Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Post on 12-Mar-2020

7 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

Information Security Inc.

Introduction to Tor

Information Security Confidential - Partner Use Only

Contents

2

• Tor

• DarkWeb vs DeepWeb

• Onion Sites

• References

Information Security Confidential - Partner Use Only

Tor

3

Information Security Confidential - Partner Use Only

Tor

4

Information Security Confidential - Partner Use Only

Tor

5

• The Onion Router

• Primary purpose => Anonymize Internet activity

• Series of routers that anonymously forward traffic

Information Security Confidential - Partner Use Only

Tor

6

• Tor Components

• Client => the user of the Tor network

• Server => the target TCP applications (web servers)

• Tor (onion) router => the special proxy relays the application data

• Directory server => servers holding Tor router information

Information Security Confidential - Partner Use Only

Tor

7

• Tor Operations

Information Security Confidential - Partner Use Only

Tor

8

• Tor Operations

Information Security Confidential - Partner Use Only

Tor

9

• Tor Operations

Information Security Confidential - Partner Use Only

Tor

10

• A circuit is built incrementally one hop by one hop

• Onion-like encryption => Alice negotiates an AES key with each

router; Messages are divided into equal sized cells; each router

knows only its predecessor and successor; Only the exit router

(OR3) can see the message

Information Security Confidential - Partner Use Only

Tor

11

• Connect to the Tor Network

• 1) CLI Daemon => apt-get install tor

Information Security Confidential - Partner Use Only

Tor

12

• Connect to the Tor Network

• CLI Daemon Configs => /etc/tor/torsocks.conf, /etc/tor/torrc

Information Security Confidential - Partner Use Only

Tor

13

• Connect to the Tor Network

• CLI Daemon Configs => Configure tor through /etc/tor/torrc (Set up

hidden services, Set up the port to listen on, Setup basic access

lists for allowing other systems to connect to tor through you)

Information Security Confidential - Partner Use Only

Tor

14

• Connect to the Tor Network

• CLI Daemon Configs => /etc/tor/torsocks.conf

• Using default settings

Information Security Confidential - Partner Use Only

Tor

15

• Connect to the Tor Network

• Starting Tor proxy => /etc/init.d/tor start

Information Security Confidential - Partner Use Only

Tor

16

• Connect to the Tor Network

• Starting Tor proxy => Point browser to 9050

Information Security Confidential - Partner Use Only

Tor

17

• Connect to the Tor Network

• Starting Tor proxy => Visit https://check.torproject.org for

confirmation

Information Security Confidential - Partner Use Only

Tor

18

• Connect to the Tor Network

• 2) TorBrowser => Simple Executable (launches portable Firefox

browser)

• Download at https://www.torproject.org/projects/torbrowser.html.en

Information Security Confidential - Partner Use Only

Tor

19

• Connect to the Tor Network

• TorBrowser => Simple Executable (launches portable Firefox

browser)

• Install Tor Browser

Information Security Confidential - Partner Use Only

Tor

20

• Connect to the Tor Network

• TorBrowser => Simple Executable (launches portable Firefox

browser)

• Run Tor Browser

Information Security Confidential - Partner Use Only

Tor

21

• Connect to the Tor Network

• TorBrowser => Simple Executable (launches portable Firefox

browser)

• Connect

Information Security Confidential - Partner Use Only

Tor

22

Information Security Confidential - Partner Use Only

DarkWeb vs DeepWeb

23

• The “dark web” is the encrypted network that exists between Tor

servers and their clients

• The “deep web” is simply the content of databases and other web

services that for one reason or another cannot be indexed by

conventional search engines

Information Security Confidential - Partner Use Only

Onion Sites

24

• We are connected => Now what?

• Browse the Internet anonymously

• Fight Censorship

• Generally just stay anonymous

• Tor Hidden Services, they sometimes ends up like below

Information Security Confidential - Partner Use Only

Onion Sites

25

• Tor Hidden Services

• Services that live only in the Tor Network => Turn Tor into a

Darknet

• Services use .onion as TLD

• See => https://www.torproject.org/docs/onion-services

Information Security Confidential - Partner Use Only

Onion Sites

26

• The http://zlal32teyptf4tvi.onion hidden service (tor hidden service

crawler / spider and web site)

Information Security Confidential - Partner Use Only

Onion Sites

27

• The http://zlal32teyptf4tvi.onion hidden service (tor hidden service

crawler / spider and web site)

Information Security Confidential - Partner Use Only

Onion Sites

28

• DeepWeb List => http://deepweblinks.org/

Information Security Confidential - Partner Use Only

Onion Sites

29

• Hidden Wiki =>

http://kpvz7kpmcmne52qf.onion/wiki/index.php/Main_Page

Information Security Confidential - Partner Use Only

Onion Sites

30

• DreamMarket => http://zyhljpm635qgy7wj.onion/

Information Security Confidential - Partner Use Only

Onion Sites

31

• SecurityBasics =>

http://kpvz7kpmcmne52qf.onion/wiki/index.php/Security_Basics

Information Security Confidential - Partner Use Only

References

32

• Tor Hidden Services

https://www.torproject.org/docs/onion-services

• Tor

https://en.wikipedia.org/wiki/Tor_(anonymity_network)

• Tor Download

https://www.torproject.org/projects/torbrowser.html.en

• List of Tor Hidden Services

https://en.wikipedia.org/wiki/List_of_Tor_hidden_services#Search_e

ngines

top related