citec con1-tor truly anonymous

18
The Real Threat TOR : The Truly Anonymous LuC1F3R LuC1F3R Information Security Consultant Penetration Tester Security Researcher ACIS Professional Center ACIS Professional Center

Upload: prathan-phongthiproek

Post on 08-Jun-2015

897 views

Category:

Documents


6 download

TRANSCRIPT

Page 1: Citec Con1-Tor Truly Anonymous

The Real ThreatTOR : The Truly Anonymous

LuC1F3RLuC1F3R

Information Security ConsultantPenetration Tester

Security Researcher

ACIS Professional CenterACIS Professional Center

Page 2: Citec Con1-Tor Truly Anonymous

Outline

- Introduction to Tor Network- How to Bypass ISP’s Blacklist- How to Tor Work- How to Detect Tor- Tor VS. Proxy- Anonymity with Tor- DEMO

Page 3: Citec Con1-Tor Truly Anonymous

Introduction Tor Network

- Anonymous Proxies- Hide the real IP Address (Http_x_forwarded_for Header don’t sent)

- Can’t Detect the real source address- Bypass ISP’s Blacklist

Page 4: Citec Con1-Tor Truly Anonymous

ISP’s Blacklist

User

Web site

Internet

Page 5: Citec Con1-Tor Truly Anonymous

ISP’s Blacklist (Cont)

User

Blacklist

www.xxx.com

………

………

Equipments

Your website was block by ISP

Web site (www.xxx.com)

Page 6: Citec Con1-Tor Truly Anonymous

Bypass ISP’s Blacklist By Tor

User

Blacklist

www.xxx.com

………

………

Web site (www.xxx.com)

…....

Page 7: Citec Con1-Tor Truly Anonymous

How to Tor work: 1

Tor node

Unencrypted link

Encrypted link

John

Smith

David

Mary

Page 8: Citec Con1-Tor Truly Anonymous

How to Tor work: 2

Tor node

Unencrypted link

Encrypted link

John

Smith

David

Mary

Page 9: Citec Con1-Tor Truly Anonymous

How to Tor work: 3

Tor node

Unencrypted link

Encrypted link

John

Smith

David

Mary

Page 10: Citec Con1-Tor Truly Anonymous

Tor Map

Page 11: Citec Con1-Tor Truly Anonymous

How to Detect Tor

Page 12: Citec Con1-Tor Truly Anonymous

How to Detect Tor

IP: 203.144.143.2X: 58.8.14.224

Page 13: Citec Con1-Tor Truly Anonymous

How to Detect Tor

IP: 192.251.226.205X: -

Page 14: Citec Con1-Tor Truly Anonymous

Tor vs. Proxy

SSLSSL

Internet

PolicyPolicy SSLSSL

InternalNetwork

User

Apps

SSL Provides a Private Link for Legitimate Apps,Plus Malware, Confidential Info, Unsanctioned Traffic, Non-SSL Traffic

See SSL traffic Control SSL traffic

Detect and Prevent threats How users are being impacted

Ensure a “trusted” Web session Apply effective Web traffic policies

Determine if bandwidth is adequate Provide useful reports to management

Page 15: Citec Con1-Tor Truly Anonymous

Anonymous Proxies in Browser

Page 16: Citec Con1-Tor Truly Anonymous

Checking Source Address

CH-ChinaISP CHINANET

Page 17: Citec Con1-Tor Truly Anonymous

The Real Address

Page 18: Citec Con1-Tor Truly Anonymous

DEMO