Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
presentation
1. Notify Tor user about quantum
insert attack
Mohiuddin Ebna Kawsar
Matriculation Number: 2544252
Institute of Computer Science IV
Work Group IT Security
Prof. Dr. Michael Meier
Rheinische Friedrich-Wilhelms-Universiät Bonn
3. Uses of Tor
● Normal people use Tor
● Journalists and their audience use Tor
● Law enforcement officers use Tor
● Business executives use Tor
● Militarily use Tor
● IT Professionals use Tor
10. Quantum Insert Attack
1) User
makes http
get request
to remote
server
PRECONDISION
Attacker needs
topologically closer
position to victim to
reply faster then
legitimate server
reply
2) Attacker send
spoofed packet
to redirect
Victim to dummy
webserver or
different server
14. Overall Port and Connection in Tor
Directory listener Port
Directory Port
CPU worker
Socks conn
OR conn
Edge conn
Control conn
Entry OR ExitOP
15. Overall Port and Connection in Tor
Directory listener Port
OR port
Directory Port
OR listener CPU worker
Or
Socks conn
OR conn
Edge conn
Control conn
Entry OR ExitOP
16. Overall Port and Connection in Tor
Directory listener Port
OR port
Control Listener
Control Port
Directory Port
OR listener
CPU worker
Socks port
Or
Socks Listener
Socks
Socks conn
OR conn
Edge conn
Control
Control conn
OP Entry OR Exit
17. Overall Port and Connection in Tor
Directory listener Port
Edge port
OR port
Control Listener
Control Port
Directory Port
OR listener
Edge
CPU worker
Socks port
Or
Socks Listener
Socks
Socks conn
OR conn
Edge conn
Control
Control conn
OP Entry OR Exit