SlideShare a Scribd company logo
1 of 26
Introduction to Tor
BY JASKARAN NARULA
About Me
Blogger
Security Enthusiast
Intern @Techilaw.com
Engineer
Agenda to Cover
1) Why do we need anonymity ?
2) Introduction to tor Network
2) What is Tor Browser(onion Browser )
3) How tor Works
4) Concept behind Tor
5) What is tor relay ? How to be safe with tor
6) How to be safe with tor
7) Deep Links on Tor
8) Deep Sources about Tor
9) Tor Services
Why Do we Need
Anonymity?
โ€ข To hide user identity from the website we
visit
โ€ข To hide our Internet usage from hacker
โ€ข To circumvent out Censorship
โ€ข To hide browsing pattern from Employer or
ISP
โ€ข To hide data packers even if they get
captured.
What is Onion Routing ??
Onion is a flexible communications infrastructure that is resistant to both
eavesdropping and traffic analysis.
Onion routing was a method developed where the transparency of
what is getting transferred was removed and messages and
communication was done in a encrypted form.
Onion routing was havinga lot of drawbacks due to which we need to
develop a lot of new and advance features so as we can't even get
tracked/monitored resulting we developed Tor Browser.
Onion/Tor Browser
๏ต The Onion Router (Tor) is an open-source software
program that allows users to protect their privacy and
security against a common form of Internet surveillance
known as traffic analysis. Tor was originally developed
for the U.S. Navy in an effort to protect government
communications. The name of the software originated
as an acronym for the Onion Router, but Tor is now the
official name of the program.
๏ต It is the most used software, due to the services it hosts,
in addition to its reliability over the years.
How Tor Works??
๏ต Tor uses the same methodology and concepts which onion routing was
using in it but tor also handles problems like traffic analysis, which has
become a big issue. For which tor network sends the data packets by
distributing your data over server places on the internet.
๏ต Now with this your connection is not directly established to any web server
along with you data packets do not take any common route to that
particular web server.
๏ต When we make a tor network, the tor software make a network where
there a different servers and which have the information that from where
the data is coming and to which next node/relay it needs to transfer.
๏ต No one individual server or the node knows the full path of the packet that
transfers through it.
Introduction to Tor Network
๏ต Tor aims to conceal its users' identities and their
online activity from surveillance and traffic analysis
by separating identification and routing.
๏ต This is done by passing the data through a circuit of
at least three different routers with packing the
message packets with multiple IPs.
๏ต The data that passes through the network is encrypted,
but at the beginning and end node, there is no
encryption.
Tor Routing
What is Tor Relay?
In a normal language you can call tor relays as normal routers, but with some
differences as well.
In normal routing our path can be captured from where the request is generated
and till where it will be going. Messages over this path are not encrypted.
Messages over tor network are always encrypted from end-to-end, but there are
some places where our request is not encrypted
I.e the starting relay and (if possible in most cases) end relay.
DNS and DNS LEAK
DNSLEAK is a website through which you can keep a track that what DNS you are giving to
a web server and what is your actually DNS.
How to use DNSLEAK
โ€ข To to www.dnsleak.com from a normal web browser check your current ip and ISP's
dns
โ€ข Now go to tor browser and then go this website and check your ip and ISP's dns.
Both the results will have a huge change.
Alternatives to Tor Browser
๏ต There are no. Of alternatives other than tor
which helps you to be anonymous over the web.
๏ต I2P
๏ต Trails
๏ต Subgraph OS
๏ต Freenet
๏ต Freepto
Do Tor has Weakness?!
Weakness of Tor
๏ต Autonomous System(AS)eavesdropping
๏ต Exit node eavesdropping
๏ต Traffic-analysis attack
๏ต Tor exit node block
๏ต Bad Apple attack
๏ต Sniper attack
๏ต Heartbleed bug
Autonomous System(AS)
Eavesdropping
If an Autonomous System (AS) exists on both path segments from a client
to entry relay and from exit relay to destination, such an AS can
statistically correlate traffic on the entry and exit segments of the path
and potentially infer the destination with which the client
communicated. In 2012, LAST or proposed a method to predict a set of
potential ASes on these two segments and then avoid choosing this
path during path selection algorithm on client side. In this paper, they
also improve latency by choosing shorter geographical paths between
client and destination.
Exit node eavesdropping
As Tor does not, and by design cannot, encrypt the traffic
between an exit node and the target server, any exit node is
in a position to capture any traffic passing through it that does
not use end-to-end encryption such as SSL or TLS. While this
may not inherently breach the anonymity of the source, traffic
intercepted in this way by self-selected third parties can
expose information about the source in either or both of
payload and protocol data
Bad Apple attack
This attack against Tor consists of two parts: (a) exploiting an insecure
application to reveal the source IP address of, or trace, a Tor user and (b)
exploiting Tor to associate the use of a secure application with the IP
address of a user (revealed by the insecure application). As it is not a
goal of Tor to protect against application-level attacks, Tor cannot be
held responsible for the first part of this attack. However, because Tor's
design makes it possible to associate streams originating from secure
application with traced users, the second part of this attack is indeed an
attack against Tor. The second part of this attack is called the bad apple
attack. (The name of this attack refers to the saying 'one bad apple spoils
the bunch.' This wording is used to illustrate that one insecure application
on Tor may allow to trace other applications.)
Heartbleed bug
๏ต Heartbleed is a security bug in the OpenSSL cryptography
library, which is a widely used implementation of the Transport
Layer Security(TLS) protocol. The vulnerability is classified as a
buffer over-read, a situation where software allows more data
to be read than should be allowed.
๏ต The Tor Project recommended that Tor relay operators and
hidden service operators revoke and generate fresh keys after
patching OpenSSL, but noted that Tor relays use two sets of
keys and that Tor's multi-hop design minimizes the impact of
exploiting a single relay.
How to be Safe with Tor
๏ต Close your Camera/mic (Physical Awareness)
๏ต Be aware of Fraud websites (Bitcoins), and many other
websites.
๏ต Don't use Windows. Just don't.
๏ต Do not use JavaScript over tor browser, Be very reluctant to
compromise on JavaScript, Flash and Java. Disable them all
by default.
โ€ข Do Encrypt your Data Storage
โ€ข Do delete Cookies and siteโ€™s Local Data
โ€ข Donโ€™t use your Real Email
โ€ข Donโ€™t use Tor Browser Bundle
โ€ข Do Update your System
Tor Services
๏ต Shopping Sites(Silk Road)
๏ต Search Engines
๏ต Illegal Sites
๏ต Forums
๏ต Hacking Communities
๏ต Bitcoin Mixers
๏ต Anonymous mail services
๏ต Tutorials Sites
๏ต Defense sites
๏ต Data dumps
๏ต Fake documents, fake passports, fake visa
๏ต Highly confidential documents
References :-
๏ต https://www.eff.org/torchallenge/what-is-tor.html
๏ต http://kpynyvym6xqi7wz2.onion/
๏ต Youtube vedios
๏ต Duck Duck go searches
Questions
&
Answers??!!
Thank you
Find me @
Mail me @ :- jaskaran@rootcrack.com
Twitter :- @JaskaranNarula
Linkedin :- https://www.linkedin.com/in/jaskaran-narula/

More Related Content

What's hot

The dark web
The dark webThe dark web
The dark web
Bella M
ย 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
James Bollen
ย 
The dark web
The dark webThe dark web
The dark web
hellboytonmoy
ย 

What's hot (20)

Onion protocol
Onion protocolOnion protocol
Onion protocol
ย 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
ย 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
ย 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
ย 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
ย 
Dark net
Dark netDark net
Dark net
ย 
Dark web
Dark webDark web
Dark web
ย 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
ย 
The dark web
The dark webThe dark web
The dark web
ย 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
ย 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
ย 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
ย 
ABOUT DARK WEB
ABOUT DARK WEB ABOUT DARK WEB
ABOUT DARK WEB
ย 
Deep web
Deep webDeep web
Deep web
ย 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
ย 
The dark web
The dark webThe dark web
The dark web
ย 
The Onion Routing (TOR)
The Onion Routing (TOR)The Onion Routing (TOR)
The Onion Routing (TOR)
ย 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
ย 
Deep Web & Dark Web
Deep Web & Dark WebDeep Web & Dark Web
Deep Web & Dark Web
ย 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
ย 

Similar to Introduction to Tor

Control the tradeoff between performance and anonymity through end to-end t (2)
Control the tradeoff between performance and anonymity through end to-end t (2)Control the tradeoff between performance and anonymity through end to-end t (2)
Control the tradeoff between performance and anonymity through end to-end t (2)
IAEME Publication
ย 
A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...
IAEME Publication
ย 
A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...
IAEME Publication
ย 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
nkrafacyberclub
ย 
(130727) #fitalk anonymous network concepts and implementation
(130727) #fitalk   anonymous network concepts and implementation(130727) #fitalk   anonymous network concepts and implementation
(130727) #fitalk anonymous network concepts and implementation
INSIGHT FORENSIC
ย 

Similar to Introduction to Tor (20)

Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
ย 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
ย 
.Onion
.Onion.Onion
.Onion
ย 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
ย 
Control the tradeoff between performance and anonymity through end to-end t (2)
Control the tradeoff between performance and anonymity through end to-end t (2)Control the tradeoff between performance and anonymity through end to-end t (2)
Control the tradeoff between performance and anonymity through end to-end t (2)
ย 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
ย 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptx
ย 
A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...
ย 
A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...
ย 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
ย 
tor
tortor
tor
ย 
Tor
TorTor
Tor
ย 
(130727) #fitalk anonymous network concepts and implementation
(130727) #fitalk   anonymous network concepts and implementation(130727) #fitalk   anonymous network concepts and implementation
(130727) #fitalk anonymous network concepts and implementation
ย 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)
ย 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
ย 
Tor
TorTor
Tor
ย 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
ย 
Tor Browser
Tor BrowserTor Browser
Tor Browser
ย 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
ย 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
ย 

Recently uploaded

( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
singhpriety023
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
SUHANI PANDEY
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
SUHANI PANDEY
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
imonikaupta
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
ย 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
SUHANI PANDEY
ย 

Recently uploaded (20)

( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
ย 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
ย 
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort ServiceEnjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort Service
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
ย 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
ย 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
ย 
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceBusty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
ย 
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort ServiceEnjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
ย 

Introduction to Tor

  • 1. Introduction to Tor BY JASKARAN NARULA
  • 3. Agenda to Cover 1) Why do we need anonymity ? 2) Introduction to tor Network 2) What is Tor Browser(onion Browser ) 3) How tor Works 4) Concept behind Tor 5) What is tor relay ? How to be safe with tor 6) How to be safe with tor 7) Deep Links on Tor 8) Deep Sources about Tor 9) Tor Services
  • 4. Why Do we Need Anonymity?
  • 5. โ€ข To hide user identity from the website we visit โ€ข To hide our Internet usage from hacker โ€ข To circumvent out Censorship โ€ข To hide browsing pattern from Employer or ISP โ€ข To hide data packers even if they get captured.
  • 6. What is Onion Routing ?? Onion is a flexible communications infrastructure that is resistant to both eavesdropping and traffic analysis. Onion routing was a method developed where the transparency of what is getting transferred was removed and messages and communication was done in a encrypted form. Onion routing was havinga lot of drawbacks due to which we need to develop a lot of new and advance features so as we can't even get tracked/monitored resulting we developed Tor Browser.
  • 7. Onion/Tor Browser ๏ต The Onion Router (Tor) is an open-source software program that allows users to protect their privacy and security against a common form of Internet surveillance known as traffic analysis. Tor was originally developed for the U.S. Navy in an effort to protect government communications. The name of the software originated as an acronym for the Onion Router, but Tor is now the official name of the program. ๏ต It is the most used software, due to the services it hosts, in addition to its reliability over the years.
  • 8.
  • 9. How Tor Works?? ๏ต Tor uses the same methodology and concepts which onion routing was using in it but tor also handles problems like traffic analysis, which has become a big issue. For which tor network sends the data packets by distributing your data over server places on the internet. ๏ต Now with this your connection is not directly established to any web server along with you data packets do not take any common route to that particular web server. ๏ต When we make a tor network, the tor software make a network where there a different servers and which have the information that from where the data is coming and to which next node/relay it needs to transfer. ๏ต No one individual server or the node knows the full path of the packet that transfers through it.
  • 10. Introduction to Tor Network ๏ต Tor aims to conceal its users' identities and their online activity from surveillance and traffic analysis by separating identification and routing. ๏ต This is done by passing the data through a circuit of at least three different routers with packing the message packets with multiple IPs. ๏ต The data that passes through the network is encrypted, but at the beginning and end node, there is no encryption.
  • 12. What is Tor Relay? In a normal language you can call tor relays as normal routers, but with some differences as well. In normal routing our path can be captured from where the request is generated and till where it will be going. Messages over this path are not encrypted. Messages over tor network are always encrypted from end-to-end, but there are some places where our request is not encrypted I.e the starting relay and (if possible in most cases) end relay.
  • 13. DNS and DNS LEAK DNSLEAK is a website through which you can keep a track that what DNS you are giving to a web server and what is your actually DNS. How to use DNSLEAK โ€ข To to www.dnsleak.com from a normal web browser check your current ip and ISP's dns โ€ข Now go to tor browser and then go this website and check your ip and ISP's dns. Both the results will have a huge change.
  • 14. Alternatives to Tor Browser ๏ต There are no. Of alternatives other than tor which helps you to be anonymous over the web. ๏ต I2P ๏ต Trails ๏ต Subgraph OS ๏ต Freenet ๏ต Freepto
  • 15. Do Tor has Weakness?!
  • 16. Weakness of Tor ๏ต Autonomous System(AS)eavesdropping ๏ต Exit node eavesdropping ๏ต Traffic-analysis attack ๏ต Tor exit node block ๏ต Bad Apple attack ๏ต Sniper attack ๏ต Heartbleed bug
  • 17. Autonomous System(AS) Eavesdropping If an Autonomous System (AS) exists on both path segments from a client to entry relay and from exit relay to destination, such an AS can statistically correlate traffic on the entry and exit segments of the path and potentially infer the destination with which the client communicated. In 2012, LAST or proposed a method to predict a set of potential ASes on these two segments and then avoid choosing this path during path selection algorithm on client side. In this paper, they also improve latency by choosing shorter geographical paths between client and destination.
  • 18. Exit node eavesdropping As Tor does not, and by design cannot, encrypt the traffic between an exit node and the target server, any exit node is in a position to capture any traffic passing through it that does not use end-to-end encryption such as SSL or TLS. While this may not inherently breach the anonymity of the source, traffic intercepted in this way by self-selected third parties can expose information about the source in either or both of payload and protocol data
  • 19. Bad Apple attack This attack against Tor consists of two parts: (a) exploiting an insecure application to reveal the source IP address of, or trace, a Tor user and (b) exploiting Tor to associate the use of a secure application with the IP address of a user (revealed by the insecure application). As it is not a goal of Tor to protect against application-level attacks, Tor cannot be held responsible for the first part of this attack. However, because Tor's design makes it possible to associate streams originating from secure application with traced users, the second part of this attack is indeed an attack against Tor. The second part of this attack is called the bad apple attack. (The name of this attack refers to the saying 'one bad apple spoils the bunch.' This wording is used to illustrate that one insecure application on Tor may allow to trace other applications.)
  • 20. Heartbleed bug ๏ต Heartbleed is a security bug in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security(TLS) protocol. The vulnerability is classified as a buffer over-read, a situation where software allows more data to be read than should be allowed. ๏ต The Tor Project recommended that Tor relay operators and hidden service operators revoke and generate fresh keys after patching OpenSSL, but noted that Tor relays use two sets of keys and that Tor's multi-hop design minimizes the impact of exploiting a single relay.
  • 21. How to be Safe with Tor ๏ต Close your Camera/mic (Physical Awareness) ๏ต Be aware of Fraud websites (Bitcoins), and many other websites. ๏ต Don't use Windows. Just don't. ๏ต Do not use JavaScript over tor browser, Be very reluctant to compromise on JavaScript, Flash and Java. Disable them all by default.
  • 22. โ€ข Do Encrypt your Data Storage โ€ข Do delete Cookies and siteโ€™s Local Data โ€ข Donโ€™t use your Real Email โ€ข Donโ€™t use Tor Browser Bundle โ€ข Do Update your System
  • 23. Tor Services ๏ต Shopping Sites(Silk Road) ๏ต Search Engines ๏ต Illegal Sites ๏ต Forums ๏ต Hacking Communities ๏ต Bitcoin Mixers ๏ต Anonymous mail services ๏ต Tutorials Sites ๏ต Defense sites ๏ต Data dumps ๏ต Fake documents, fake passports, fake visa ๏ต Highly confidential documents
  • 24. References :- ๏ต https://www.eff.org/torchallenge/what-is-tor.html ๏ต http://kpynyvym6xqi7wz2.onion/ ๏ต Youtube vedios ๏ต Duck Duck go searches
  • 26. Thank you Find me @ Mail me @ :- jaskaran@rootcrack.com Twitter :- @JaskaranNarula Linkedin :- https://www.linkedin.com/in/jaskaran-narula/