SlideShare a Scribd company logo
FORENSIC INSIGHT;
DIGITAL FORENSICS COMMUNITY IN KOREA
Anonymous Network Concepts & Implementation
kevinkoo001@gmail.com
forensicinsight.org Page 2
Overview
1. Overview & Background
2. Anonymous Network
tor
freenet
Gnunet
I2P
3. Circumvention Techniques against Censorships
Obfsproxy
flashproxy
forensicinsight.org Page 3
Overview
 Attack Trends Summary
 Modern attack mostly involves malware, which
 Attempts to conceal attack itself
 Makes it hard to trace themselves down from network perspective
 Makes it difficult to find artifacts by wiping out themselves from system perspective
 Employs many techniques to be hard for analysis including:
Anti-VM, Anti-disassembly, Anti-debugging and cryptography
 Infects a target but do nothing harm until they achieve their goals
 Imagine how future malware will evolve, which
 Employs the combination of existing – even legitimate – tools/techniques in a malicious fashion
 Emerges new variables targeting cloud computing
 Focuses highly on target-oriented attack which does not affect others
 Uses steganography technique in a wild more often
 Forms private tor network with exploited zombie machines
forensicinsight.org Page 4
Overview
 Malware/Crimeware
 Key Loggers
 Screenscrapers
 Email, IM Redirectors
 Session Hijackers
 Web Trojans
 Transaction Generators
 Data Theft
 Man-in-the-Middle
 Rootkits
 Attachment
 Peer-to-Peer Networks
 Piggybacking
 Internet Worms, Virus
 Web Browser Exploits
 Server Compromise
 Affiliate Marketing
 Phishing
 Pharming
 Information Compromise
 Spam Transmission
 Denial-of-Service, DDoS
 Click Fraud
 Data Ransoming
 Identity Stealing
 Credit Card Abuse
 Defamation
 Embezzlement
 Political Argument
Features
Distribution
Misuse
 Let’s briefly take a look at what to have, how to spread and what to do.
forensicinsight.org Page 5
Background
 Necessity / Motivation (1/2)
 “Anonymity serves different interests for different user groups.”
by Roger Dingledine, the creator of the Tor
forensicinsight.org Page 6
Background
 Necessity / Motivation (2/2)
 Regular citizens do not want to be watched and tracked.
 Businesses need to keep trade secrets.
 Law enforcement needs anonymity to get the job done.
 Government need anonymity for their security.
 Journalists and activists need anonymity for their personal safety.
 Hard to configure your own network though!!
 Compromised botnets
 Stolen mobile phones
 Open wireless nets
 Malware spread (trojans, virus, worms)
 Spamming
 Phishing
forensicinsight.org Page 7
Implemented Anonymous Network
(1) tor
(2) freenet
(3) Gnunet
(4) I2P
forensicinsight.org Page 8
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing) at a glance
TOR
NETWORK
 When there is an evil user or server, then it could be blocked with ease.
 Tor is designed for hiding where the communication comes from, and going to.
forensicinsight.org Page 9
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing) at a glance
 Tor network consists of many relay and exit nodes.
TOR
RELAY
TOR
RELAY
TOR
RELAY
TOR
RELAY
TOR
RELAY
TOR
EXIT
TOR
EXIT
 The idea comes from Chaum’s Mix-Net design at first.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
(Communications of the ACM February 1981 Volume 24 Number 2)
forensicinsight.org Page 10
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing) Concept
 Open source software
https://svn.torproject.org/cgi-bin/viewvc.cgi/Tor/
http://sourceforge.net/projects/advtor/
 A distributed, anonymous Network
 A Protocol
 Tor provides online anonymity
forensicinsight.org Page 11
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing): How it works
 Alice’s Tor client obtains a list of Tor nodes from a directory server, Dave.
 Alice’s Tor client picks a random destination server.
 Alice’s Tor client selects a second random path.
https://www.torproject.org/about/overview.html.en
forensicinsight.org Page 12
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing): Diffie-Hellman Key Exchange Algorithm in TLS (1/2)
 DH establishes a shared secret that can be
used for secret communications while
exchanging data over a public network
 (Step A) Alice and Bob have common
information and secrets which belong to
one’s own.
 (Step B) Each creates a value with a secret,
and transmit it to the other.
 (Step C) Using a value by the other, each
creates common secret.
forensicinsight.org Page 13
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing): Diffie-Hellman Key Exchange Algorithm in TLS (2/2)
 SSL / TLS (Secure Socket Layer / Transport Layer Security)
http://en.wikipedia.org/wiki/Secure_Sockets_Layer
forensicinsight.org Page 14
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing): Entire Mechanism (1/3)
 Circuit (Chain) establishment
Originator Entry Node
(OR1)
Web
Server
Exit Node
(OR2)
Directory Node
(Special node)
1. Provide
Node List
2. Choose nodes
(chain, circuit)
3. DH Key
Exchange
4. Session
Key (secret)
5. DH Key
Exchange
6. Session
Key (secret)
7. DH Key
Exchange
8. Session
Key (secret)
 All communication between nodes over TLSv1
 The originator and directory node actually involves with DH over TLS.
forensicinsight.org Page 15
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing): Entire Mechanism (2/3)
 Sending HTTP data over the Internet anonymously
Originator Entry Node
(OR1)
Web
Server
Exit Node
(OR2)
RELAY C1
Local Proxy
(SOCKS)
RELAY C2 RELAY C3
 C1 = {RELAY C1: [RELAY (Send HTTP request to Web-Server-IP)]}
 C2 = {RELAY C2: ENCRYPTED CONTENT}
 C3 = {Send HTTP request to Web-Server-IP}
 OR1 (Entry Node) knows the origin which the packets come from.
 OR2 (Exit Node) knows the destination which the incoming packets go to.
 If any, all OR nodes between entry node and exit node only know the adjacent nodes.
forensicinsight.org Page 16
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing): Entire Mechanism (3/3)
 Diagram about tor operation in details
https://svn.torproject.org/svn/projects/design-paper/tor-design.html
forensicinsight.org Page 17
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing): Statistics as of July, 2013 (1/2)
 One of the largest deployed network
 Almost 4,000 relays
 Almost 2,000 bridges
 Around 500,000 users per each day
http://tigerpa.ws/tor_metrics/
forensicinsight.org Page 18
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing): Statistics as of July, 2013 (2/2)
 Some countries(ISPs) have a censorship to prevent users from getting access to certain sites.
 Bridge Relays (almost 25,000)
Helps censored users access the Tor network
Are not listed in the same public directories
forensicinsight.org Page 19
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing): Official Record
 Tor Relay IP Address in the Past
 https://metrics.torproject.org/exonerator.html
 Tor Relay IP Search
 https://metrics.torproject.org/relay-search.html
forensicinsight.org Page 20
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing): Detection Technique Example (1/2)
 Someone should talk to directory server (public) to join the tor network.
 A series of unauthorized certificates in SSL/TLS communication before encryption.
 Other than IP/Port (Layer 3), all TLS traffic are encrypted.
forensicinsight.org Page 21
Implemented Anonymous Network - Tor
 The Tor (the Onion Routing): Detection Technique Example (2/2)
 X.509 Certificate has an issuer/subject field.
 Tor initiates a series of SSL/TLS connections with 3~5 hosts at the same time.
 This requires behavior-based analysis if bridges are used for censorship bypass.
http://en.wikipedia.org/wiki/X.509
http://helpforsure.wordpress.com/tag/x-509-version-3-digital-certificates/
forensicinsight.org Page 22
Implemented Anonymous Network - Freenet
 What is Freenet?
 A separate network that runs over the internet
 Only access Freenet content through Freenet including:
Freesites (websites on Freenet),
in-Freenet chat forums (FMS, Sone, etc),
files shared within Freenet,
in-Freenet email
 Distributed Database
 The more popular a file or page,
the more widely it will be cached,
the faster it will download.
https://freenetproject.org/faq.html
forensicinsight.org Page 23
Implemented Anonymous Network - Freenet
 Properties
 A large distributed storage device
 When storing a file, you receive a key to retrieve the file.
 With a key, Freenet returns the appropriate file.
 Data Management
Location to store data: C:Users[UserID]AppDataLocalFreenetdatastore
Little or no control over what is stored in your datastore
Kept or deleted depending on how popular they are.
 Routing
Initially, each node has no information about the performance of the other nodes. (Random Routing)
More documents  same node; begin to cluster with data items (Cuz the same routing rules are used)
As a result, the network will self-organize into a distributed, clustered structure.
forensicinsight.org Page 24
Implemented Anonymous Network - Freenet
 Properties
 Keys
Each file that exists on Freenet has a key associated with it.
Fproxy  http://localhost:8888/[Freenet Key]
 CHK - Content Hash Keys
The decryption key is stored encrypted within the file.
 SSK - Signed Subspace Keys
Usually for sites that are going to change over time
 USK - Updateable Subspace Keys
Linking to the latest version of a Signed Subspace Key (SSK) site
 KSK - Keyword Signed Keys
Allowing to save named pages in Freenet
CHK @ file hash , decryption key , crypto settings
SSK @ public key hash , decryption key , crypto settings / user selected name - version
USK @ public key hash , decryption key , crypto settings / user selected name - version
KSK @ myfile.txt
forensicinsight.org Page 25
Implemented Anonymous Network - Gnunet
 What is Gnunet?
 Started in late 2001
 Implemented for secure peer-to-peer networking
 Improved content encoding: ECRS, the encoding for censorship resistant sharing
 A framework for secure peer-to-peer networking that does not use any centralized
 Focus on anonymous censorship-resistant file-sharing
 Provides anonymity by
. making messages originating from a peer indistinguishable from messages that the peer is routing
. acting as routers and use link-encrypted connections with stable bandwidth utilization
 Similar to tor, but limited to share files anonymously, searching, swarming, and caching.
http://en.wikipedia.org/wiki/GNUnet
https://gnunet.org/
forensicinsight.org Page 26
Implemented Anonymous Network – I2P
 What is I2P? (1/2)
 Began in 2003
 An anonymizing network, a low latency mix network
 Goal:
producing a low latency, fully distributed, autonomous,
scalable, anonymous, resilient, and secure network
 All data is wrapped with several layers of encryption. (End-to-End)
 The network is both distributed and dynamic, with no trusted parties and no centralized resources.
http://www.i2p2.de/
forensicinsight.org Page 27
Implemented Anonymous Network – I2P
 What is I2P? (2/2)
 Made up of a set of nodes ("routers") with a number of unidirectional inbound and outbound
virtual paths (“tunnels”)
 Has its own internal network database (using a modification of the Kademlia algorithm) for
distributing routing and contact information securely
Garlic Wrapped:
(Garlic Routing)
1. Layered Encryption
2. Bundling multiple
messages together
3. ElGamal/AES Encryption
Peer Profiling (Peer Collection)
Peer Selection (Peer Choosing)
http://www.i2p2.de/how_intro
forensicinsight.org Page 28
Circumvention Techniques against Censorships
(1) DPI (Deep Packet Inspection)
(2) Obfsproxy
(3) Flashproxy
forensicinsight.org Page 29
Circumvention Techniques against Censorships
 How to circumvent censorships by DPI (deep packet inspections)
 Even bridges could be blocked by DPI.
 New techniques have been introduced to circumvent such censorships.
 Core technology: pluggable transport transformation
 Obfsproxy is a Python framework for implementing new pluggable transports. It uses Twisted for
its networking needs, and pyptlib for some pluggable transport-related features. It supports
the obfs2 and obfs3 pluggable transports. (by George Kadianakis)
 Flashproxy turns ordinary web browsers into bridges using websockets, and has a little python
stub to hook Tor clients to the websocket connection. (by David Fifield)
 ScrambleSuit is a pluggable transport that protects against follow-up probing attacks and is also
capable of changing its network fingerprint (packet length distribution, inter-arrival times, etc.).
It's part of the Obfsproxy framework. (by Philipp Winter)
 StegoTorus is an Obfsproxy fork that extends it to a) split Tor streams across multiple
connections to avoid packet size signatures, and b) embed the traffic flows in traces that look
like html, javascript, or pdf. (by Zack Weinberg)
 SkypeMorph transforms Tor traffic flows so they look like Skype Video. (by Ian Goldberg)
 Dust aims to provide a packet-based (rather than connection-based) DPI-resistant protocol. (by
Brandon Wiley)
https://www.torproject.org/docs/pluggable-transports.html.en
forensicinsight.org Page 30
Circumvention Techniques against Censorships
 How to circumvent censorships by DPI - Obfsproxy
 Transforms the Tor traffic between the client and the bridge.
 Supports multiple protocols, pluggable transports.
 Get bridges in Bridge DB and then add them to tor
https://www.torproject.org/projects/obfsproxy.html.en
https://bridges.torproject.org/?transport=obfs2
forensicinsight.org Page 31
Circumvention Techniques against Censorships
 How to circumvent censorships by DPI - flashproxy
 Began as a project in Stanford's class in spring 2011
 Works at tor version 0.2.3.2-alpha or later
 This model have supposed that facilitator outside have been already blocked.
: Client does not communicate directly to facilitator, designed to be covert and very hard to block.
1. Makes TLS Connection
2. Sends encrypted email
from anonymous address
to a special facilitator addr.
1. Checks this mailbox
periodically
2. Decrypts the messages
3. Inserts the registrations
they contain.
https://crypto.stanford.edu/flashproxy/
https://crypto.stanford.edu/flashproxy/flashproxy.pdf
forensicinsight.org Page 32
Question and Answer

More Related Content

What's hot

TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
CrowdStrike
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
antitree
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
Hassan Faraz
 
Dark net
Dark netDark net
Dark net
Mudasser Afzal
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
Jaskaran Narula
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
Anshu Raj
 
Tor browser
Tor browserTor browser
Tor browser
Akshit Arora
 
2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 2012
44CON
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
n|u - The Open Security Community
 
Tails os
Tails osTails os
Tails os
SADEED AMEEN
 
Tor
TorTor
Tor
TorTor
Tor
TorTor
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
Biagio Botticelli
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
Murray Security Services
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
hackdemocracy
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
Biagio Botticelli
 
Dark web
Dark webDark web
Dark web
aakshidhingra
 

What's hot (18)

TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
Dark net
Dark netDark net
Dark net
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Tor browser
Tor browserTor browser
Tor browser
 
2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 2012
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 
Tails os
Tails osTails os
Tails os
 
Tor
TorTor
Tor
 
Tor
TorTor
Tor
 
Tor
TorTor
Tor
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
 
Dark web
Dark webDark web
Dark web
 

Viewers also liked

(140118) #fitalk 2013 e-discovery trend
(140118) #fitalk   2013 e-discovery trend(140118) #fitalk   2013 e-discovery trend
(140118) #fitalk 2013 e-discovery trend
INSIGHT FORENSIC
 
Cerpen Pahlawan Buntong
Cerpen Pahlawan BuntongCerpen Pahlawan Buntong
Cerpen Pahlawan BuntongAzwira Ariwana
 
(120303) #fitalk ip finder and geo ip for fun
(120303) #fitalk   ip finder and geo ip for fun(120303) #fitalk   ip finder and geo ip for fun
(120303) #fitalk ip finder and geo ip for fun
INSIGHT FORENSIC
 
Novel Sutera dalam Lukisan
Novel Sutera dalam LukisanNovel Sutera dalam Lukisan
Novel Sutera dalam LukisanAzwira Ariwana
 
(130608) #fitalk pfp (portable forensic plaform)
(130608) #fitalk   pfp (portable forensic plaform)(130608) #fitalk   pfp (portable forensic plaform)
(130608) #fitalk pfp (portable forensic plaform)
INSIGHT FORENSIC
 
Red Door Events - Rugby Activations
Red Door Events - Rugby Activations Red Door Events - Rugby Activations
Red Door Events - Rugby Activations
Red Door Events Porter
 
Crisis Communications
Crisis CommunicationsCrisis Communications
Crisis Communications
Nora Carr, Ed.D., APR, Fellow PRSA
 
(120429) #fitalk case studyk-masked file
(120429) #fitalk   case studyk-masked file(120429) #fitalk   case studyk-masked file
(120429) #fitalk case studyk-masked file
INSIGHT FORENSIC
 
App Circus - Properati
App Circus  - ProperatiApp Circus  - Properati
App Circus - Properati
Properati
 
makalah cryptography
makalah cryptographymakalah cryptography
makalah cryptography
Renwarin
 
Swift2.x を Scala からみる
Swift2.x を Scala からみるSwift2.x を Scala からみる
Swift2.x を Scala からみる
Yuichi Adachi
 
(131102) #fitalk get windows logon password in memory dump
(131102) #fitalk   get windows logon password in memory dump(131102) #fitalk   get windows logon password in memory dump
(131102) #fitalk get windows logon password in memory dump
INSIGHT FORENSIC
 
(130216) #fitalk potentially malicious ur ls
(130216) #fitalk   potentially malicious ur ls(130216) #fitalk   potentially malicious ur ls
(130216) #fitalk potentially malicious ur ls
INSIGHT FORENSIC
 
(130119) #fitalk all about physical data recovery
(130119) #fitalk   all about physical data recovery(130119) #fitalk   all about physical data recovery
(130119) #fitalk all about physical data recovery
INSIGHT FORENSIC
 
(130727) #fitalk rp log tracker
(130727) #fitalk   rp log tracker(130727) #fitalk   rp log tracker
(130727) #fitalk rp log tracker
INSIGHT FORENSIC
 
(130608) #fitalk trends in d forensics (may, 2013)
(130608) #fitalk   trends in d forensics (may, 2013)(130608) #fitalk   trends in d forensics (may, 2013)
(130608) #fitalk trends in d forensics (may, 2013)
INSIGHT FORENSIC
 
(Ficon2015) #4 어떻게 가져갔는가, 그리고...
(Ficon2015) #4 어떻게 가져갔는가, 그리고...(Ficon2015) #4 어떻게 가져갔는가, 그리고...
(Ficon2015) #4 어떻게 가져갔는가, 그리고...
INSIGHT FORENSIC
 
(140407) #fitalk d trace를 이용한 악성코드 동적 분석
(140407) #fitalk   d trace를 이용한 악성코드 동적 분석(140407) #fitalk   d trace를 이용한 악성코드 동적 분석
(140407) #fitalk d trace를 이용한 악성코드 동적 분석
INSIGHT FORENSIC
 
(130202) #fitalk trends in d forensics (jan, 2013)
(130202) #fitalk   trends in d forensics (jan, 2013)(130202) #fitalk   trends in d forensics (jan, 2013)
(130202) #fitalk trends in d forensics (jan, 2013)
INSIGHT FORENSIC
 

Viewers also liked (20)

(140118) #fitalk 2013 e-discovery trend
(140118) #fitalk   2013 e-discovery trend(140118) #fitalk   2013 e-discovery trend
(140118) #fitalk 2013 e-discovery trend
 
Cerpen Pahlawan Buntong
Cerpen Pahlawan BuntongCerpen Pahlawan Buntong
Cerpen Pahlawan Buntong
 
(120303) #fitalk ip finder and geo ip for fun
(120303) #fitalk   ip finder and geo ip for fun(120303) #fitalk   ip finder and geo ip for fun
(120303) #fitalk ip finder and geo ip for fun
 
Novel Sutera dalam Lukisan
Novel Sutera dalam LukisanNovel Sutera dalam Lukisan
Novel Sutera dalam Lukisan
 
(130608) #fitalk pfp (portable forensic plaform)
(130608) #fitalk   pfp (portable forensic plaform)(130608) #fitalk   pfp (portable forensic plaform)
(130608) #fitalk pfp (portable forensic plaform)
 
Red Door Events - Rugby Activations
Red Door Events - Rugby Activations Red Door Events - Rugby Activations
Red Door Events - Rugby Activations
 
Crisis Communications
Crisis CommunicationsCrisis Communications
Crisis Communications
 
(120429) #fitalk case studyk-masked file
(120429) #fitalk   case studyk-masked file(120429) #fitalk   case studyk-masked file
(120429) #fitalk case studyk-masked file
 
App Circus - Properati
App Circus  - ProperatiApp Circus  - Properati
App Circus - Properati
 
Cerpen Tanggar Amanat
Cerpen Tanggar AmanatCerpen Tanggar Amanat
Cerpen Tanggar Amanat
 
makalah cryptography
makalah cryptographymakalah cryptography
makalah cryptography
 
Swift2.x を Scala からみる
Swift2.x を Scala からみるSwift2.x を Scala からみる
Swift2.x を Scala からみる
 
(131102) #fitalk get windows logon password in memory dump
(131102) #fitalk   get windows logon password in memory dump(131102) #fitalk   get windows logon password in memory dump
(131102) #fitalk get windows logon password in memory dump
 
(130216) #fitalk potentially malicious ur ls
(130216) #fitalk   potentially malicious ur ls(130216) #fitalk   potentially malicious ur ls
(130216) #fitalk potentially malicious ur ls
 
(130119) #fitalk all about physical data recovery
(130119) #fitalk   all about physical data recovery(130119) #fitalk   all about physical data recovery
(130119) #fitalk all about physical data recovery
 
(130727) #fitalk rp log tracker
(130727) #fitalk   rp log tracker(130727) #fitalk   rp log tracker
(130727) #fitalk rp log tracker
 
(130608) #fitalk trends in d forensics (may, 2013)
(130608) #fitalk   trends in d forensics (may, 2013)(130608) #fitalk   trends in d forensics (may, 2013)
(130608) #fitalk trends in d forensics (may, 2013)
 
(Ficon2015) #4 어떻게 가져갔는가, 그리고...
(Ficon2015) #4 어떻게 가져갔는가, 그리고...(Ficon2015) #4 어떻게 가져갔는가, 그리고...
(Ficon2015) #4 어떻게 가져갔는가, 그리고...
 
(140407) #fitalk d trace를 이용한 악성코드 동적 분석
(140407) #fitalk   d trace를 이용한 악성코드 동적 분석(140407) #fitalk   d trace를 이용한 악성코드 동적 분석
(140407) #fitalk d trace를 이용한 악성코드 동적 분석
 
(130202) #fitalk trends in d forensics (jan, 2013)
(130202) #fitalk   trends in d forensics (jan, 2013)(130202) #fitalk   trends in d forensics (jan, 2013)
(130202) #fitalk trends in d forensics (jan, 2013)
 

Similar to (130727) #fitalk anonymous network concepts and implementation

Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
Rishikese MR
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
Wail Hassan
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
Ahmed Mater
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
IRJET Journal
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networks
GeekNightHyderabad
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
Ahmed Mater
 
An overview of unix rootkits
An overview of unix rootkitsAn overview of unix rootkits
An overview of unix rootkitsUltraUploader
 
Tor
TorTor
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
Syaiful Ahdan
 
packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244Tom King
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
anurag singh
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunick
amiable_indian
 
Storm Worm & Botnet
Storm Worm & BotnetStorm Worm & Botnet
Storm Worm & Botnet
Kendiv
 
(120107) #fitalk anonymizing activities
(120107) #fitalk   anonymizing activities(120107) #fitalk   anonymizing activities
(120107) #fitalk anonymizing activities
INSIGHT FORENSIC
 
Free net
Free netFree net
Free net
Rajesh Bodapati
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
Brent Muir
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
Khaled Mosharraf
 

Similar to (130727) #fitalk anonymous network concepts and implementation (20)

Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
 
G011123539
G011123539G011123539
G011123539
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networks
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
An overview of unix rootkits
An overview of unix rootkitsAn overview of unix rootkits
An overview of unix rootkits
 
Tor
TorTor
Tor
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunick
 
Storm Worm & Botnet
Storm Worm & BotnetStorm Worm & Botnet
Storm Worm & Botnet
 
(120107) #fitalk anonymizing activities
(120107) #fitalk   anonymizing activities(120107) #fitalk   anonymizing activities
(120107) #fitalk anonymizing activities
 
Network Security
Network SecurityNetwork Security
Network Security
 
Free net
Free netFree net
Free net
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 

More from INSIGHT FORENSIC

(160820) #fitalk fileless malware forensics
(160820) #fitalk    fileless malware forensics(160820) #fitalk    fileless malware forensics
(160820) #fitalk fileless malware forensics
INSIGHT FORENSIC
 
(150124) #fitalk advanced $usn jrnl forensics (korean)
(150124) #fitalk   advanced $usn jrnl forensics (korean)(150124) #fitalk   advanced $usn jrnl forensics (korean)
(150124) #fitalk advanced $usn jrnl forensics (korean)
INSIGHT FORENSIC
 
(150124) #fitalk advanced $usn jrnl forensics (english)
(150124) #fitalk   advanced $usn jrnl forensics (english)(150124) #fitalk   advanced $usn jrnl forensics (english)
(150124) #fitalk advanced $usn jrnl forensics (english)
INSIGHT FORENSIC
 
(140118) #fitalk detection of anti-forensics artifacts using ioa fs
(140118) #fitalk   detection of anti-forensics artifacts using ioa fs(140118) #fitalk   detection of anti-forensics artifacts using ioa fs
(140118) #fitalk detection of anti-forensics artifacts using ioa fs
INSIGHT FORENSIC
 
(141031) #fitalk plaso 슈퍼 타임라인 분석 도구 활용 방안
(141031) #fitalk   plaso 슈퍼 타임라인 분석 도구 활용 방안(141031) #fitalk   plaso 슈퍼 타임라인 분석 도구 활용 방안
(141031) #fitalk plaso 슈퍼 타임라인 분석 도구 활용 방안
INSIGHT FORENSIC
 
(141031) #fitalk os x yosemite artifacts
(141031) #fitalk   os x yosemite artifacts(141031) #fitalk   os x yosemite artifacts
(141031) #fitalk os x yosemite artifacts
INSIGHT FORENSIC
 
(140716) #fitalk 전자금융사고에서의 디지털 포렌식
(140716) #fitalk   전자금융사고에서의 디지털 포렌식(140716) #fitalk   전자금융사고에서의 디지털 포렌식
(140716) #fitalk 전자금융사고에서의 디지털 포렌식
INSIGHT FORENSIC
 
(140716) #fitalk digital evidence from android-based smartwatch
(140716) #fitalk   digital evidence from android-based smartwatch(140716) #fitalk   digital evidence from android-based smartwatch
(140716) #fitalk digital evidence from android-based smartwatch
INSIGHT FORENSIC
 
(140625) #fitalk sq lite 소개와 구조 분석
(140625) #fitalk   sq lite 소개와 구조 분석(140625) #fitalk   sq lite 소개와 구조 분석
(140625) #fitalk sq lite 소개와 구조 분석
INSIGHT FORENSIC
 
(140625) #fitalk sq lite 삭제된 레코드 복구 기법
(140625) #fitalk   sq lite 삭제된 레코드 복구 기법(140625) #fitalk   sq lite 삭제된 레코드 복구 기법
(140625) #fitalk sq lite 삭제된 레코드 복구 기법
INSIGHT FORENSIC
 
(130216) #fitalk reverse connection tool analysis
(130216) #fitalk   reverse connection tool analysis(130216) #fitalk   reverse connection tool analysis
(130216) #fitalk reverse connection tool analysis
INSIGHT FORENSIC
 
(130202) #fitalk china threat
(130202) #fitalk   china threat(130202) #fitalk   china threat
(130202) #fitalk china threat
INSIGHT FORENSIC
 
(130119) #fitalk sql server forensics
(130119) #fitalk   sql server forensics(130119) #fitalk   sql server forensics
(130119) #fitalk sql server forensics
INSIGHT FORENSIC
 
(130119) #fitalk apt, cyber espionage threat
(130119) #fitalk   apt, cyber espionage threat(130119) #fitalk   apt, cyber espionage threat
(130119) #fitalk apt, cyber espionage threat
INSIGHT FORENSIC
 
(130105) #fitalk trends in d forensics (dec, 2012)
(130105) #fitalk   trends in d forensics (dec, 2012)(130105) #fitalk   trends in d forensics (dec, 2012)
(130105) #fitalk trends in d forensics (dec, 2012)
INSIGHT FORENSIC
 
(130105) #fitalk criminal civil judicial procedure in korea
(130105) #fitalk   criminal civil judicial procedure in korea(130105) #fitalk   criminal civil judicial procedure in korea
(130105) #fitalk criminal civil judicial procedure in korea
INSIGHT FORENSIC
 
(131116) #fitalk extracting user typing history on bash in mac os x memory
(131116) #fitalk   extracting user typing history on bash in mac os x memory(131116) #fitalk   extracting user typing history on bash in mac os x memory
(131116) #fitalk extracting user typing history on bash in mac os x memory
INSIGHT FORENSIC
 
(130928) #fitalk cloud storage forensics - dropbox
(130928) #fitalk   cloud storage forensics - dropbox(130928) #fitalk   cloud storage forensics - dropbox
(130928) #fitalk cloud storage forensics - dropbox
INSIGHT FORENSIC
 
(130907) #fitalk generating volatility linux profile
(130907) #fitalk   generating volatility linux profile(130907) #fitalk   generating volatility linux profile
(130907) #fitalk generating volatility linux profile
INSIGHT FORENSIC
 
(130727) #fitalk pfp (portable forensic platform), #2 story
(130727) #fitalk   pfp (portable forensic platform), #2 story(130727) #fitalk   pfp (portable forensic platform), #2 story
(130727) #fitalk pfp (portable forensic platform), #2 story
INSIGHT FORENSIC
 

More from INSIGHT FORENSIC (20)

(160820) #fitalk fileless malware forensics
(160820) #fitalk    fileless malware forensics(160820) #fitalk    fileless malware forensics
(160820) #fitalk fileless malware forensics
 
(150124) #fitalk advanced $usn jrnl forensics (korean)
(150124) #fitalk   advanced $usn jrnl forensics (korean)(150124) #fitalk   advanced $usn jrnl forensics (korean)
(150124) #fitalk advanced $usn jrnl forensics (korean)
 
(150124) #fitalk advanced $usn jrnl forensics (english)
(150124) #fitalk   advanced $usn jrnl forensics (english)(150124) #fitalk   advanced $usn jrnl forensics (english)
(150124) #fitalk advanced $usn jrnl forensics (english)
 
(140118) #fitalk detection of anti-forensics artifacts using ioa fs
(140118) #fitalk   detection of anti-forensics artifacts using ioa fs(140118) #fitalk   detection of anti-forensics artifacts using ioa fs
(140118) #fitalk detection of anti-forensics artifacts using ioa fs
 
(141031) #fitalk plaso 슈퍼 타임라인 분석 도구 활용 방안
(141031) #fitalk   plaso 슈퍼 타임라인 분석 도구 활용 방안(141031) #fitalk   plaso 슈퍼 타임라인 분석 도구 활용 방안
(141031) #fitalk plaso 슈퍼 타임라인 분석 도구 활용 방안
 
(141031) #fitalk os x yosemite artifacts
(141031) #fitalk   os x yosemite artifacts(141031) #fitalk   os x yosemite artifacts
(141031) #fitalk os x yosemite artifacts
 
(140716) #fitalk 전자금융사고에서의 디지털 포렌식
(140716) #fitalk   전자금융사고에서의 디지털 포렌식(140716) #fitalk   전자금융사고에서의 디지털 포렌식
(140716) #fitalk 전자금융사고에서의 디지털 포렌식
 
(140716) #fitalk digital evidence from android-based smartwatch
(140716) #fitalk   digital evidence from android-based smartwatch(140716) #fitalk   digital evidence from android-based smartwatch
(140716) #fitalk digital evidence from android-based smartwatch
 
(140625) #fitalk sq lite 소개와 구조 분석
(140625) #fitalk   sq lite 소개와 구조 분석(140625) #fitalk   sq lite 소개와 구조 분석
(140625) #fitalk sq lite 소개와 구조 분석
 
(140625) #fitalk sq lite 삭제된 레코드 복구 기법
(140625) #fitalk   sq lite 삭제된 레코드 복구 기법(140625) #fitalk   sq lite 삭제된 레코드 복구 기법
(140625) #fitalk sq lite 삭제된 레코드 복구 기법
 
(130216) #fitalk reverse connection tool analysis
(130216) #fitalk   reverse connection tool analysis(130216) #fitalk   reverse connection tool analysis
(130216) #fitalk reverse connection tool analysis
 
(130202) #fitalk china threat
(130202) #fitalk   china threat(130202) #fitalk   china threat
(130202) #fitalk china threat
 
(130119) #fitalk sql server forensics
(130119) #fitalk   sql server forensics(130119) #fitalk   sql server forensics
(130119) #fitalk sql server forensics
 
(130119) #fitalk apt, cyber espionage threat
(130119) #fitalk   apt, cyber espionage threat(130119) #fitalk   apt, cyber espionage threat
(130119) #fitalk apt, cyber espionage threat
 
(130105) #fitalk trends in d forensics (dec, 2012)
(130105) #fitalk   trends in d forensics (dec, 2012)(130105) #fitalk   trends in d forensics (dec, 2012)
(130105) #fitalk trends in d forensics (dec, 2012)
 
(130105) #fitalk criminal civil judicial procedure in korea
(130105) #fitalk   criminal civil judicial procedure in korea(130105) #fitalk   criminal civil judicial procedure in korea
(130105) #fitalk criminal civil judicial procedure in korea
 
(131116) #fitalk extracting user typing history on bash in mac os x memory
(131116) #fitalk   extracting user typing history on bash in mac os x memory(131116) #fitalk   extracting user typing history on bash in mac os x memory
(131116) #fitalk extracting user typing history on bash in mac os x memory
 
(130928) #fitalk cloud storage forensics - dropbox
(130928) #fitalk   cloud storage forensics - dropbox(130928) #fitalk   cloud storage forensics - dropbox
(130928) #fitalk cloud storage forensics - dropbox
 
(130907) #fitalk generating volatility linux profile
(130907) #fitalk   generating volatility linux profile(130907) #fitalk   generating volatility linux profile
(130907) #fitalk generating volatility linux profile
 
(130727) #fitalk pfp (portable forensic platform), #2 story
(130727) #fitalk   pfp (portable forensic platform), #2 story(130727) #fitalk   pfp (portable forensic platform), #2 story
(130727) #fitalk pfp (portable forensic platform), #2 story
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

(130727) #fitalk anonymous network concepts and implementation

  • 1. FORENSIC INSIGHT; DIGITAL FORENSICS COMMUNITY IN KOREA Anonymous Network Concepts & Implementation kevinkoo001@gmail.com
  • 2. forensicinsight.org Page 2 Overview 1. Overview & Background 2. Anonymous Network tor freenet Gnunet I2P 3. Circumvention Techniques against Censorships Obfsproxy flashproxy
  • 3. forensicinsight.org Page 3 Overview  Attack Trends Summary  Modern attack mostly involves malware, which  Attempts to conceal attack itself  Makes it hard to trace themselves down from network perspective  Makes it difficult to find artifacts by wiping out themselves from system perspective  Employs many techniques to be hard for analysis including: Anti-VM, Anti-disassembly, Anti-debugging and cryptography  Infects a target but do nothing harm until they achieve their goals  Imagine how future malware will evolve, which  Employs the combination of existing – even legitimate – tools/techniques in a malicious fashion  Emerges new variables targeting cloud computing  Focuses highly on target-oriented attack which does not affect others  Uses steganography technique in a wild more often  Forms private tor network with exploited zombie machines
  • 4. forensicinsight.org Page 4 Overview  Malware/Crimeware  Key Loggers  Screenscrapers  Email, IM Redirectors  Session Hijackers  Web Trojans  Transaction Generators  Data Theft  Man-in-the-Middle  Rootkits  Attachment  Peer-to-Peer Networks  Piggybacking  Internet Worms, Virus  Web Browser Exploits  Server Compromise  Affiliate Marketing  Phishing  Pharming  Information Compromise  Spam Transmission  Denial-of-Service, DDoS  Click Fraud  Data Ransoming  Identity Stealing  Credit Card Abuse  Defamation  Embezzlement  Political Argument Features Distribution Misuse  Let’s briefly take a look at what to have, how to spread and what to do.
  • 5. forensicinsight.org Page 5 Background  Necessity / Motivation (1/2)  “Anonymity serves different interests for different user groups.” by Roger Dingledine, the creator of the Tor
  • 6. forensicinsight.org Page 6 Background  Necessity / Motivation (2/2)  Regular citizens do not want to be watched and tracked.  Businesses need to keep trade secrets.  Law enforcement needs anonymity to get the job done.  Government need anonymity for their security.  Journalists and activists need anonymity for their personal safety.  Hard to configure your own network though!!  Compromised botnets  Stolen mobile phones  Open wireless nets  Malware spread (trojans, virus, worms)  Spamming  Phishing
  • 7. forensicinsight.org Page 7 Implemented Anonymous Network (1) tor (2) freenet (3) Gnunet (4) I2P
  • 8. forensicinsight.org Page 8 Implemented Anonymous Network - Tor  The Tor (the Onion Routing) at a glance TOR NETWORK  When there is an evil user or server, then it could be blocked with ease.  Tor is designed for hiding where the communication comes from, and going to.
  • 9. forensicinsight.org Page 9 Implemented Anonymous Network - Tor  The Tor (the Onion Routing) at a glance  Tor network consists of many relay and exit nodes. TOR RELAY TOR RELAY TOR RELAY TOR RELAY TOR RELAY TOR EXIT TOR EXIT  The idea comes from Chaum’s Mix-Net design at first. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms (Communications of the ACM February 1981 Volume 24 Number 2)
  • 10. forensicinsight.org Page 10 Implemented Anonymous Network - Tor  The Tor (the Onion Routing) Concept  Open source software https://svn.torproject.org/cgi-bin/viewvc.cgi/Tor/ http://sourceforge.net/projects/advtor/  A distributed, anonymous Network  A Protocol  Tor provides online anonymity
  • 11. forensicinsight.org Page 11 Implemented Anonymous Network - Tor  The Tor (the Onion Routing): How it works  Alice’s Tor client obtains a list of Tor nodes from a directory server, Dave.  Alice’s Tor client picks a random destination server.  Alice’s Tor client selects a second random path. https://www.torproject.org/about/overview.html.en
  • 12. forensicinsight.org Page 12 Implemented Anonymous Network - Tor  The Tor (the Onion Routing): Diffie-Hellman Key Exchange Algorithm in TLS (1/2)  DH establishes a shared secret that can be used for secret communications while exchanging data over a public network  (Step A) Alice and Bob have common information and secrets which belong to one’s own.  (Step B) Each creates a value with a secret, and transmit it to the other.  (Step C) Using a value by the other, each creates common secret.
  • 13. forensicinsight.org Page 13 Implemented Anonymous Network - Tor  The Tor (the Onion Routing): Diffie-Hellman Key Exchange Algorithm in TLS (2/2)  SSL / TLS (Secure Socket Layer / Transport Layer Security) http://en.wikipedia.org/wiki/Secure_Sockets_Layer
  • 14. forensicinsight.org Page 14 Implemented Anonymous Network - Tor  The Tor (the Onion Routing): Entire Mechanism (1/3)  Circuit (Chain) establishment Originator Entry Node (OR1) Web Server Exit Node (OR2) Directory Node (Special node) 1. Provide Node List 2. Choose nodes (chain, circuit) 3. DH Key Exchange 4. Session Key (secret) 5. DH Key Exchange 6. Session Key (secret) 7. DH Key Exchange 8. Session Key (secret)  All communication between nodes over TLSv1  The originator and directory node actually involves with DH over TLS.
  • 15. forensicinsight.org Page 15 Implemented Anonymous Network - Tor  The Tor (the Onion Routing): Entire Mechanism (2/3)  Sending HTTP data over the Internet anonymously Originator Entry Node (OR1) Web Server Exit Node (OR2) RELAY C1 Local Proxy (SOCKS) RELAY C2 RELAY C3  C1 = {RELAY C1: [RELAY (Send HTTP request to Web-Server-IP)]}  C2 = {RELAY C2: ENCRYPTED CONTENT}  C3 = {Send HTTP request to Web-Server-IP}  OR1 (Entry Node) knows the origin which the packets come from.  OR2 (Exit Node) knows the destination which the incoming packets go to.  If any, all OR nodes between entry node and exit node only know the adjacent nodes.
  • 16. forensicinsight.org Page 16 Implemented Anonymous Network - Tor  The Tor (the Onion Routing): Entire Mechanism (3/3)  Diagram about tor operation in details https://svn.torproject.org/svn/projects/design-paper/tor-design.html
  • 17. forensicinsight.org Page 17 Implemented Anonymous Network - Tor  The Tor (the Onion Routing): Statistics as of July, 2013 (1/2)  One of the largest deployed network  Almost 4,000 relays  Almost 2,000 bridges  Around 500,000 users per each day http://tigerpa.ws/tor_metrics/
  • 18. forensicinsight.org Page 18 Implemented Anonymous Network - Tor  The Tor (the Onion Routing): Statistics as of July, 2013 (2/2)  Some countries(ISPs) have a censorship to prevent users from getting access to certain sites.  Bridge Relays (almost 25,000) Helps censored users access the Tor network Are not listed in the same public directories
  • 19. forensicinsight.org Page 19 Implemented Anonymous Network - Tor  The Tor (the Onion Routing): Official Record  Tor Relay IP Address in the Past  https://metrics.torproject.org/exonerator.html  Tor Relay IP Search  https://metrics.torproject.org/relay-search.html
  • 20. forensicinsight.org Page 20 Implemented Anonymous Network - Tor  The Tor (the Onion Routing): Detection Technique Example (1/2)  Someone should talk to directory server (public) to join the tor network.  A series of unauthorized certificates in SSL/TLS communication before encryption.  Other than IP/Port (Layer 3), all TLS traffic are encrypted.
  • 21. forensicinsight.org Page 21 Implemented Anonymous Network - Tor  The Tor (the Onion Routing): Detection Technique Example (2/2)  X.509 Certificate has an issuer/subject field.  Tor initiates a series of SSL/TLS connections with 3~5 hosts at the same time.  This requires behavior-based analysis if bridges are used for censorship bypass. http://en.wikipedia.org/wiki/X.509 http://helpforsure.wordpress.com/tag/x-509-version-3-digital-certificates/
  • 22. forensicinsight.org Page 22 Implemented Anonymous Network - Freenet  What is Freenet?  A separate network that runs over the internet  Only access Freenet content through Freenet including: Freesites (websites on Freenet), in-Freenet chat forums (FMS, Sone, etc), files shared within Freenet, in-Freenet email  Distributed Database  The more popular a file or page, the more widely it will be cached, the faster it will download. https://freenetproject.org/faq.html
  • 23. forensicinsight.org Page 23 Implemented Anonymous Network - Freenet  Properties  A large distributed storage device  When storing a file, you receive a key to retrieve the file.  With a key, Freenet returns the appropriate file.  Data Management Location to store data: C:Users[UserID]AppDataLocalFreenetdatastore Little or no control over what is stored in your datastore Kept or deleted depending on how popular they are.  Routing Initially, each node has no information about the performance of the other nodes. (Random Routing) More documents  same node; begin to cluster with data items (Cuz the same routing rules are used) As a result, the network will self-organize into a distributed, clustered structure.
  • 24. forensicinsight.org Page 24 Implemented Anonymous Network - Freenet  Properties  Keys Each file that exists on Freenet has a key associated with it. Fproxy  http://localhost:8888/[Freenet Key]  CHK - Content Hash Keys The decryption key is stored encrypted within the file.  SSK - Signed Subspace Keys Usually for sites that are going to change over time  USK - Updateable Subspace Keys Linking to the latest version of a Signed Subspace Key (SSK) site  KSK - Keyword Signed Keys Allowing to save named pages in Freenet CHK @ file hash , decryption key , crypto settings SSK @ public key hash , decryption key , crypto settings / user selected name - version USK @ public key hash , decryption key , crypto settings / user selected name - version KSK @ myfile.txt
  • 25. forensicinsight.org Page 25 Implemented Anonymous Network - Gnunet  What is Gnunet?  Started in late 2001  Implemented for secure peer-to-peer networking  Improved content encoding: ECRS, the encoding for censorship resistant sharing  A framework for secure peer-to-peer networking that does not use any centralized  Focus on anonymous censorship-resistant file-sharing  Provides anonymity by . making messages originating from a peer indistinguishable from messages that the peer is routing . acting as routers and use link-encrypted connections with stable bandwidth utilization  Similar to tor, but limited to share files anonymously, searching, swarming, and caching. http://en.wikipedia.org/wiki/GNUnet https://gnunet.org/
  • 26. forensicinsight.org Page 26 Implemented Anonymous Network – I2P  What is I2P? (1/2)  Began in 2003  An anonymizing network, a low latency mix network  Goal: producing a low latency, fully distributed, autonomous, scalable, anonymous, resilient, and secure network  All data is wrapped with several layers of encryption. (End-to-End)  The network is both distributed and dynamic, with no trusted parties and no centralized resources. http://www.i2p2.de/
  • 27. forensicinsight.org Page 27 Implemented Anonymous Network – I2P  What is I2P? (2/2)  Made up of a set of nodes ("routers") with a number of unidirectional inbound and outbound virtual paths (“tunnels”)  Has its own internal network database (using a modification of the Kademlia algorithm) for distributing routing and contact information securely Garlic Wrapped: (Garlic Routing) 1. Layered Encryption 2. Bundling multiple messages together 3. ElGamal/AES Encryption Peer Profiling (Peer Collection) Peer Selection (Peer Choosing) http://www.i2p2.de/how_intro
  • 28. forensicinsight.org Page 28 Circumvention Techniques against Censorships (1) DPI (Deep Packet Inspection) (2) Obfsproxy (3) Flashproxy
  • 29. forensicinsight.org Page 29 Circumvention Techniques against Censorships  How to circumvent censorships by DPI (deep packet inspections)  Even bridges could be blocked by DPI.  New techniques have been introduced to circumvent such censorships.  Core technology: pluggable transport transformation  Obfsproxy is a Python framework for implementing new pluggable transports. It uses Twisted for its networking needs, and pyptlib for some pluggable transport-related features. It supports the obfs2 and obfs3 pluggable transports. (by George Kadianakis)  Flashproxy turns ordinary web browsers into bridges using websockets, and has a little python stub to hook Tor clients to the websocket connection. (by David Fifield)  ScrambleSuit is a pluggable transport that protects against follow-up probing attacks and is also capable of changing its network fingerprint (packet length distribution, inter-arrival times, etc.). It's part of the Obfsproxy framework. (by Philipp Winter)  StegoTorus is an Obfsproxy fork that extends it to a) split Tor streams across multiple connections to avoid packet size signatures, and b) embed the traffic flows in traces that look like html, javascript, or pdf. (by Zack Weinberg)  SkypeMorph transforms Tor traffic flows so they look like Skype Video. (by Ian Goldberg)  Dust aims to provide a packet-based (rather than connection-based) DPI-resistant protocol. (by Brandon Wiley) https://www.torproject.org/docs/pluggable-transports.html.en
  • 30. forensicinsight.org Page 30 Circumvention Techniques against Censorships  How to circumvent censorships by DPI - Obfsproxy  Transforms the Tor traffic between the client and the bridge.  Supports multiple protocols, pluggable transports.  Get bridges in Bridge DB and then add them to tor https://www.torproject.org/projects/obfsproxy.html.en https://bridges.torproject.org/?transport=obfs2
  • 31. forensicinsight.org Page 31 Circumvention Techniques against Censorships  How to circumvent censorships by DPI - flashproxy  Began as a project in Stanford's class in spring 2011  Works at tor version 0.2.3.2-alpha or later  This model have supposed that facilitator outside have been already blocked. : Client does not communicate directly to facilitator, designed to be covert and very hard to block. 1. Makes TLS Connection 2. Sends encrypted email from anonymous address to a special facilitator addr. 1. Checks this mailbox periodically 2. Decrypts the messages 3. Inserts the registrations they contain. https://crypto.stanford.edu/flashproxy/ https://crypto.stanford.edu/flashproxy/flashproxy.pdf