Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Tor Network

2,543 views

Published on

This slide is for TDOH Conf 2017.
http://tdoh-conf.online/session.html

Published in: Internet
  • Hey guys! Who wants to chat with me? More photos with me here 👉 http://www.bit.ly/katekoxx
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

The Tor Network

  1. 1. 第⼀一次吃洋蔥就上⼿手 The Tor Network Jie @ TDOH Conf 2017
  2. 2. Disclaimer This talk is given by me as an individual My employer is not involved in any way
  3. 3. Who is me • IBM Security • Qualcomm • National Center for High-Performance Computing (NCHC)
  4. 4. 少女被改造成 活體情趣⼈人偶 !!! 某網友: 我不確定這是不是真的,但我看到⼀一篇如何把 活⽣生⽣生的女孩變成任⼈人擺布的情趣⼈人偶的教學。 會需要把聲帶和⼀一些四肢割掉,把牙⿒齒全換成矽膠假牙。 作者聲稱⾃自⼰己綁架了了多名女性,並把她們都變成了了情趣⼈人偶。
  5. 5. 他假裝買家進入暗網 驚⾒見見綑綁的裸體少女遭拍賣... 竟差點讓⾃自⼰己陷入前所未有的危機!!! 某網友:我是通過 Reddit 上的⼀一個帖⼦子知道的 「⿊黑死病」。 據說 「他們是⼀一夥涉獵廣泛的有組織犯罪集團,無惡惡不作。」 進入網站後,顧客可以選擇各種不同的服務: 武器、毒品、轟炸、暗殺、假⾝身份,還有⼈人⼝口交易易。 網站上還有可以回溯到幾年年前的新聞更更新區。 網站2010年年⼀一⽉月27⽇日的記錄上這樣寫道:「⿊黑死病進入暗網,我們會迅速蔓延。」 之後,網站幾次改變位址。「當我們過於為外⼈人所知的時候,我們就會這樣做。」
  6. 6. https://www.youtube.com/watch?v=6VMRAGxjOoA 某網友:這⽀支影片兩兩年年前在暗網廣為流傳, 片中⼀一名男⼦子發瘋似地⽤用勺⼦子吃著湯麵, 吃著吃著兩兩名頭戴玩偶⾯面具的不明⼈人⼠士開始緩緩接近他, 就在輕撫他的肩膀時, 進食中的男⼦子突然嚎啕⼤大哭 !!!
  7. 7. Deep Web or Dark Web
  8. 8. Government Wikileaks Journals Database ~ 30% ~ 70%
  9. 9. What is Tor ?
  10. 10. Developed in the mid-1990s by United States Naval Research Laboratory To protect U.S. intelligence communication online
  11. 11. How Tor works ?
  12. 12. Directory Server Alice Jane Bob Tor node Encrypted link Unencrypted link Step1: Alice’s Tor client obtains a list of Tor node from directory server Step2: Alice’s Tor client picks a random path to destination server Step3: If later time, the user visits another site, the Tor browser will select a second random path Tor Network
  13. 13. How I access it ?
  14. 14. Please download The Tor Browser Bundle https://www.torproject.org/download/download.html.en
  15. 15. Some .onion list • DuckDuckGo • https://3g2upl4pq6kufc4m.onion/ • OnionList • http://jh32yv5zgayyyts3.onion/ • Hidden Wiki • http://zqktlwi4fecvo6ri.onion/ • USA Passport • http://xfnwyig7olypdq5r.onion/ • Onion Identity Services • http://abbujjh5vqtq77wg.onion/ • Rent-A-Hacker • http://2ogmrlfzdthnwkez.onion/ • Hitman Network • http://ybp4oezfhk24hxmb.onion http://www.tandfonline.com/doi/pdf/10.1080/00396338.2016.1142085?needAccess=true
  16. 16. Be part of it ?
  17. 17. How to• /etc/apt/source.list • $ deb http://deb.torproject.org/torproject.org xenial main • $ deb-src http://deb.torproject.org/torproject.org xenial main • $ Prerequisite • sudo gpg --keyserver keys.gnupg.net --recv A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 • $ sudo gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add - • $ sudo apt-get update • $ sudo apt-get install tor deb.torproject.org-keyring • /etc/tor/torrc • Log notice file /var/log/tor/notices.log • Log debug file /var/log/tor/debug.log • ORPort 443 • Exitpolicy reject *:* • Nickname torrentingrelay • ContactInfo tortest@example.com • RelayBandwidthRate 100 KBytes • RelayBandwidthBurst 200 KBytes • Restart Tor service
  18. 18. Wanna provide Hidden Service ?
  19. 19. .onion URL • abbujjh5vqtq77wg.onion • pseudo-top-level-domain (TLD) • Unable to be resolved by DNS • Unable to access it using normal web browser • Tor2web • Automatically generated based on a public key • 16 characters name
  20. 20. IP1 IP2 IP3 Bob Alice Database RP Hidden Service Protocol IP : Introduction Points PK : Public Key cookie : One-Time Secret RP : Rendezvous Point Step1: Bob picks some IP and builds circuits to them IP# PK Step2: Bob advertises his hidden service (XYZ.onion) to the database IP# PK Step3: Alice hears that XYZ.onion exists, and requests more info from the database and also sets up a RP PK cookie RP Step4: Alice writes a message encrypted by PK to Bob listing the RP and one-time secret, and also asks an IP to deliver cookie Step5: Bob connects to RP and provides his one-time secret Step6: Bob and Alice proceed to use their Tor circuit like normal
  21. 21. How to • Install a web server locally • /etc/lighttpd/lighttpd.conf • accesslog.filename = “/var/log/lighttpd/access.log” • server.port = 12345 • Enable Tor hidden service • /etc/tor/torrc • HiddenServiceDir /var/lib/tor/hidden_service/ • HiddenServicePort 80 127.0.0.1:12345 • 2 important files under /var/lib/tor/hidden_service • hostname • mqwxdgxme7u4j7wx.onion • private_key
  22. 22. $git clone https://github.com/jieliau/TorSetup.git
  23. 23. Traceable ?
  24. 24. Weakness • End-to-End correlation • Autonomous system (AS) eavesdropping • Exit node eavesdropping • Traffic-analysis attack • Tor exit node block • Bad apple attack • Some protocols expose IP addresses • Sniper attack • Heartbleed bug • Mouse fingerprinting • Circuit fingerprinting
  25. 25. https://exchange.xforce.ibmcloud.com/collection/Tor-Exits-2442016- fbfd2c3cfe4dfc72805be1fb1c9a18c4
  26. 26. https://torstatus.blutmagie.de
  27. 27. • LASTor: A Low-Latency AS-Aware Tor Client • http://lastor.cs.ucr.edu/oakland12.pdf • Tor hack proposed to catch criminals • http://www.securityfocus.com/news/11447 • Low-Cost Traffic Analysis of Tor • http://sec.cs.ucl.ac.uk/users/smurdoch/papers/oakland05torta.pdf • One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users • https://www.usenix.org/legacy/events/leet11/tech/full_papers/LeBlond.pdf • Compromising Tor Anonymity Exploiting P2P Information Leakage • https://hal.inria.fr/file/index/docid/471556/filename/TorBT.pdf • The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network • http://www.robgjansen.com/publications/sniper-ndss2014.pdf • Tor Users Can Be Tracked Based on Their Mouse Movements • http://news.softpedia.com/news/tor-users-can-be-tracked-based-on-their-mouse- movements-501602.shtml • Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services • https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-kwon.pdf
  28. 28. Reference Link• Tor Project • https://www.torproject.org • Tor Wikipedia • https://en.wikipedia.org/wiki/Tor_(anonymity_network) • Deep Web • https://en.wikipedia.org/wiki/Deep_web • Dark Web • https://en.wikipedia.org/wiki/Dark_web • List of Tor hidden services • https://en.wikipedia.org/wiki/List_of_Tor_hidden_services • Hidden Wiki Tor .onion urls directories • https://thehiddenwiki.org • How to Access Dark Web and Deep Web Anonymously • https://www.theexplode.com/how-to-access-dark-web/ • Freenet • https://en.wikipedia.org/wiki/Freenet • I2P • https://en.wikipedia.org/wiki/I2P
  29. 29. https://www.linkedin.com/in/jieliau https://github.com/jieliau https://www.facebook.com/jie.liau https://twitter.com/JieLiau

×