Presentation is loading. Please wait.

Presentation is loading. Please wait.

Exercise ?: TOR.

Similar presentations


Presentation on theme: "Exercise ?: TOR."— Presentation transcript:

1 Exercise ?: TOR

2 Overview Tor Overview Tor Exercise: Exploring Tor Hidden Services
The Network Tor Hidden Services Tor Exercise: Exploring Tor Hidden Services Defeating Tor Countermeasures: Staying Anonymous Conclusion

3 Tor Overview Tor (The Onion Router) is a system originally designed by the U.S. Naval Research Laboratory for protecting government communications. Now in the public domain, Tor has evolved to become a free-to-use distributed, anonymous network. Anyone can utilize Tor to anonymously browse the internet or anonymously host web-services (aka Tor Hidden Services).

4 Tor Overview: The Network
Your smartphone is basically a computer...this is an example of how easy it would be to gain access to a computer

5 Tor Overview: The Network
Your smartphone is basically a computer...this is an example of how easy it would be to gain access to a computer

6 Tor Overview: The Network
Your smartphone is basically a computer...this is an example of how easy it would be to gain access to a computer

7 Tor Overview: Hidden Services
Tor Hidden Services are web-services which are hosted anonymously on the Tor network. Combined with the anonymous payment system bitcoin, Tor hidden services have recently been utilized to host digital black markets.

8 Tor Hidden Services: Black Market

9 Tor Hidden Services: How it Works

10 Tor Hidden Services: How it Works

11 Tor Hidden Services: How it Works

12 Tor Hidden Services: How it Works

13 Tor Hidden Services: How it Works

14 Tor Hidden Services: How it Works

15 Accessing Tor: Exercise
We will use the Tor Browser Bundle -- a pre-packaged suite available for Windows/OSX/Linux Freely available at: This suite contains everything needed to route your web-traffic through the Tor network and to access Tor Hidden Services

16 Exercise Part 1: Running Tor
Browse to the “Tor Browser” folder and execute the “Start Tor Browser” shortcut. After Execution, the “Vidalia Control Panel” should appear. Once connected to the network (assuming network access) a browser window will open and confirm correct configuration.

17 Exercise Part 2: IP Comparison
To confirm that our home IP is indeed obscured, we go to google.com and search for “my ip.” Subsequently, we compare the IP reported by google to that reported by an identical query made in a non-tor-enabled browser.

18 Exercise Part 3: Network Visualization
After ensuring that our home IP is obscured, we can explore the Tor network and browse anonymously online. A visualization of the Tor network is provided by “View the Network” option in the Vidalia control panel.

19 Exercise Part 4: Network Visualization
A list of available Tor relays is displayed to the left of the world-map.

20 Exercise Part 5: Changing IP
Our apparent IP address can be changed at any time by clicking the “Use a New Identity” button on the Vidalia Control Panel. Once our identity has been changed, traffic will be routed through a new exit-node and will therefore appear to originate from a different IP address.

21 Exercise Part 6: Tor Hidden Services
Tor Hidden services are accessed via a URL not unlike a normal web address (though less user-friendly) Sites like “The Hidden Wiki” provide an index of hidden services. Navigate your Tor-enabled browser to WARNING: DO NOT CLICK ON RANDOM LINKS

22 Exercise Part 7: Tor Hidden Services
The Hidden Wiki provides links to commonly known Tor Hidden Services. The Commercial services section is especially interesting.

23 Defeating Tor Tor does not protect traffic at the boundaries of the network. “Bad Apple Attack” can reveal IP addresses of BitTorrent users on Tor ESIEA (French School) claims attack capable of decrypting Tor network traffic via DDOS to redirect network traffic to malicious nodes and statistical attack against third encryption layer. Possible to identify Hidden Services hosts by shutting off internet access to hosts via ISP cooperation.

24 Countermeasures: Stay Anonymous
How secure is Tor? Very secure if used properly. Most de-anonymization attacks are academic/impractical How further anonymity is ensured Utilize VPN at entry and exit to Tor network Bounce traffic through botnet/busybox bounces Don’t use home internet connection (e.g. use a coffee shop)

25 Conclusion Tor provides easy way for masses to anonymize traffic
Tor hidden services allow individuals to host web-services without revealing their home IP Ways to defeat Tor How to stay anonymous in the wake of novel attacks against Tor

26 Questions?


Download ppt "Exercise ?: TOR."

Similar presentations


Ads by Google