Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6...

32
Information Security Inc. Introduction to Tor

Transcript of Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6...

Page 1: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Inc.

Introduction to Tor

Page 2: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Contents

2

• Tor

• DarkWeb vs DeepWeb

• Onion Sites

• References

Page 3: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

3

Page 4: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

4

Page 5: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

5

• The Onion Router

• Primary purpose => Anonymize Internet activity

• Series of routers that anonymously forward traffic

Page 6: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

6

• Tor Components

• Client => the user of the Tor network

• Server => the target TCP applications (web servers)

• Tor (onion) router => the special proxy relays the application data

• Directory server => servers holding Tor router information

Page 7: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

7

• Tor Operations

Page 8: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

8

• Tor Operations

Page 9: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

9

• Tor Operations

Page 10: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

10

• A circuit is built incrementally one hop by one hop

• Onion-like encryption => Alice negotiates an AES key with each

router; Messages are divided into equal sized cells; each router

knows only its predecessor and successor; Only the exit router

(OR3) can see the message

Page 11: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

11

• Connect to the Tor Network

• 1) CLI Daemon => apt-get install tor

Page 12: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

12

• Connect to the Tor Network

• CLI Daemon Configs => /etc/tor/torsocks.conf, /etc/tor/torrc

Page 13: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

13

• Connect to the Tor Network

• CLI Daemon Configs => Configure tor through /etc/tor/torrc (Set up

hidden services, Set up the port to listen on, Setup basic access

lists for allowing other systems to connect to tor through you)

Page 14: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

14

• Connect to the Tor Network

• CLI Daemon Configs => /etc/tor/torsocks.conf

• Using default settings

Page 15: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

15

• Connect to the Tor Network

• Starting Tor proxy => /etc/init.d/tor start

Page 16: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

16

• Connect to the Tor Network

• Starting Tor proxy => Point browser to 9050

Page 17: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

17

• Connect to the Tor Network

• Starting Tor proxy => Visit https://check.torproject.org for

confirmation

Page 18: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

18

• Connect to the Tor Network

• 2) TorBrowser => Simple Executable (launches portable Firefox

browser)

• Download at https://www.torproject.org/projects/torbrowser.html.en

Page 19: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

19

• Connect to the Tor Network

• TorBrowser => Simple Executable (launches portable Firefox

browser)

• Install Tor Browser

Page 20: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

20

• Connect to the Tor Network

• TorBrowser => Simple Executable (launches portable Firefox

browser)

• Run Tor Browser

Page 21: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

21

• Connect to the Tor Network

• TorBrowser => Simple Executable (launches portable Firefox

browser)

• Connect

Page 22: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Tor

22

Page 23: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

DarkWeb vs DeepWeb

23

• The “dark web” is the encrypted network that exists between Tor

servers and their clients

• The “deep web” is simply the content of databases and other web

services that for one reason or another cannot be indexed by

conventional search engines

Page 24: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Onion Sites

24

• We are connected => Now what?

• Browse the Internet anonymously

• Fight Censorship

• Generally just stay anonymous

• Tor Hidden Services, they sometimes ends up like below

Page 25: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Onion Sites

25

• Tor Hidden Services

• Services that live only in the Tor Network => Turn Tor into a

Darknet

• Services use .onion as TLD

• See => https://www.torproject.org/docs/onion-services

Page 26: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Onion Sites

26

• The http://zlal32teyptf4tvi.onion hidden service (tor hidden service

crawler / spider and web site)

Page 27: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Onion Sites

27

• The http://zlal32teyptf4tvi.onion hidden service (tor hidden service

crawler / spider and web site)

Page 28: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Onion Sites

28

• DeepWeb List => http://deepweblinks.org/

Page 29: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Onion Sites

29

• Hidden Wiki =>

http://kpvz7kpmcmne52qf.onion/wiki/index.php/Main_Page

Page 30: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Onion Sites

30

• DreamMarket => http://zyhljpm635qgy7wj.onion/

Page 31: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

Onion Sites

31

• SecurityBasics =>

http://kpvz7kpmcmne52qf.onion/wiki/index.php/Security_Basics

Page 32: Introduction to Tor · 2018-02-16 · Information Security Confidential - Partner Use Only Tor 6 •Tor Components •Client => the user of the Tor network •Server => the target

Information Security Confidential - Partner Use Only

References

32

• Tor Hidden Services

https://www.torproject.org/docs/onion-services

• Tor

https://en.wikipedia.org/wiki/Tor_(anonymity_network)

• Tor Download

https://www.torproject.org/projects/torbrowser.html.en

• List of Tor Hidden Services

https://en.wikipedia.org/wiki/List_of_Tor_hidden_services#Search_e

ngines