SlideShare a Scribd company logo
1 of 30
Notify Tor user about quantum
insert attack
Mohiuddin Ebna Kawsar
Matriculation Number: 2544252
Institute of Computer Science IV
Work Group IT Security
Prof. Dr. Michael Meier
Rheinische Friedrich-Wilhelms-Universiät Bonn
What is ?
Uses of Tor
● Normal people use Tor
● Journalists and their audience use Tor
● Law enforcement officers use Tor
● Business executives use Tor
● Militarily use Tor
● IT Professionals use Tor
Why anonymity is important
Onion Routing
Images source: https://en.wikipedia.org/wiki/Onion_routing
How Tor works
Images source: www.torproject.org
How Tor works
Images source: www.torproject.org
How Tor works
Images source: www.torproject.org
How Tor works
Images source: www.torproject.org
Quantum Insert Attack
1) User
makes http
get request
to remote
server
PRECONDISION
Attacker needs
topologically closer
position to victim to
reply faster then
legitimate server
reply
2) Attacker send
spoofed packet
to redirect
Victim to dummy
webserver or
different server
Quantum Insert Attack
3) Victim/user
redirects to Attacker
webserver.
Quantum Insert Attack
Attacker injects malware to
victim System.
Snort position in Tor Network
Overall Port and Connection in Tor
Directory listener Port
Directory Port
CPU worker
Socks conn
OR conn
Edge conn
Control conn
Entry OR ExitOP
Overall Port and Connection in Tor
Directory listener Port
OR port
Directory Port
OR listener CPU worker
Or
Socks conn
OR conn
Edge conn
Control conn
Entry OR ExitOP
Overall Port and Connection in Tor
Directory listener Port
OR port
Control Listener
Control Port
Directory Port
OR listener
CPU worker
Socks port
Or
Socks Listener
Socks
Socks conn
OR conn
Edge conn
Control
Control conn
OP Entry OR Exit
Overall Port and Connection in Tor
Directory listener Port
Edge port
OR port
Control Listener
Control Port
Directory Port
OR listener
Edge
CPU worker
Socks port
Or
Socks Listener
Socks
Socks conn
OR conn
Edge conn
Control
Control conn
OP Entry OR Exit
Connection in Tor
Exit node debug message
Exit node debug message
Configuration added to each torrc
KeepalivePeriod 100
CircuitIdleTimeout 100
Exit connection debug message
Exit connection debug message
Connection in Tor
How alert travel back to client
const char payload [ C E L L _ P A Y L O A D _ S I Z E ] = " ATTACK QI % s % d % s % d " ;
How alert travel back to client
Images source: www.torproject.org
Evaluation Setup
Evaluation
Evaluation
Questions?
Thank you for listening

More Related Content

What's hot

Offline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected SetupOffline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected Setup0xcite
 
Alessio Lama - Development and testing of a safety network protocol
Alessio Lama - Development and testing of a safety network protocolAlessio Lama - Development and testing of a safety network protocol
Alessio Lama - Development and testing of a safety network protocollinuxlab_conf
 
Chapter 2
Chapter 2Chapter 2
Chapter 2shivz3
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleHimani Singh
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocolsphanleson
 
Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)
Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)
Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)Mohammed Omar
 
Network Traffic Search using Apache HBase
Network Traffic Search using Apache HBaseNetwork Traffic Search using Apache HBase
Network Traffic Search using Apache HBaseEvans Ye
 
USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...
USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...
USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...vanhoefm
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security Hariraj Rathod
 

What's hot (12)

Offline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected SetupOffline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected Setup
 
Alessio Lama - Development and testing of a safety network protocol
Alessio Lama - Development and testing of a safety network protocolAlessio Lama - Development and testing of a safety network protocol
Alessio Lama - Development and testing of a safety network protocol
 
Port Scanning Overview
Port Scanning  OverviewPort Scanning  Overview
Port Scanning Overview
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 example
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocols
 
Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)
Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)
Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)
 
Network Traffic Search using Apache HBase
Network Traffic Search using Apache HBaseNetwork Traffic Search using Apache HBase
Network Traffic Search using Apache HBase
 
Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
 
USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...
USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...
USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security
 
Side Channel Attacks on AES
Side Channel Attacks on AESSide Channel Attacks on AES
Side Channel Attacks on AES
 

Viewers also liked

Constantina paligora avertisment pentru linistea planetei
Constantina paligora   avertisment pentru linistea planeteiConstantina paligora   avertisment pentru linistea planetei
Constantina paligora avertisment pentru linistea planeteiliviuciubara
 
Seven Sacred Teachings In Mi'kmaq
Seven Sacred Teachings In Mi'kmaqSeven Sacred Teachings In Mi'kmaq
Seven Sacred Teachings In Mi'kmaqMelissa Marie
 
Ceklist peserta bimtek update
Ceklist peserta bimtek updateCeklist peserta bimtek update
Ceklist peserta bimtek updateEryda Sochifu
 
Ideas42 SXSWedu Workshop Proposal
Ideas42 SXSWedu Workshop ProposalIdeas42 SXSWedu Workshop Proposal
Ideas42 SXSWedu Workshop Proposaldgrodsky
 
Cultural Participation by Debra Yepapappan
Cultural Participation by Debra Yepapappan Cultural Participation by Debra Yepapappan
Cultural Participation by Debra Yepapappan Americans4Arts
 
How to Keyword Research - A Simple Guide
How to Keyword Research - A Simple GuideHow to Keyword Research - A Simple Guide
How to Keyword Research - A Simple GuideAravinth Rajagopalan
 
ashleyminton_resume updated 2016
ashleyminton_resume updated 2016ashleyminton_resume updated 2016
ashleyminton_resume updated 2016Ashley Minton
 
B.2. lk mik revisi (1)
B.2. lk mik    revisi (1)B.2. lk mik    revisi (1)
B.2. lk mik revisi (1)Atu Mindaratu
 
BUILD UP Skills Finland - 2 Rakennustyömaan sääsuojaus
BUILD UP Skills Finland - 2 Rakennustyömaan sääsuojausBUILD UP Skills Finland - 2 Rakennustyömaan sääsuojaus
BUILD UP Skills Finland - 2 Rakennustyömaan sääsuojausMotiva
 
Top 8 customs clerk resume samples
Top 8 customs clerk resume samplesTop 8 customs clerk resume samples
Top 8 customs clerk resume samplesDavidGuetta123
 
Michael allen's dumbest mistakes ever
Michael allen's dumbest mistakes everMichael allen's dumbest mistakes ever
Michael allen's dumbest mistakes everMichael Allen
 

Viewers also liked (20)

Constantina paligora avertisment pentru linistea planetei
Constantina paligora   avertisment pentru linistea planeteiConstantina paligora   avertisment pentru linistea planetei
Constantina paligora avertisment pentru linistea planetei
 
CV PreTech
CV PreTechCV PreTech
CV PreTech
 
Seven Sacred Teachings In Mi'kmaq
Seven Sacred Teachings In Mi'kmaqSeven Sacred Teachings In Mi'kmaq
Seven Sacred Teachings In Mi'kmaq
 
Ceklist peserta bimtek update
Ceklist peserta bimtek updateCeklist peserta bimtek update
Ceklist peserta bimtek update
 
Ideas42 SXSWedu Workshop Proposal
Ideas42 SXSWedu Workshop ProposalIdeas42 SXSWedu Workshop Proposal
Ideas42 SXSWedu Workshop Proposal
 
Cultural Participation by Debra Yepapappan
Cultural Participation by Debra Yepapappan Cultural Participation by Debra Yepapappan
Cultural Participation by Debra Yepapappan
 
How to Keyword Research - A Simple Guide
How to Keyword Research - A Simple GuideHow to Keyword Research - A Simple Guide
How to Keyword Research - A Simple Guide
 
Unidad educativa kasama
Unidad educativa kasamaUnidad educativa kasama
Unidad educativa kasama
 
Resumen el diario de ana frank
Resumen el diario de ana frankResumen el diario de ana frank
Resumen el diario de ana frank
 
ashleyminton_resume updated 2016
ashleyminton_resume updated 2016ashleyminton_resume updated 2016
ashleyminton_resume updated 2016
 
BebedeParis market study for Poland (1)
BebedeParis market study for Poland (1)BebedeParis market study for Poland (1)
BebedeParis market study for Poland (1)
 
Intentional code
Intentional codeIntentional code
Intentional code
 
Phrasal verbs
Phrasal verbsPhrasal verbs
Phrasal verbs
 
Zuhair Sagga
Zuhair SaggaZuhair Sagga
Zuhair Sagga
 
Like vs-as
Like vs-asLike vs-as
Like vs-as
 
B.2. lk mik revisi (1)
B.2. lk mik    revisi (1)B.2. lk mik    revisi (1)
B.2. lk mik revisi (1)
 
Grammar 5
Grammar 5Grammar 5
Grammar 5
 
BUILD UP Skills Finland - 2 Rakennustyömaan sääsuojaus
BUILD UP Skills Finland - 2 Rakennustyömaan sääsuojausBUILD UP Skills Finland - 2 Rakennustyömaan sääsuojaus
BUILD UP Skills Finland - 2 Rakennustyömaan sääsuojaus
 
Top 8 customs clerk resume samples
Top 8 customs clerk resume samplesTop 8 customs clerk resume samples
Top 8 customs clerk resume samples
 
Michael allen's dumbest mistakes ever
Michael allen's dumbest mistakes everMichael allen's dumbest mistakes ever
Michael allen's dumbest mistakes ever
 

Similar to presentation

Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga
 
Mr201304 open flow_security_eng
Mr201304 open flow_security_engMr201304 open flow_security_eng
Mr201304 open flow_security_engFFRI, Inc.
 
Ce hv8 module 18 buffer overflow
Ce hv8 module 18 buffer overflowCe hv8 module 18 buffer overflow
Ce hv8 module 18 buffer overflowMehrdad Jingoism
 
What can an attacker can determine which network services are enabled.docx
What can an attacker can determine which network services are enabled.docxWhat can an attacker can determine which network services are enabled.docx
What can an attacker can determine which network services are enabled.docxtodd471
 
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit MaheshwariScratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit MaheshwariOWASP Delhi
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliPriyanka Aash
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)Wail Hassan
 
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Black Duck by Synopsys
 
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Tim Mackey
 
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1  Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1 securityxploded
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceAsep Sopyan
 
Exploring Risk and Mapping the Internet of Things with Autonomous Drones
Exploring Risk and Mapping the Internet of Things with Autonomous DronesExploring Risk and Mapping the Internet of Things with Autonomous Drones
Exploring Risk and Mapping the Internet of Things with Autonomous DronesPraetorian
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008ClubHack
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008ClubHack
 
Placing backdoors-through-firewalls
Placing backdoors-through-firewallsPlacing backdoors-through-firewalls
Placing backdoors-through-firewallsAkapo Damilola
 
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisInside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisChong-Kuan Chen
 

Similar to presentation (20)

Net Defender
Net DefenderNet Defender
Net Defender
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Mr201304 open flow_security_eng
Mr201304 open flow_security_engMr201304 open flow_security_eng
Mr201304 open flow_security_eng
 
Ce hv8 module 18 buffer overflow
Ce hv8 module 18 buffer overflowCe hv8 module 18 buffer overflow
Ce hv8 module 18 buffer overflow
 
What can an attacker can determine which network services are enabled.docx
What can an attacker can determine which network services are enabled.docxWhat can an attacker can determine which network services are enabled.docx
What can an attacker can determine which network services are enabled.docx
 
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit MaheshwariScratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)
 
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...
 
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...
 
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1  Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissance
 
Exploring Risk and Mapping the Internet of Things with Autonomous Drones
Exploring Risk and Mapping the Internet of Things with Autonomous DronesExploring Risk and Mapping the Internet of Things with Autonomous Drones
Exploring Risk and Mapping the Internet of Things with Autonomous Drones
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Placing backdoors-through-firewalls
Placing backdoors-through-firewallsPlacing backdoors-through-firewalls
Placing backdoors-through-firewalls
 
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisInside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
 

presentation