Scratching Your Brain into Dark Web by Arpit Maheshwari

Security Researcher at Adobe, Chapter Leader at OWASP & null
Aug. 31, 2016
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
1 of 29

More Related Content

Slideshows for you

External to DA, the OS X WayExternal to DA, the OS X Way
External to DA, the OS X WayStephan Borosh
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani GolandCODE BLUE
BSidesDC 2016 Beyond Automated TestingBSidesDC 2016 Beyond Automated Testing
BSidesDC 2016 Beyond Automated TestingAndrew McNicol
Html5 hackingHtml5 hacking
Html5 hackingIftach Ian Amit
BSidesJXN 2016: Finding a Company's BreakPointBSidesJXN 2016: Finding a Company's BreakPoint
BSidesJXN 2016: Finding a Company's BreakPointAndrew McNicol
How To Start Your InfoSec CareerHow To Start Your InfoSec Career
How To Start Your InfoSec CareerAndrew McNicol

Viewers also liked

The dark webThe dark web
The dark webhellboytonmoy
The Dark WebThe Dark Web
The Dark WebConnor Willer
Deep Web & Dark WebDeep Web & Dark Web
Deep Web & Dark WebPaolo Vedorin
Microsoft HoloLensMicrosoft HoloLens
Microsoft HoloLensVivek Singh
HoloLensHoloLens
HoloLensRudra Bhatt
Microsoft Hololens PresentationMicrosoft Hololens Presentation
Microsoft Hololens PresentationFaateh Ali Dhillon

Similar to Scratching Your Brain into Dark Web by Arpit Maheshwari

Introduction to TorIntroduction to Tor
Introduction to TorJaskaran Narula
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsBiagio Botticelli
Why and How to use Onion Networking - #EMFCamp2018Why and How to use Onion Networking - #EMFCamp2018
Why and How to use Onion Networking - #EMFCamp2018Alec Muffett
osint + python: extracting information from tor network and darkweb osint + python: extracting information from tor network and darkweb
osint + python: extracting information from tor network and darkweb Jose Manuel Ortega Candel
Tor: How it works to keep you safe online. PhutureCon 2014Tor: How it works to keep you safe online. PhutureCon 2014
Tor: How it works to keep you safe online. PhutureCon 2014IceQUICK
Observations from the APNIC Community Honeynet Project, presentation by Adli ...Observations from the APNIC Community Honeynet Project, presentation by Adli ...
Observations from the APNIC Community Honeynet Project, presentation by Adli ...APNIC

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
UDP HunterUDP Hunter
UDP HunterOWASP Delhi
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi

Recently uploaded

Emailidator - Validate email addressEmailidator - Validate email address
Emailidator - Validate email addressEmail Iditor
皇后学院学历证书美国留学生 假学历皇后学院学历证书美国留学生 假学历
皇后学院学历证书美国留学生 假学历gonksoe
internet architecture.pdfinternet architecture.pdf
internet architecture.pdfqhawengcongo
如何办理瓦伦西亚理工大学毕业证成绩单改成绩如何办理瓦伦西亚理工大学毕业证成绩单改成绩
如何办理瓦伦西亚理工大学毕业证成绩单改成绩gcafbox
巴塞罗那自治大学文凭认证真实留信网认证巴塞罗那自治大学文凭认证真实留信网认证
巴塞罗那自治大学文凭认证真实留信网认证dadot2
纽约州立大学布法罗分校留学生如何办理毕业证书、完成信、成绩单!纽约州立大学布法罗分校留学生如何办理毕业证书、完成信、成绩单!
纽约州立大学布法罗分校留学生如何办理毕业证书、完成信、成绩单!dadot2

Scratching Your Brain into Dark Web by Arpit Maheshwari

  1. Scratching your Brain into Dark Web OWASP | Null Delhi Chapter By: Arpit Maheshwari
  2. Who am I ?  Arpit Maheshwari (C|EH, E|CSA, C|HFI, Cyber Law Certified)  News Bytes Speaker  Learner | Researcher in Cyber Security Field  Entrepreneur  Interested In : Wi-Fi Hacking & Travelling to New Places
  3. Web
  4. Deep Web Vs Dark Web
  5. Dark Web Examples
  6. Very Commonly Used
  7. About Famous “TOR”  TOR Tunneled Onion Routing  By US navy in mid 1990  Website no. 200,000 to 400,000 estimated rest NOBODY knows  Location of the administrators is virtually untraceable  Speed is Highly Compromised  Is it Secure or Not ? Again debatable !
  8. About Famous “TOR”
  9. Working of “TOR” Sender OR1 √ D C1 C2 C2 C3 C3 Destination Port Receiver OR2 D D OR3 C2 D
  10. Insiders for TOR Note: TOR encrypts your connection not your data TOR works with MAC Address.
  11. Moving to ONION Url Step 1: Install Tor Tor must always be on your system for the hidden service to be accessible
  12. Moving to ONION Url Step 2: Install & Configure A Web Server
  13. Moving to ONION Url Step 2: Install & Configure A Web Server
  14. Moving to ONION Url Step 2: Install & Configure A Web Server
  15. Moving to ONION Url Step 2: Install & Configure A Web Server  Web server Configuration is very important.  Ensure it isn’t leaking any information that could be used to identify you, i.e. IP address.  You can use any other webserver but remember to configure properly.
  16. Moving to ONION Url Step 3: Configure The Hidden Service  Tell about it.  By adding this information to the torrc file.  Shut Down TOR  Tor BrowserDataTor  # Hidden Service HiddenServiceDir C:UsersNametor_service HiddenServicePort 80 127.0.0.1:80
  17. Moving to ONION Url Step 3: Configure The Hidden Service  Create Folder in C:UsersNametor_service
  18. Tools for Onion Name Generator  Shallot (onion hash) is an older program, there are newer alternatives available now.  Scallion - uses GPU hashing, needs .NET Mono: http://github.com/lachesis/scallion  Eschalot - uses wordlist search, needs Unix or Linux: http://blacksunhq56imku.onion
  19. Big Loophole with TOR Snooping Point
  20. Big Loophole with TOR  Exit Node of Tor is compromised, it is traceable
  21. Big Loophole with TOR  Entry Node of Tor is compromised, it is traceable
  22. Big Loophole with TOR  Entry Node & Exit Node of Tor is compromised, it is traceable
  23. Overcoming Loophole with TOR (Back Tracing)
  24. Working
  25. Overcoming Loophole with TOR (Speed)
  26. High Speed Onion Routing at Network Layer  Only Symmetric Keys are used  Hidden services select a rendezvous point and set up a session using the Sphinx protocol  Then publish an AHDR to a directory that has the encrypted information about how to get from the rendezvous point to the service. Note: Next Node Address intermediate node have to find and maintain Encryption Keys n Info. But in Hornet this load is reduced  But Still this is a paper with a tone of hypes
  27. Overcoming Tor Several Attacks
  28. Working  Shuffle Data Packets at each server  Random Shuffling of data packets will leave no trace for sender or receiver.  Msg: 1 2 3 sent to server A then  Server B will send 3 1 2  Server C will send 3 2 1
  29. Thank You…!!!