SlideShare una empresa de Scribd logo
1 de 8
TOR
:TRACERA SOFTWARETOTRACK ANONYMITYOF TOR BROWSER
PROJECT MEMBERS
HANDLER NAME:ATMEGA
REAL NAME:VISHAL ADITYA
CAMPUS:AUR(JAIPUR)
HANDLER NAME: DOTASEEKER
REAL NAME: BLESSON MAMMEN
CAMPUS: AUH(MANESAR)
HANDLER NAME: UNKNOWN
REAL NAME: JATIN GARG
CAMPUS:AUH(MANESAR)
HANDLER NAME: BLOCKER
REAL NAME: SARTHAK BHARDWAJ
CAMPUS: AUH(MANESAR)
ABOUT PROJECT
This project is about making people un-anonymous on TOR
and to be able to track every person using TOR in our server
or network.
Language: Python
PROJECT DETAILS
• Our idea is to develop a software/product that can be installed
on any network and is capable of binding encrypted packets to
every node/workstation connected to that network.
• Encrypted packets will concatenate all the IP addresses from
source to destination and whatever IP’s it bounces through.
• Decrypt packet to extract list of IP addresses from entry to exit
node and trace the route to get victim/TOR user real IP
address.
REQUIREMENTS
This project is required as there is an urgent need to remove
anonymity of people on our network and to monitor the users
activities on our network. It will make our system secure from people
trying to use it for illegal activities.
STEPS INVOLVED IN DEVELOPMENT
• Step1: Network information to bind encrypted packet.
• Step2: Encryption algorithm.
• Step3: Decryption algorithm.
• Step4: Interface to display frontend and backend.
• Step5: Frontend: START, STOP, TRACE(Display route and real IP address)
• Step6: Backend: Admin, Encrypt Packet, Decrypt Packet, Hashing etc.
Join a packet of data with the original data being sent.
Use this packet to trace and add all the various IP addresses that the data was sent to.
So when the IP address reaches the destination, it brings along al the information about its
route and the original IP source.
PHASE TASK TIMELIN
E
I Study and implement
source code of TOR
browser & network
layers.
1 weeks
II Binding, Encryption,
Decryption of packets
over the network
2 weeks
III Client-side application
development using
PYTHON
1 weeks
PHASES OR TIMELINE
• It can be used to monitor malicious activities on the internet.
• It can be used to prevent terrorist attacks.
• It can be used to prevent illegal sale of fire-arms etc.
• In this age of networking anonymity can become a great tool
for exploiting personal web resources and with this software
we can monitor such people.
FUTURE SCOPE
FEEDBACK OR QUERIES

Más contenido relacionado

La actualidad más candente

Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Torantitree
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Thoughtworks
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion routerAshly Liza
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGSCrowdStrike
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetIRJET Journal
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAli Habeeb
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 

La actualidad más candente (17)

Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
The Onion Routing (TOR)
The Onion Routing (TOR)The Onion Routing (TOR)
The Onion Routing (TOR)
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Tor Network
Tor NetworkTor Network
Tor Network
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion router
 
Tor browser
Tor browserTor browser
Tor browser
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Tor
TorTor
Tor
 
TOR: The Onion Router
TOR: The Onion RouterTOR: The Onion Router
TOR: The Onion Router
 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion Routing
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 

Similar a Tor Tracer

Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure ChannelViral Parmar
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsBiagio Botticelli
 
DEFCON 23 - Patrick Mcneil and Owen - sorry wrong number
DEFCON 23 - Patrick Mcneil and Owen - sorry wrong numberDEFCON 23 - Patrick Mcneil and Owen - sorry wrong number
DEFCON 23 - Patrick Mcneil and Owen - sorry wrong numberFelipe Prado
 
Privacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingPrivacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingJose L. Quiñones-Borrero
 
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...BlueHat Security Conference
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools iSyaiful Ahdan
 
(130727) #fitalk anonymous network concepts and implementation
(130727) #fitalk   anonymous network concepts and implementation(130727) #fitalk   anonymous network concepts and implementation
(130727) #fitalk anonymous network concepts and implementationINSIGHT FORENSIC
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxSuhailShaik16
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer vilss
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfJessica Thompson
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsBiagio Botticelli
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 

Similar a Tor Tracer (20)

Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
Tor project
Tor projectTor project
Tor project
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
 
DEFCON 23 - Patrick Mcneil and Owen - sorry wrong number
DEFCON 23 - Patrick Mcneil and Owen - sorry wrong numberDEFCON 23 - Patrick Mcneil and Owen - sorry wrong number
DEFCON 23 - Patrick Mcneil and Owen - sorry wrong number
 
Privacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingPrivacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August Meeting
 
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
(130727) #fitalk anonymous network concepts and implementation
(130727) #fitalk   anonymous network concepts and implementation(130727) #fitalk   anonymous network concepts and implementation
(130727) #fitalk anonymous network concepts and implementation
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Sectools
SectoolsSectools
Sectools
 
aaa
aaaaaa
aaa
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 

Más de Vishal Aditya

Securing Firmware Updates [FOTA/OTA DFU]
Securing Firmware Updates [FOTA/OTA DFU]Securing Firmware Updates [FOTA/OTA DFU]
Securing Firmware Updates [FOTA/OTA DFU]Vishal Aditya
 
Making India hub of Smartphone Manufacturing
Making India hub of Smartphone ManufacturingMaking India hub of Smartphone Manufacturing
Making India hub of Smartphone ManufacturingVishal Aditya
 
Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave
Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave
Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave Vishal Aditya
 
Smart Face Recognition System Analysis
Smart Face Recognition System AnalysisSmart Face Recognition System Analysis
Smart Face Recognition System AnalysisVishal Aditya
 
Brain Computer Interface & It's Applications | NeuroSky Minwave | Raspberry Pi
Brain Computer Interface & It's Applications | NeuroSky Minwave | Raspberry PiBrain Computer Interface & It's Applications | NeuroSky Minwave | Raspberry Pi
Brain Computer Interface & It's Applications | NeuroSky Minwave | Raspberry PiVishal Aditya
 
RAIOT- Robotics Automation & Internet of Things Lab Report
RAIOT- Robotics Automation & Internet of Things Lab ReportRAIOT- Robotics Automation & Internet of Things Lab Report
RAIOT- Robotics Automation & Internet of Things Lab ReportVishal Aditya
 
Hand Gesture Game Simulator Practical Presentation II
Hand Gesture Game Simulator Practical Presentation IIHand Gesture Game Simulator Practical Presentation II
Hand Gesture Game Simulator Practical Presentation IIVishal Aditya
 
Hostel Security Camera Project Using OpenCV
Hostel Security Camera Project Using OpenCVHostel Security Camera Project Using OpenCV
Hostel Security Camera Project Using OpenCVVishal Aditya
 
EEG Game Simulator Using BCI & RaspberrPi
EEG Game Simulator Using BCI & RaspberrPi EEG Game Simulator Using BCI & RaspberrPi
EEG Game Simulator Using BCI & RaspberrPi Vishal Aditya
 
Lungs Compliance Meter
Lungs Compliance MeterLungs Compliance Meter
Lungs Compliance MeterVishal Aditya
 
Internship cover letter
Internship cover letterInternship cover letter
Internship cover letterVishal Aditya
 
Virtual amity | Term Paper | SEM-III
Virtual amity | Term Paper | SEM-IIIVirtual amity | Term Paper | SEM-III
Virtual amity | Term Paper | SEM-IIIVishal Aditya
 

Más de Vishal Aditya (13)

Securing Firmware Updates [FOTA/OTA DFU]
Securing Firmware Updates [FOTA/OTA DFU]Securing Firmware Updates [FOTA/OTA DFU]
Securing Firmware Updates [FOTA/OTA DFU]
 
Making India hub of Smartphone Manufacturing
Making India hub of Smartphone ManufacturingMaking India hub of Smartphone Manufacturing
Making India hub of Smartphone Manufacturing
 
Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave
Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave
Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave
 
Smart Face Recognition System Analysis
Smart Face Recognition System AnalysisSmart Face Recognition System Analysis
Smart Face Recognition System Analysis
 
Brain Computer Interface & It's Applications | NeuroSky Minwave | Raspberry Pi
Brain Computer Interface & It's Applications | NeuroSky Minwave | Raspberry PiBrain Computer Interface & It's Applications | NeuroSky Minwave | Raspberry Pi
Brain Computer Interface & It's Applications | NeuroSky Minwave | Raspberry Pi
 
RAIOT- Robotics Automation & Internet of Things Lab Report
RAIOT- Robotics Automation & Internet of Things Lab ReportRAIOT- Robotics Automation & Internet of Things Lab Report
RAIOT- Robotics Automation & Internet of Things Lab Report
 
Hand Gesture Game Simulator Practical Presentation II
Hand Gesture Game Simulator Practical Presentation IIHand Gesture Game Simulator Practical Presentation II
Hand Gesture Game Simulator Practical Presentation II
 
Hostel Security Camera Project Using OpenCV
Hostel Security Camera Project Using OpenCVHostel Security Camera Project Using OpenCV
Hostel Security Camera Project Using OpenCV
 
EEG Game Simulator Using BCI & RaspberrPi
EEG Game Simulator Using BCI & RaspberrPi EEG Game Simulator Using BCI & RaspberrPi
EEG Game Simulator Using BCI & RaspberrPi
 
Amity Raspberry Jam
Amity Raspberry JamAmity Raspberry Jam
Amity Raspberry Jam
 
Lungs Compliance Meter
Lungs Compliance MeterLungs Compliance Meter
Lungs Compliance Meter
 
Internship cover letter
Internship cover letterInternship cover letter
Internship cover letter
 
Virtual amity | Term Paper | SEM-III
Virtual amity | Term Paper | SEM-IIIVirtual amity | Term Paper | SEM-III
Virtual amity | Term Paper | SEM-III
 

Último

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Último (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Tor Tracer

  • 1. TOR :TRACERA SOFTWARETOTRACK ANONYMITYOF TOR BROWSER PROJECT MEMBERS HANDLER NAME:ATMEGA REAL NAME:VISHAL ADITYA CAMPUS:AUR(JAIPUR) HANDLER NAME: DOTASEEKER REAL NAME: BLESSON MAMMEN CAMPUS: AUH(MANESAR) HANDLER NAME: UNKNOWN REAL NAME: JATIN GARG CAMPUS:AUH(MANESAR) HANDLER NAME: BLOCKER REAL NAME: SARTHAK BHARDWAJ CAMPUS: AUH(MANESAR)
  • 2. ABOUT PROJECT This project is about making people un-anonymous on TOR and to be able to track every person using TOR in our server or network. Language: Python
  • 3. PROJECT DETAILS • Our idea is to develop a software/product that can be installed on any network and is capable of binding encrypted packets to every node/workstation connected to that network. • Encrypted packets will concatenate all the IP addresses from source to destination and whatever IP’s it bounces through. • Decrypt packet to extract list of IP addresses from entry to exit node and trace the route to get victim/TOR user real IP address.
  • 4. REQUIREMENTS This project is required as there is an urgent need to remove anonymity of people on our network and to monitor the users activities on our network. It will make our system secure from people trying to use it for illegal activities.
  • 5. STEPS INVOLVED IN DEVELOPMENT • Step1: Network information to bind encrypted packet. • Step2: Encryption algorithm. • Step3: Decryption algorithm. • Step4: Interface to display frontend and backend. • Step5: Frontend: START, STOP, TRACE(Display route and real IP address) • Step6: Backend: Admin, Encrypt Packet, Decrypt Packet, Hashing etc. Join a packet of data with the original data being sent. Use this packet to trace and add all the various IP addresses that the data was sent to. So when the IP address reaches the destination, it brings along al the information about its route and the original IP source.
  • 6. PHASE TASK TIMELIN E I Study and implement source code of TOR browser & network layers. 1 weeks II Binding, Encryption, Decryption of packets over the network 2 weeks III Client-side application development using PYTHON 1 weeks PHASES OR TIMELINE
  • 7. • It can be used to monitor malicious activities on the internet. • It can be used to prevent terrorist attacks. • It can be used to prevent illegal sale of fire-arms etc. • In this age of networking anonymity can become a great tool for exploiting personal web resources and with this software we can monitor such people. FUTURE SCOPE