SlideShare una empresa de Scribd logo
1 de 49
CECS7130 – Advanced Computer Networks
TOR Pivoting Network -
The Onion Routing
By: Ricardo Robles Robles Masters of Eng. Software Engineering (Candidate)
July 26, 2014
Profesor: Othoniel Rodriguez Ph.D.
Reference
• TorProject.org
• https://en.wikipedia.org/wiki/Java_Anon_Proxy
• http://www.onion-router.net/
• https://en.wikipedia.org/wiki/Tor_%28anonymity_net
work%29
• http://www.technologyreview.com/video/413186/how
-tor-works/
• Tor Packet Analysis – Brent Muir
July 26, 2014
• Onion Routing
• Tor Network
• Tor Browser Bundle
• Anonymous Surfing
• Pivoting Networks
• Anonymity – it is not cryptography, crypto just
protects content, but not the privacy of what you
are doing.
April 10, 2014
General Terms & Keywords
Introduction
• Beginning - Tor was originally designed,
implemented, and deployed as a third-
generation Onion Routing Project of the U.S.
Naval Research Laboratory. It was originally
developed with the U.S. Navy in mind, for the
primary purpose of protecting government
communications. Today, it is used every day for
a wide variety of purposes by normal people, the
military, journalists, law enforcement officers,
activists, and many others.
July 26, 2014
• Tor is a network of virtual tunnels that allows
people and groups to improve their privacy and
security on the Internet.
• It also enables software developers to create
new communication tools with built-in privacy
features.
• Tor provides the foundation for a range of
applications that allow organizations and
individuals to share information over public
networks without compromising their privacy.
July 26, 2014
Overview
Overview
• Individuals use Tor to keep websites from
tracking them and their family members, or to
connect to news sites, instant messaging
services, or the like when these are blocked by
their local Internet providers.
• Tor's hidden services let users publish web sites
and other services without needing to reveal the
location of the site. Individuals also use Tor for
socially sensitive communication: chat rooms
and web forums for rape and abuse survivors, or
people with illnesses.
July 26, 2014
Overview
• Journalists use Tor to communicate more safely
with whistleblowers and dissidents. Non-
governmental organizations (NGOs) use Tor to
allow their workers to connect to their home
website while they're in a foreign country,
without notifying everybody nearby that they're
working with that organization.
July 26, 2014
Hidden Services 1
July 26, 2014
Hidden Services 2
July 26, 2014
Hidden Services 3
July 26, 2014
Hidden Services 4
July 26, 2014
Hidden Services 5
July 26, 2014
Hidden Services 6
July 26, 2014
Survey
July 26, 2014
Visual Video Representation
July 26, 2014
• http://www.technologyreview.com/video/4
13186/how-tor-works/
Tor Network Diagram
July 26, 2014
Why We Need Tor?
July 26, 2014
• Using Tor protects you against a common form of Internet
surveillance known as "traffic analysis." Traffic analysis
can be used to infer who is talking to whom over a public
network. Knowing the source and destination of your
Internet traffic allows others to track your behavior and
interests.
• This can impact your checkbook if, for example, an e-
commerce site uses price discrimination based on your
country or institution of origin. It can even threaten your
job and physical safety by revealing who and where you
are.
Why we Need Tor?
• For example, if you're travelling abroad
and you connect to your employer's
computers to check or send mail, you can
inadvertently reveal your national origin
and professional affiliation to anyone
observing the network, even if the
connection is encrypted.
July 26, 2014
The Onion Routing Solution
July 26, 2014
• If we protect a communications channel against
both eavesdropping and traffic analysis, and
remove identifying information from the data
stream, then we have anonymous and private
communication.
• Onion Routing provides socket connections that
are strongly resistant to both eavesdropping and
traffic analysis. The privacy of these socket
connections is moved beneath the application
layer and made application independent.
The Onion Routing Solution
• Unmodified Internet applications may use these
anonymous socket connections by means of
proxies. If the proxies anonymize the data
stream, anonymity may be layered on top of
anonymous socket connections. Onion Routing
was originally implemented on Sun Solaris 2.4
including proxies for HTTP (WWW), RLOGIN, e-
mail (SMTP), and FTP. Generation 2 Onion
Routing implementation, Tor, runs on most
common operating systems.
July 26, 2014
How Onion Routing Works:
• An application, instead of making a (socket)
connection directly to a destination machine,
makes a socket connection to an Onion Routing
Proxy. That Onion Routing Proxy builds an
anonymous connection through several other
Onion Routers to the destination. Each Onion
Router can only identify adjacent Onion Routers
along the route. Before sending data over an
anonymous connection, the first Onion Router
adds a layer of encryption for each Onion Router
in the route.
July 26, 2014
How Onion Routing Works:
• As data moves through the anonymous
connection, each Onion Router removes one
layer of encryption, so it finally arrives as
plaintext. This layering occurs in the reverse
order for data moving back to the initiator. Data
passed along the anonymous connection
appears different at each Onion Router, so data
cannot be tracked en route and compromised
Onion Routers cannot cooperate. When the
connection is broken, all information about the
connection is cleared at each Onion Router.
July 26, 2014
How Onion Routing Works:
• Onion Routing – A message is cascaded
through several routers:
• Sender defines whole path, choosing the
routers
• The message is encrypted in succession,
first with the symmetric key of the last
router, the result of that operation with the
penultimate router, and so on
• The encrypted message is sent through the
predefined path and each router only knows
the previous router and the next router
July 26, 2014
Tor Model:
July 26, 2014
Tor Relay Graph as of 4/29/2014
July 26, 2014
Tor Relay Platforms
July 26, 2014
Tor’s Code
• Tor's code released in 2002
• Tor's design paper published in 2004
• The clock starts ticking...
July 26, 2014
Basic Tor Design
July 26, 2014
Basic Tor Design
July 26, 2014
Basic Tor Design
July 26, 2014
Attackers Trying to Block Tor
users from connecting
• 1) By blocking the directory authorities
• 2) By blocking all the relay IP addresses in the
directory, or the addresses of other Tor services
• 3) By filtering based on Tor's network fingerprint
• 4) By preventing users from finding the Tor
software (usually by blocking website)
July 26, 2014
July 26, 2014
July 26, 2014
Blocked Sites in U.S.
July 26, 2014
Blocked Sites in the U.S.
• 2012christians.com
• 2012coolhats.com
• 23isking.com
• angelsjerseysstore.com
• authenticbullsshop.com
• authenticheatshop.com
• authenticlakersshop.com
• authenticmagicshop.com
• authenticmavericksshop.com
• authenticthundershop.com
• autoforms.info
July 26, 2014
July 26, 2014
Tor vs non-Tor Nerworks
July 26, 2014
Connections of Tor Users
July 26, 2014
Tor use in Blocked Countries
July 26, 2014
Two Circumvention Systems
• Circumvention – To go around or bypass
• UltraTurf-freeware to bypass censorship and
firewall censorship using HTTP Proxy, and
employs encryption.
• Distinguishable Behavior, Lots of
unnecessary data in logs, Evidence of
unproxied traffic
• Tor
• Looks like SSL Traffic
• No extra details in logs
July 26, 2014
Use of Tor network in Blocked
Countries
July 26, 2014
Tor use in Various Countries
July 26, 2014
Alternate to Tor
• Java Anon Proxy, JAP or JonDonym
• I2P
• HotSpot Shield
• Tunnelbear
• Vidalia
• Orbot
• FreeVPN.me
July 26, 2014
Tor Example Sites
• http://xmh57jrzrnw6insl.onion/ - Torch
• http://torlinkbgs6aabns.onion/index.php -
TorLinks
• http://2ogmrlfzdthnwkez.onion/ -
RentAHacker
• http://ybp4oezfhk24hxmb.onion/ - Hitman
Network (Contract Killers)
• http://en35tuzqmn4lofbk.onion/ -
USFakeIDs
July 26, 2014
July 26, 2014
July 26, 2014
July 26, 2014
Questions/Comments
July 26, 2014
July 26, 2014

Más contenido relacionado

La actualidad más candente

TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGSCrowdStrike
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Torantitree
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion routerAshly Liza
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Saprative Jana
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Thoughtworks
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network torKhaled Mosharraf
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAli Habeeb
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TORanjalika sinha
 

La actualidad más candente (18)

TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
 
TOR: The Onion Router
TOR: The Onion RouterTOR: The Onion Router
TOR: The Onion Router
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 
Tor browser
Tor browserTor browser
Tor browser
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion router
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
The Onion Routing (TOR)
The Onion Routing (TOR)The Onion Routing (TOR)
The Onion Routing (TOR)
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion Routing
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TOR
 
Tor Network
Tor NetworkTor Network
Tor Network
 

Destacado

Collaboration, Big Data and the search for the Higgs Boson
Collaboration, Big Data and the  search for the Higgs BosonCollaboration, Big Data and the  search for the Higgs Boson
Collaboration, Big Data and the search for the Higgs BosonSuma Pria Tunggal
 
Advanced penetration testing - Amarendra Godbole
Advanced penetration testing - Amarendra GodboleAdvanced penetration testing - Amarendra Godbole
Advanced penetration testing - Amarendra GodboleIndicThreads
 
The End of Anonymity on Anonymous Networks
The End of Anonymity on Anonymous NetworksThe End of Anonymity on Anonymous Networks
The End of Anonymity on Anonymous NetworksDenis Makrushin
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Anonymous Security Scanning and Browsing
Anonymous Security Scanning and BrowsingAnonymous Security Scanning and Browsing
Anonymous Security Scanning and BrowsingAbhilash Venkata
 
Easiest way to start with Shell scripting
Easiest way to start with Shell scriptingEasiest way to start with Shell scripting
Easiest way to start with Shell scriptingAkshay Siwal
 
Vodafone beta factory - GEC 2015
Vodafone beta factory - GEC 2015Vodafone beta factory - GEC 2015
Vodafone beta factory - GEC 2015Marcello Viti
 
Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networkspauldeng
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingNitish Kasar
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark WebJohn Liu
 
Reverse Engineering - Methods and Process
Reverse Engineering - Methods and ProcessReverse Engineering - Methods and Process
Reverse Engineering - Methods and ProcessLa_Lu
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
 
Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSHHemant Shah
 
Privacy is for losers 2016
Privacy is for losers 2016Privacy is for losers 2016
Privacy is for losers 2016Cain Ransbottyn
 
How to TEDx [Presentation Design Tips] - #TED #TEDX
How to TEDx [Presentation Design Tips] - #TED #TEDXHow to TEDx [Presentation Design Tips] - #TED #TEDX
How to TEDx [Presentation Design Tips] - #TED #TEDXEmpowered Presentations
 

Destacado (19)

Collaboration, Big Data and the search for the Higgs Boson
Collaboration, Big Data and the  search for the Higgs BosonCollaboration, Big Data and the  search for the Higgs Boson
Collaboration, Big Data and the search for the Higgs Boson
 
Advanced penetration testing - Amarendra Godbole
Advanced penetration testing - Amarendra GodboleAdvanced penetration testing - Amarendra Godbole
Advanced penetration testing - Amarendra Godbole
 
The End of Anonymity on Anonymous Networks
The End of Anonymity on Anonymous NetworksThe End of Anonymity on Anonymous Networks
The End of Anonymity on Anonymous Networks
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Anonymous Security Scanning and Browsing
Anonymous Security Scanning and BrowsingAnonymous Security Scanning and Browsing
Anonymous Security Scanning and Browsing
 
Easiest way to start with Shell scripting
Easiest way to start with Shell scriptingEasiest way to start with Shell scripting
Easiest way to start with Shell scripting
 
Vodafone beta factory - GEC 2015
Vodafone beta factory - GEC 2015Vodafone beta factory - GEC 2015
Vodafone beta factory - GEC 2015
 
Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networks
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
Ethical hacking with Python tools
Ethical hacking with Python toolsEthical hacking with Python tools
Ethical hacking with Python tools
 
NoSQL databases
NoSQL databasesNoSQL databases
NoSQL databases
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Reverse Engineering - Methods and Process
Reverse Engineering - Methods and ProcessReverse Engineering - Methods and Process
Reverse Engineering - Methods and Process
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
 
Privacy is for losers 2016
Privacy is for losers 2016Privacy is for losers 2016
Privacy is for losers 2016
 
tor
tortor
tor
 
How to TEDx [Presentation Design Tips] - #TED #TEDX
How to TEDx [Presentation Design Tips] - #TED #TEDXHow to TEDx [Presentation Design Tips] - #TED #TEDX
How to TEDx [Presentation Design Tips] - #TED #TEDX
 

Similar a Tor Pivoting Networks Share

Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...i_scienceEU
 
2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 201244CON
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetIRJET Journal
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsBiagio Botticelli
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensicsAnpumathews
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)Kaustubh Joshi
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceDEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceFelipe Prado
 
(130727) #fitalk anonymous network concepts and implementation
(130727) #fitalk   anonymous network concepts and implementation(130727) #fitalk   anonymous network concepts and implementation
(130727) #fitalk anonymous network concepts and implementationINSIGHT FORENSIC
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxtalkaton
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdftalkaton
 

Similar a Tor Pivoting Networks Share (20)

Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 
2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 2012
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Dark web
Dark webDark web
Dark web
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Tor
TorTor
Tor
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Dark net
Dark netDark net
Dark net
 
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceDEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
 
(130727) #fitalk anonymous network concepts and implementation
(130727) #fitalk   anonymous network concepts and implementation(130727) #fitalk   anonymous network concepts and implementation
(130727) #fitalk anonymous network concepts and implementation
 
Tor Tracer
Tor TracerTor Tracer
Tor Tracer
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
 

Último

Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangePredicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangeThinkInnovation
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...nirzagarg
 
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...kumargunjan9515
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制vexqp
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNKTimothy Spann
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...HyderabadDolls
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteedamy56318795
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...Elaine Werffeli
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...gajnagarg
 
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...kumargunjan9515
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...gajnagarg
 
Kings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about themKings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about themeitharjee
 
20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdfkhraisr
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.pptibrahimabdi22
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraGovindSinghDasila
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...nirzagarg
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Último (20)

Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangePredicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
 
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Kings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about themKings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about them
 
20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Tor Pivoting Networks Share

  • 1. CECS7130 – Advanced Computer Networks TOR Pivoting Network - The Onion Routing By: Ricardo Robles Robles Masters of Eng. Software Engineering (Candidate) July 26, 2014 Profesor: Othoniel Rodriguez Ph.D.
  • 2. Reference • TorProject.org • https://en.wikipedia.org/wiki/Java_Anon_Proxy • http://www.onion-router.net/ • https://en.wikipedia.org/wiki/Tor_%28anonymity_net work%29 • http://www.technologyreview.com/video/413186/how -tor-works/ • Tor Packet Analysis – Brent Muir July 26, 2014
  • 3. • Onion Routing • Tor Network • Tor Browser Bundle • Anonymous Surfing • Pivoting Networks • Anonymity – it is not cryptography, crypto just protects content, but not the privacy of what you are doing. April 10, 2014 General Terms & Keywords
  • 4. Introduction • Beginning - Tor was originally designed, implemented, and deployed as a third- generation Onion Routing Project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others. July 26, 2014
  • 5. • Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. • It also enables software developers to create new communication tools with built-in privacy features. • Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. July 26, 2014 Overview
  • 6. Overview • Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. • Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses. July 26, 2014
  • 7. Overview • Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non- governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization. July 26, 2014
  • 15. Visual Video Representation July 26, 2014 • http://www.technologyreview.com/video/4 13186/how-tor-works/
  • 17. Why We Need Tor? July 26, 2014 • Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. • This can impact your checkbook if, for example, an e- commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are.
  • 18. Why we Need Tor? • For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted. July 26, 2014
  • 19. The Onion Routing Solution July 26, 2014 • If we protect a communications channel against both eavesdropping and traffic analysis, and remove identifying information from the data stream, then we have anonymous and private communication. • Onion Routing provides socket connections that are strongly resistant to both eavesdropping and traffic analysis. The privacy of these socket connections is moved beneath the application layer and made application independent.
  • 20. The Onion Routing Solution • Unmodified Internet applications may use these anonymous socket connections by means of proxies. If the proxies anonymize the data stream, anonymity may be layered on top of anonymous socket connections. Onion Routing was originally implemented on Sun Solaris 2.4 including proxies for HTTP (WWW), RLOGIN, e- mail (SMTP), and FTP. Generation 2 Onion Routing implementation, Tor, runs on most common operating systems. July 26, 2014
  • 21. How Onion Routing Works: • An application, instead of making a (socket) connection directly to a destination machine, makes a socket connection to an Onion Routing Proxy. That Onion Routing Proxy builds an anonymous connection through several other Onion Routers to the destination. Each Onion Router can only identify adjacent Onion Routers along the route. Before sending data over an anonymous connection, the first Onion Router adds a layer of encryption for each Onion Router in the route. July 26, 2014
  • 22. How Onion Routing Works: • As data moves through the anonymous connection, each Onion Router removes one layer of encryption, so it finally arrives as plaintext. This layering occurs in the reverse order for data moving back to the initiator. Data passed along the anonymous connection appears different at each Onion Router, so data cannot be tracked en route and compromised Onion Routers cannot cooperate. When the connection is broken, all information about the connection is cleared at each Onion Router. July 26, 2014
  • 23. How Onion Routing Works: • Onion Routing – A message is cascaded through several routers: • Sender defines whole path, choosing the routers • The message is encrypted in succession, first with the symmetric key of the last router, the result of that operation with the penultimate router, and so on • The encrypted message is sent through the predefined path and each router only knows the previous router and the next router July 26, 2014
  • 25. Tor Relay Graph as of 4/29/2014 July 26, 2014
  • 27. Tor’s Code • Tor's code released in 2002 • Tor's design paper published in 2004 • The clock starts ticking... July 26, 2014
  • 31. Attackers Trying to Block Tor users from connecting • 1) By blocking the directory authorities • 2) By blocking all the relay IP addresses in the directory, or the addresses of other Tor services • 3) By filtering based on Tor's network fingerprint • 4) By preventing users from finding the Tor software (usually by blocking website) July 26, 2014
  • 34. Blocked Sites in U.S. July 26, 2014
  • 35. Blocked Sites in the U.S. • 2012christians.com • 2012coolhats.com • 23isking.com • angelsjerseysstore.com • authenticbullsshop.com • authenticheatshop.com • authenticlakersshop.com • authenticmagicshop.com • authenticmavericksshop.com • authenticthundershop.com • autoforms.info July 26, 2014
  • 37. Tor vs non-Tor Nerworks July 26, 2014
  • 38. Connections of Tor Users July 26, 2014
  • 39. Tor use in Blocked Countries July 26, 2014
  • 40. Two Circumvention Systems • Circumvention – To go around or bypass • UltraTurf-freeware to bypass censorship and firewall censorship using HTTP Proxy, and employs encryption. • Distinguishable Behavior, Lots of unnecessary data in logs, Evidence of unproxied traffic • Tor • Looks like SSL Traffic • No extra details in logs July 26, 2014
  • 41. Use of Tor network in Blocked Countries July 26, 2014
  • 42. Tor use in Various Countries July 26, 2014
  • 43. Alternate to Tor • Java Anon Proxy, JAP or JonDonym • I2P • HotSpot Shield • Tunnelbear • Vidalia • Orbot • FreeVPN.me July 26, 2014
  • 44. Tor Example Sites • http://xmh57jrzrnw6insl.onion/ - Torch • http://torlinkbgs6aabns.onion/index.php - TorLinks • http://2ogmrlfzdthnwkez.onion/ - RentAHacker • http://ybp4oezfhk24hxmb.onion/ - Hitman Network (Contract Killers) • http://en35tuzqmn4lofbk.onion/ - USFakeIDs July 26, 2014