the onion routing network(tor)

15
THE ROUTING NETWORK MADE BY:- Notdefined operations

Upload: somesh-bhinda

Post on 09-Jan-2017

59 views

Category:

Internet


3 download

TRANSCRIPT

Page 1: The onion routing network(tor)

THE

ROUTINGNETWORKMADE

BY:- Notdefined operations

Page 2: The onion routing network(tor)

WARNING

This tutorial is only for educational purpose we are not responsible for illegal thing you done by using

this tutorial.DISCLAIMER

notdefined members is not responsible for bricked devices, dead SD cards, thermonuclear war, or you getting fired because the alarm app failed. Please

do some research before using tor sites

Page 3: The onion routing network(tor)

WHAT IS TOR ?Tor is is networking protocol used to hide your identity.

Tor is mostly used to view dark web.

90 % of the internet is deep/dark web.

provides online anonymity by hiding users' IP address.

circumvents online censorship by enabling users to access blocked websites.

does not include default online tracking features.

does not make money out of users' datais supported and recommended by some of the world's most renowned security experts

Page 4: The onion routing network(tor)

Hidden net

Page 5: The onion routing network(tor)

How to access deep/dark webNow question arises how to access these sites ?

Here come to rescue (tor).

You can only access deep/dark web using tor

Normal browser can’t open the tor sites

Extension uses by tor sites are .onion

Page 6: The onion routing network(tor)

HOW TO INSTALL TOR ?First of all before downloading tor use a vpn or proxy to download it.You can use browsec extension on chrome to hide your ip.Now go to google and search for “the tor project” Open the site and download it.Now open the tor browser enter not evil onion site in search bar.Now see the link like this “https://hss3uro2hsxfogfq.onion.to/” and open it And search whatever you want on the dark web

Page 7: The onion routing network(tor)
Page 8: The onion routing network(tor)

How normal network worksYour computer sends the request to access google.com by sending your public ip address attaching the information of page requested.

Then Google retuned the access to your public ip .

Result is you see Google homepage.

Basically every site is work this way.

It is less secure because they know yourip and they keep tacking you.

Only your ip is needed to reveal everything about you.

Page 9: The onion routing network(tor)

HOW TOR WORKS ?

Page 10: The onion routing network(tor)

HOW TOR WORKS ?First requested website request from yourComputer to tor servers in encrypted form.

It bounces from different different tor Servers or relay.

At the end of server it decrypted and goesTo the main site server.

Resulted webpage also follows the same Path as above.

This is how you see websites using tor .

Page 11: The onion routing network(tor)

Why Tor network ?Due to its anonymity and capability of hiding ip or your information that is why tor used.

It is mostly used by hackers to clear their tracks.

Illegal sites uses only tor to publish their contents because they cant get caught while using tor and that’s why it is hard to shutdown these sites

But tor is not all about illegal things you can find information and 90 % of internet on tor only.

Page 12: The onion routing network(tor)

TOR SITES…

Page 13: The onion routing network(tor)

TOR SITES…

Page 14: The onion routing network(tor)

ConclusionTor network is not completely safe and don’t do any thing that gets you in trouble.

You can safely view, browse and surf tor sites until unless you don’t do anything wrong

A 19 year old boy got arrested in 2015 trying to buy a gun.

Page 15: The onion routing network(tor)

ANY QUARIES………?

THANK YOU