Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.
Anonymity in Dark Web
Hita Barasm Mamagani
Dec. 2019 – Network Security Course (by Dr Akbari)
Iran University of Science a...
29 Dec.
2019Anonymity in DarkWeb - Hita Barasm Mamagani 2
Why Anonymity?!
Hide identity (not content) from
service provider
Hide browsing pattern from ISP
(and else)
Conceal Int...
Anonymity Layer
29 Dec.
2019Anonymity in Dark Web - Hita Barasm Mamagani 4
Hide the Source,
Destination and
Content of
Int...
Anonymity Projects
Tor Project
I2P (Invisible Internet Project)
Freenet
ZeroNet
Tails (OS based on Tor connections)
2...
Tor Project
Conceal user’s identity and their
online activity from surveillance
and traffic analysis
Done by passing the...
29 Dec.
2019Anonymity in DarkWeb - Hita Barasm Mamagani 7
Hidden Services
Server can offer TCP service
without revealing its IP address
Most popular hidden services:
Silk Road: ...
Hidden Service Address
Address with 2 parts
First part is a hash generated by
Tor
Second part is a domain type of
Onion...
How Tor Works?
All data have fixed sizes
Generate session keys between
user and nodes via Asymmetric
encryption
Encrypt...
Tor Architecture
29 Dec.
2019Anonymity in Dark Web - Hita Barasm Mamagani 11
Tor Architecture (Cont.)
29 Dec.
2019Anonymity in Dark Web - Hita Barasm Mamagani 12
Client
Server
Router A
Router B
Route...
Packet in Tor Network
29 Dec.
2019Anonymity in Dark Web - Hita Barasm Mamagani 13
Autonomous
Eavesdropping
An AS exists on both entry and exit
node of request path
Statistically correlate traffic on ent...
Exit Node Eavesdropping
Tor does not encrypt the traffic
between exit node and target
server
Exit nodes do not use any e...
Sniper Attack
Attacker creates his own exit node
Has a colluding client and server
Attacks to other exit nodes by
filli...
Exit Node Block
Operators of Internet sites prevent
traffic incoming from Tor exit nodes
Web services like Wikipedia, BB...
Dangers of using Tor
Entry and exit nodes are vulnerable
to packet sniffing
Exit node gets full plaintext of
client’s re...
19
Any further Questions?
Thanks for giving your time and
patience. 29 Dec.
2019Anonymity in Dark Web - Hita Barasm Mamagani ...
Prochain SlideShare
Chargement dans…5
×

sur

Anonymity in Dark Web Slide 1 Anonymity in Dark Web Slide 2 Anonymity in Dark Web Slide 3 Anonymity in Dark Web Slide 4 Anonymity in Dark Web Slide 5 Anonymity in Dark Web Slide 6 Anonymity in Dark Web Slide 7 Anonymity in Dark Web Slide 8 Anonymity in Dark Web Slide 9 Anonymity in Dark Web Slide 10 Anonymity in Dark Web Slide 11 Anonymity in Dark Web Slide 12 Anonymity in Dark Web Slide 13 Anonymity in Dark Web Slide 14 Anonymity in Dark Web Slide 15 Anonymity in Dark Web Slide 16 Anonymity in Dark Web Slide 17 Anonymity in Dark Web Slide 18 Anonymity in Dark Web Slide 19 Anonymity in Dark Web Slide 20
Prochain SlideShare
What to Upload to SlideShare
Suivant
Télécharger pour lire hors ligne et voir en mode plein écran

0 j’aime

Partager

Télécharger pour lire hors ligne

Anonymity in Dark Web

Télécharger pour lire hors ligne

These slides were presented at the Iran University of Science and Technology. It was for Network Security course in Winter 2019.

Livres associés

Gratuit avec un essai de 30 jours de Scribd

Tout voir
  • Soyez le premier à aimer ceci

Anonymity in Dark Web

  1. 1. Anonymity in Dark Web Hita Barasm Mamagani Dec. 2019 – Network Security Course (by Dr Akbari) Iran University of Science and Technology
  2. 2. 29 Dec. 2019Anonymity in DarkWeb - Hita Barasm Mamagani 2
  3. 3. Why Anonymity?! Hide identity (not content) from service provider Hide browsing pattern from ISP (and else) Conceal Internet usage from hackers Circumvent censorship (Most in IRAN) 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 3
  4. 4. Anonymity Layer 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 4 Hide the Source, Destination and Content of Internet flows from eavesdroppers
  5. 5. Anonymity Projects Tor Project I2P (Invisible Internet Project) Freenet ZeroNet Tails (OS based on Tor connections) 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 5
  6. 6. Tor Project Conceal user’s identity and their online activity from surveillance and traffic analysis Done by passing the data through a circuit of at least three different routers (nodes) Data through the network is encrypted No encryption at beginning and 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 6
  7. 7. 29 Dec. 2019Anonymity in DarkWeb - Hita Barasm Mamagani 7
  8. 8. Hidden Services Server can offer TCP service without revealing its IP address Most popular hidden services: Silk Road: Online marketplace for legal and illegal assets (until 2017) DuckDuckGo: Search engine for hidden services Hidden Wiki: Encyclopedia of Tor hidden services WallStreet Market: Another marketplace like Silk Road (until 2019) 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 8
  9. 9. Hidden Service Address Address with 2 parts First part is a hash generated by Tor Second part is a domain type of Onion 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 9 http://facebookcorewwwi.onion Facebook hash as Tor domain address
  10. 10. How Tor Works? All data have fixed sizes Generate session keys between user and nodes via Asymmetric encryption Encrypt packet with AES encryption algorithm SHA-1 digest of data for integrity checking 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 10
  11. 11. Tor Architecture 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 11
  12. 12. Tor Architecture (Cont.) 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 12 Client Server Router A Router B Router C
  13. 13. Packet in Tor Network 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 13
  14. 14. Autonomous Eavesdropping An AS exists on both entry and exit node of request path Statistically correlate traffic on entry and exit segments Find out which users communicate with which servers 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 14
  15. 15. Exit Node Eavesdropping Tor does not encrypt the traffic between exit node and target server Exit nodes do not use any end-to- end encryption such as TLS and SSL Any eavesdropper can get main source of data after passing data from exit node 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 15
  16. 16. Sniper Attack Attacker creates his own exit node Has a colluding client and server Attacks to other exit nodes by filling their queue memory Data of other clients will get through attacker’s exit node 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 16
  17. 17. Exit Node Block Operators of Internet sites prevent traffic incoming from Tor exit nodes Web services like Wikipedia, BBC and iPlayer have such rules 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 17
  18. 18. Dangers of using Tor Entry and exit nodes are vulnerable to packet sniffing Exit node gets full plaintext of client’s request Any legal and illegal traffic will be directed to exit node IP address Any Tor user get into NSA watch list 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 18
  19. 19. 19
  20. 20. Any further Questions? Thanks for giving your time and patience. 29 Dec. 2019Anonymity in Dark Web - Hita Barasm Mamagani 20

These slides were presented at the Iran University of Science and Technology. It was for Network Security course in Winter 2019.

Vues

Nombre de vues

38

Sur Slideshare

0

À partir des intégrations

0

Nombre d'intégrations

1

Actions

Téléchargements

0

Partages

0

Commentaires

0

Mentions J'aime

0

×