1. TOR
:TRACERA SOFTWARETOTRACK ANONYMITYOF TOR BROWSER
PROJECT MEMBERS
HANDLER NAME:ATMEGA
REAL NAME:VISHAL ADITYA
CAMPUS:AUR(JAIPUR)
HANDLER NAME: DOTASEEKER
REAL NAME: BLESSON MAMMEN
CAMPUS: AUH(MANESAR)
HANDLER NAME: UNKNOWN
REAL NAME: JATIN GARG
CAMPUS:AUH(MANESAR)
HANDLER NAME: BLOCKER
REAL NAME: SARTHAK BHARDWAJ
CAMPUS: AUH(MANESAR)
2. ABOUT PROJECT
This project is about making people un-anonymous on TOR
and to be able to track every person using TOR in our server
or network.
Language: Python
3. PROJECT DETAILS
• Our idea is to develop a software/product that can be installed
on any network and is capable of binding encrypted packets to
every node/workstation connected to that network.
• Encrypted packets will concatenate all the IP addresses from
source to destination and whatever IP’s it bounces through.
• Decrypt packet to extract list of IP addresses from entry to exit
node and trace the route to get victim/TOR user real IP
address.
4. REQUIREMENTS
This project is required as there is an urgent need to remove
anonymity of people on our network and to monitor the users
activities on our network. It will make our system secure from people
trying to use it for illegal activities.
5. STEPS INVOLVED IN DEVELOPMENT
• Step1: Network information to bind encrypted packet.
• Step2: Encryption algorithm.
• Step3: Decryption algorithm.
• Step4: Interface to display frontend and backend.
• Step5: Frontend: START, STOP, TRACE(Display route and real IP address)
• Step6: Backend: Admin, Encrypt Packet, Decrypt Packet, Hashing etc.
Join a packet of data with the original data being sent.
Use this packet to trace and add all the various IP addresses that the data was sent to.
So when the IP address reaches the destination, it brings along al the information about its
route and the original IP source.
6. PHASE TASK TIMELIN
E
I Study and implement
source code of TOR
browser & network
layers.
1 weeks
II Binding, Encryption,
Decryption of packets
over the network
2 weeks
III Client-side application
development using
PYTHON
1 weeks
PHASES OR TIMELINE
7. • It can be used to monitor malicious activities on the internet.
• It can be used to prevent terrorist attacks.
• It can be used to prevent illegal sale of fire-arms etc.
• In this age of networking anonymity can become a great tool
for exploiting personal web resources and with this software
we can monitor such people.
FUTURE SCOPE