Hacking
Saprative Jana
Open Source Enthusiast
@saprative
What is Tor?
Tor is free software and an open network
that helps you defend against traffic
analysis, a form of network surveillance
that threatens personal freedom and
privacy, confidential business activities and
relationships, and state security.
Simply
Its a tool to hide your identity in the web.
How does tor look like
Who need anonymity
Government Organisation
Private Organisation
Hackers
Criminals ? but they have already it ..
What about you
Why do you need
anonymity
I believe in online freedom
Hate websites trying to access my data
Love to try out new technology. Cause it makes me
look smart.
love to browse deep web (why ?????????)
If anyone of the option matches you then you are in
the right room.
But after all of these if you
cannot find your option ..
… but still you are sitting
….. then most probably
you are a security
researcher……….
Tor in brief -2/3
Tor in brief -3/3
Tor in brief -1/3
Data send my me
Data send by me
Data send my second route
Data send by succeeder
Exit node
data send by
exit node
data received
by receiver
Tor router analogy
Tor terminology
Cell : Your message
Circuit : tunnel Mode up of relays
Entry node: First hop into tor network
Exit node: Last hop before destination
Relay Node: Middle hop
Bridge Node: Node not listed in the tor directory to evade
filtering .
Various tor project
tor (Core):
tor browser
trails
Atlas
stem
arm
Orbit
Arm
The anonymizing relay monitor (arm) is a CLI status monitor for Tor
resource usage (bandwidth, cpu, and memory usage)
general relaying information (nickname, fingerprint, flags,
or/dir/controlports)
event log with optional regex filtering and reduplication
connections correlated against tor's consensus data (ip, connection
types, relay details, etc)
torrc configuration file with syntax highlighting and validation
Orbit
Orbot is a free proxy app that empowers other apps
to use the internet more securely. Orbot uses Tor to
encrypt your Internet traffic and then hides it by
bouncing through a series of computers around the
world. Tor is free software and an open network
that helps you defend against a form of network
surveillance that threatens personal freedom and
privacy, confidential business activities and
relationships, and state security known as traffic
analysis.
What is stem?
Stem is a python rapper on the top of core
tor. It is a python controller library of tor.
Basic stem commands
Stem controller: Controller is a wrapper
around a ControlSocket of tor core.
Deeeeeeeeeep Web
Time for some action
Thank you
& Questions
& Questions
Contacts:
Fb: www.facebook.com/saprative
Twitter: @ saprative
Blog: saprative.co
saprative.co
saprative.co
saprative.co

Hacking Tor ( How does Tor work ?)

  • 1.
  • 2.
    What is Tor? Toris free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
  • 3.
    Simply Its a toolto hide your identity in the web.
  • 4.
    How does torlook like
  • 5.
    Who need anonymity GovernmentOrganisation Private Organisation Hackers Criminals ? but they have already it .. What about you
  • 6.
    Why do youneed anonymity I believe in online freedom Hate websites trying to access my data Love to try out new technology. Cause it makes me look smart. love to browse deep web (why ?????????) If anyone of the option matches you then you are in the right room.
  • 7.
    But after allof these if you cannot find your option .. … but still you are sitting ….. then most probably you are a security researcher……….
  • 8.
  • 9.
  • 10.
  • 11.
    Data send myme Data send by me
  • 12.
    Data send mysecond route Data send by succeeder
  • 13.
    Exit node data sendby exit node data received by receiver
  • 14.
  • 15.
    Tor terminology Cell :Your message Circuit : tunnel Mode up of relays Entry node: First hop into tor network Exit node: Last hop before destination Relay Node: Middle hop Bridge Node: Node not listed in the tor directory to evade filtering .
  • 16.
    Various tor project tor(Core): tor browser trails Atlas stem arm Orbit
  • 17.
    Arm The anonymizing relaymonitor (arm) is a CLI status monitor for Tor resource usage (bandwidth, cpu, and memory usage) general relaying information (nickname, fingerprint, flags, or/dir/controlports) event log with optional regex filtering and reduplication connections correlated against tor's consensus data (ip, connection types, relay details, etc) torrc configuration file with syntax highlighting and validation
  • 18.
    Orbit Orbot is afree proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.
  • 19.
    What is stem? Stemis a python rapper on the top of core tor. It is a python controller library of tor.
  • 20.
    Basic stem commands Stemcontroller: Controller is a wrapper around a ControlSocket of tor core.
  • 21.
  • 22.
  • 23.
  • 24.
    Contacts: Fb: www.facebook.com/saprative Twitter: @saprative Blog: saprative.co saprative.co saprative.co saprative.co