Adrian Crenshaw. Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption.

Slides:



Advertisements
Similar presentations
SOCIAL WEB MEDIA privacy and data mining part 2 4/12/2010.
Advertisements

Enabling Secure Internet Access with ISA Server
A look into Bullet Proof Hosting November DefCamp 5 Silviu Sofronie – Head of Forensics
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Michelle J. Gosselin, Jennifer Schommer Guanzhong Wang.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Privacy and Security on the Web Part 1. Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Extras Plus! Pepper. Objectives extra knowledge Cookies Picture handling when creating site.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Report Distribution Report Distribution in PeopleTools 8.4 Doug Ostler & Eric Knapp 7264.
12/11/01 Matt Bridges Advisor: Ralph Morelli. What is Web Analytics? In traditional commerce, store owners can observe their customers habits: What time.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
1 Enabling Secure Internet Access with ISA Server.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
PROS & CONS of Proxy Firewall
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Secure Socket Layer (SSL)
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
DNS based IP NetLocation Service China Telecom Guangzhou Institute
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Cipherspace/Darknets: anonymizing networks
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Web Client-Server Server Client Hypertext link TCP port 80.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
Proxy Servers.
The Intranet.
Lecture Week 3 Application Layer Functionality and Protocols Network Fundamentals.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
TCP/IP (Transmission Control Protocol / Internet Protocol)
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
The Silk Road: An Online Marketplace
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
World Wide Web has been created to share the text document across the world. In static web pages the requesting user has no ability to interact with the.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Anonymous Internet Protocols
Application layer tcp/ip
The Intranet.
Lecture 5 Blocking practices
Tor Good + Evil.
Enabling Secure Internet Access with TMG
Configuring Internet-related services
Protocol Application TCP/IP Layer Model
Designing IIS Security (IIS – Internet Information Service)
Module 4 System and Application Security
Personal Privacy and the Public Internet
Message Passing Systems
Presentation transcript:

Adrian Crenshaw

Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption and proxies (some times other peers) to obfuscate who is communicating to whom

Invisible Internet Project (in a nutshell) Especially as compared to Tor

 Who? I2P developers, started by Jrandom.  Why? To act as an anonymizing layer on top of the Internet  What? Mostly other web sites on I2P (eepSites), but the protocol allows for P2P (iMule, i2psnark), anonymous and public Internet via out proxies.  How? Locally ran proxies that you can connect to and control via a web browser. These connect other I2P routers via tunnels. Network information is distributed via a DHT know as NetDB.

Image from

 EIGamal/SessionTag+AES from A to H  Private Key AES from A to D and E to H  Diffie–Hellman/Station-To-Station protocol + AES Image from

 Details  516 Character Address -KR6qyfPWXoN~F3UzzYSMIsaRy4udcRkHu2Dx9syXSz UQXQdi2Af1TV2UMH3PpPuNu-GwrqihwmLSkPFg4fv4y QQY3E10VeQVuI67dn5vlan3NGMsjqxoXTSHHt7C3nX3 szXK90JSoO~tRMDl1xyqtKm94-RpIyNcLXofd0H6b02 683CQIjb-7JiCpDD0zharm6SU54rhdisIUVXpi1xYgg 2pKVpssL~KCp7RAGzpt2rSgz~RHFsecqGBeFwJdiko- 6CYW~tcBcigM8ea57LK7JjCFVhOoYTqgk95AG04-hfe hnmBtuAFHWklFyFh88x6mS9sbVPvi-am4La0G0jvUJw 9a3wQ67jMr6KWQ~w~bFe~FDqoZqVXl8t88qHPIvXelv Ww2Y8EMSF5PJhWw~AZfoWOA5VQVYvcmGzZIEKtFGE7b gQf3rFtJ2FAtig9XXBsoLisHbJgeVb29Ew5E7bkwxvE e9NYkIqvrKvUAt1i55we0Nkt6xlEdhBqg6xXOyIAAAA  SusiDNS Names something.i2p  Hosts.txt and Jump Services  Base32 Address {52 chars}.b32.i2p rjxwbsw4zjhv4zsplma6jmf5nr24e4ymvvbycd3swgiinbvg7oga.b32.i2p

Pros  Lots of supported applications  Can create just about any hidden service if you use SOCKS5 as the client tunnel  Eepsites somewhat faster compared to Tor Hidden Services (Subjective, I know)  No central point of failure (Example: What happened to Tor when China blocked access to the core directory servers on September 25 th 2009) Cons  Limited out proxies  Sybil attacks a little more likely

1. Spidering the content of the eepSite for related sites. 2. Using tools like Nikto to find directories and files that reveal server information. 3. HTTP headers may be returned by the sites that reveal information. 4. Putting bait in logs via the user agent string that may make the administrator of the site visit a tracking page unproxied. 5. See if reverse DNS lookups done by the webserver when it generates logs give away its true IP. 6. Consult with security and privacy community at large for more ideas. 7. Flesh out some of the attacks listed in the threat model page. 8. Review the server and client proxy code for flaws. 9. Look at the Tor change log and see if any bugs were fixed that may still exist in I2P. Thanks to ZZZ for suggesting the last three points.

1. Communications with the eepSites is normally done via an HTTP proxy. This restricts my attack options somewhat. 2. Perhaps because of point one, many of the tools I have experimented with so far have a tendency to give false results or hang while working on spidering an eepSite. 3. While spidering I need to be careful not to download contraband onto my own system.

1. Clearer examples of how leaked information can be found. 2. A concentration on I2P instead of Tor. 3. A concentration on the application layer instead of the network or transport layers. 4. Real world tests on systems that have been implemented for more than just academic purposes. 5. Less reliance on esoteric attack vectors.

Week of Oct 5: Research deeper into I2P and how it works. Evaluate web application fingerprinting tools. Week of Oct 12: Give project proposal presentation. Continue work from week one. Look into developing or modifying existing tools to work better with I2P. Week of Oct 19: Run extensive tests with tools to see what information can be found. Week of Oct 26: Continue testing tools and collecting data on eepSites. This will continue up until the final draft of the project paper. Week of Nov 2: Parse collected data into a format that can be explained to others. Week of Nov 9: Work on status report. Week of Nov 16: Turn in status report and consider new directions to go. Week of Nov 23: Implement changes based on status report feedback. Week of Nov 30: Polish draft of final project report so it can be tuned in next week. Week of Dec 7: Turn in final project report and begin work on presentation. Week of Dec 14: Give final project presentation.

42 Project Page: Installing: