson U.S. Naval Research Laboratory CSci 6545 George Washington University 11/18/2013.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Norman SecureSurf Protect your users when surfing the Internet.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
FIREWALL Mạng máy tính nâng cao-V1.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Windows 7 Firewall.
What’s New in Fireware v11.9.5
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Microsoft MVP (Enterprise Security) Microsoft Certified Trainer (18 years) Founder: Cybercrime Security Forum! Winner: Microsoft Speaker Idol 2006 Author:
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
The Silk Road: An Online Marketplace
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
LASTor: A Low-Latency AS-Aware Tor Client. Tor  Stands for The Onion Router  Goals: Anonymity ○ Each hop only knows previous and next hop on a path.
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Tor Bruce Maggs relying on materials from
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Can SSL and TOR be intercepted? Secure Socket Layer.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Tor Bruce Maggs relying on materials from
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Andrew Lewman The Tor Project
Anonymous Internet Protocols
Onions and Garlic: the protocols of I2P
The Onion Router Hao-Lun Hsu
Andrew Lewman
Tor Internals and Hidden Services
Anonymous Communication
Karen Reilly Andrew Lewman
Implementing TMG Server Publishing
Exercise ?: TOR.
Dark Web, Deep Web, and I2P Dante Taylor, Dayton Chamberlin, Kade Randall, Trevor, Tanner, Harshit Joshi, Troy.
Dark Web, I2P, and Deep Web Team 5
0x1A Great Papers in Computer Security
Anupam Das , Nikita Borisov
Anonymous Communication
Alex Guy packets (stars) tor routers users web servers (squares)
Anonymous Communications
Bruce Maggs relying on materials from
Bruce Maggs relying on materials from
Bruce Maggs relying on materials from
Presentation transcript:

Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Anonymity Systems  JAP  I2P  Freenet  Xerobank  Botnets

Freenet  Storage network p2p based  Shares files on your system to other nodes  Plausabile Deniability

I2P  Opposing design of Tor  UDP based  Darknet design  Java, Python, and C API’s  Mixed routing based on packets  Splits tunneling between upstream and downstream  “Garlic Routing” – mix streams together to prevent traffic analysis  Variable latency design

Tor  Tor (not TOR) – previously stood for The Onion Router  Provides a method of anonymity by passing data between proxies

Tor Network

Terminology  Cell – your message  Circuit – tunnel made up of relays  Entry Node: first hop into the Tor network  Exit Node: last hop before destination  Relay Node: middle hop  Bridge Node: nodes not listed in the Tor directory to evade filtering

Who’s Using Tor?  Whistleblowers  Wikileaks – runs hidden service  Militaries  field ops  command and control using hidden services  Chinese journalists and dissidents

Tor Project  501(c)(3) NFP  Freely available  Full spec and full documentation

Project Finances

Current Project Sponsors  Federal Grant:  International Program to Support Democracy Human Rights and Labor  $632,189  International Broadcasting Bureau  Voice of America, Radio Free Europe/Radio Liberty, Radio and TV Martí, Radio Free Asia, Radio Sawa/Alhurra TV  $270,000  Stichting.Net  Association of NFP’s in the Netherlands  $38,279  Google: $29,083  ITT: $27,000  Other: $9,997

Past Funders  DARPA and Naval Research Labratory  EFF –

Tor Performance

Number of Relays

Number of Users

Tor Tools  Torbutton  Tor Browser Bundle  Vidalia  TorCheck  Arm  Tor-ramdisk  Anthony G. Basile from Buffalo

Tor Control Port  Telnet to the control port  Create custom circuits (long or short)  Show live circuit information  Change configuration on the fly  Map a site to an exit node  Reload a configuration authenticate "“ extendcircuit 0 a,b,c,… extendcircuit 0 a,b setevents circ setconf confitem Mapaddress google.com=a.b Getconf confitem

Attacks

Tor Passive Attack Vectors  Traffic profiling – entry and exit analysis  Cleartext exit node transmission  Fingerprinting - OS, browser, configuration, activity  Timing correlation  Network partitioning  End to end Size correlation

Tor Active Attack Vectors  Compromised keys  Malicious web servers  Malicious Exit/Relay nodes  DoS non-controlled nodes  Timestamping and tagging  Injecting or replacing unencrypted info  Malicious Tor client

Tor Client Side Attacks  DNS rebinding  Disbanding attack – javascript, java, flash  History disclosure  Timezone information (partitioning)

Social Engineering Attacks  Getting more traffic  “Use my relay. I have huge tubes!”  “Nick’s relay sucks”  “I’ve added a feature to my node.”  Replacement  a2f2f e726f e636f6d2f f  Partitioning  “Don’t use servers from this country”  “These servers are amazing!”

More Info   Metrics.torproject.org  Blog.torproject.org  Check.torproject.org