SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Presented by
• Alessandro Granato
• Emilio Cruciani
• Giovanni Colonna
• Silvio Biagioni
Deanonymization
Web Security and Privacy course – 2015/2016 – «La Sapienza» University
Presented by
• Alessandro Granato
Information
• http://www.slideshare.net/AlessandroGranato/deanonymization-in-tor-web
• linkedin.com/in/alessandro-granato-40b03081
• a.granato.89@gmail.com
Deanonymization – The Onion Router
Web Security and Privacy course – 2015/2016 – «La Sapienza» University
• What is Anonimity?
▫ Colloquial use – Web use
• What is Data Anonymization?
▫ Information Sanitization
▫ Security Privacy
• What is De-Anonymization?
▫ Cross-reference
Introduction
• Tor is a free SW for anonymous communication
▫ Volunteer relays to conceal user’s location
Introduction – The Onion Router
• Nested “Onion” encryption
▫ Encrypts Data, Sender IP, Receiver IP
▫ Through random circuits
▫ Last Relay!
• Monitoring to guarantee safety
• Tor abused by Cybercrime and Terrorists
• Monitoring capabilities over anonymizing networks
Governments vs Tor
People directly connected
to Tor in 2014:
2.5 Mln
Connected Users
• Tender for companies: “Perform research, code ‘TOR’ (Navy)”
• Develop technology to track Tor’s users
Russia vs Tor
Rewards:
4 Mln rubles
(~$ 111.000)
• Counter-Attack to deanonymizers in Tor Network
• Philipp Winter
• Stefan Lindskog
• Karlstad University
Spoiled Onions: Exposing Malicious Tor Exit Relays
• Tor circuits are encrypted tunnels
• Exit Relays -> Open internet -> Final destination
• Traffic usually lacks of end-to-end encryption
• Man in the middle by design
• Relays run by volunteers!
▫ Innocent
▫ Malicious
Spoiled Onions
• Goal: find malicious exit relays
▫ Develop an exit relay scanner
▫ Design browser extension patch
 Fetch and compare suspicious X.509 certificate
 standard for a public key infrastructure (PKI) to manage digital certificates
▫ Probe exit relays for 4 months
Spoiled Onions: The study
• Python based exit relay scanner
• Create custom circuits to exit relays
• Circuits probed by modules
▫ Estabilish decoy connections
• Objective
▫ Provoke exit relays to tamper with
these connections
▫ Reveal them!
Spoiled Onions: ExitMap
• Stem Library
▫ Implements Tor control
port
▫ Inititiate/close circuits
▫ Attach streams to circuits
• Fetch network to know online exit relays
• Get fed with set of exit relays
▫ Random permutation
• Initiate circuits over exit relays
• Invoke desired probing module that estabilish decoy connection
▫ __LeaveStreamsUnattached
▫ __DisablePredictedCircuits
Spoiled Onions: Using ExitMap
• HTTPS module
▫ Fetches decoy destination’s X.509 certificate -> extract fingerprint
▫ Compare to expected fingerprint (hard-coded inside)
▫ If mismatch -> ALERT!
• SSLSTRIP module
▫ Sslstrip attack: rewrite HTTPS answer as HTTP
▫ Silent attack: browsers don’t show alert
 You must notice the absence of TLS indicator (green address bar)
▫ The module verifies if the expected HTTPS link was «downgraded» to HTTP
Spoiled Onions: Probing modules
• In 2014:
▫ N = 1000 exit relays
▫ M = 25 malicious exit relays
▫ 2 relays: DNS censorship
▫ 1 relay: misconfigurated
▫ All the others: MitM attack
Spoiled Onions: Enemies Found!
• Connection with decoy destination
• Change decoy’s certificate with their own self-signed version
• Certificate is not issued by trusted autority of Tor’s certificate store
• Probable Man in the Middle attack!
▫ User redirected to the about:certerror warning page
Spoiled Onions: Enemies Found! (cont’d)
• Subset of malicious relays run by same group of people
▫ Same self-signed certificate (Main Autority)
▫ Same country (Russia)
▫ Same VPS provider
▫ Same netblock (176.99.0.0/20)
▫ Same old version of Tor
▫ Same destination target: Facebook
 Social Networks are often
attacked using MitM
Spoiled Onions: Enemies Found! (cont’d)
• ExitMap checks browser event DOMContentLoaded
▫ Whenever a document is loaded by the browser
• Check URI to find «about:certerror» warning page
• If found, there is self-signed certificate
• It can be authentic, but not in tor certificate store
• Refetch certificate with another circuit
• Compares the two fingerprints
▫ If same = authentic
▫ If not same = MitM attack
Spoiled Onions: Extension design
• If Man in the Middle attack:
▫ Show a warning pop-up
▫ User can send info about the case
Spoiled Onions: Extension design (cont’d)
• In 2014 there were ~1000 Tor exit relays
• Researchers developed a scanner to monitor exit relays for 4
months
• M = 25 malicious exit relay discovered
• The majority of MitM attacks were coordinated
• To avoid user deanonymization
▫ Developed ExitMap
▫ Developed a set of patches for Tor browser which are capable to fetch self-
signed certificates to evaluate their trust-worthiness and advise the user
Spoiled Onions: Conclusion
• Slideshare:
▫ http://www.slideshare.net/AlessandroGranato/deanonymization
-in-tor-web
• Infosec:
▫ http://resources.infosecinstitute.com/hacking-tor-online-
anonymity/
• Spoiled Onion paper:
▫ http://www.cs.kau.se/philwint/spoiled_onions/techreport.pdf
Useful links
Thank you!
Deanonymization – The Onion Router
Web Security and Privacy course – 2015/2016 – «La Sapienza» University
Questions?

Weitere ähnliche Inhalte

Kürzlich hochgeladen

20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 

Kürzlich hochgeladen (20)

20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 

Empfohlen

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Deanonymization in Tor web

  • 1. Presented by • Alessandro Granato • Emilio Cruciani • Giovanni Colonna • Silvio Biagioni Deanonymization Web Security and Privacy course – 2015/2016 – «La Sapienza» University
  • 2. Presented by • Alessandro Granato Information • http://www.slideshare.net/AlessandroGranato/deanonymization-in-tor-web • linkedin.com/in/alessandro-granato-40b03081 • a.granato.89@gmail.com Deanonymization – The Onion Router Web Security and Privacy course – 2015/2016 – «La Sapienza» University
  • 3. • What is Anonimity? ▫ Colloquial use – Web use • What is Data Anonymization? ▫ Information Sanitization ▫ Security Privacy • What is De-Anonymization? ▫ Cross-reference Introduction
  • 4. • Tor is a free SW for anonymous communication ▫ Volunteer relays to conceal user’s location Introduction – The Onion Router • Nested “Onion” encryption ▫ Encrypts Data, Sender IP, Receiver IP ▫ Through random circuits ▫ Last Relay!
  • 5. • Monitoring to guarantee safety • Tor abused by Cybercrime and Terrorists • Monitoring capabilities over anonymizing networks Governments vs Tor People directly connected to Tor in 2014: 2.5 Mln Connected Users
  • 6. • Tender for companies: “Perform research, code ‘TOR’ (Navy)” • Develop technology to track Tor’s users Russia vs Tor Rewards: 4 Mln rubles (~$ 111.000)
  • 7. • Counter-Attack to deanonymizers in Tor Network • Philipp Winter • Stefan Lindskog • Karlstad University Spoiled Onions: Exposing Malicious Tor Exit Relays
  • 8. • Tor circuits are encrypted tunnels • Exit Relays -> Open internet -> Final destination • Traffic usually lacks of end-to-end encryption • Man in the middle by design • Relays run by volunteers! ▫ Innocent ▫ Malicious Spoiled Onions
  • 9. • Goal: find malicious exit relays ▫ Develop an exit relay scanner ▫ Design browser extension patch  Fetch and compare suspicious X.509 certificate  standard for a public key infrastructure (PKI) to manage digital certificates ▫ Probe exit relays for 4 months Spoiled Onions: The study
  • 10. • Python based exit relay scanner • Create custom circuits to exit relays • Circuits probed by modules ▫ Estabilish decoy connections • Objective ▫ Provoke exit relays to tamper with these connections ▫ Reveal them! Spoiled Onions: ExitMap • Stem Library ▫ Implements Tor control port ▫ Inititiate/close circuits ▫ Attach streams to circuits
  • 11. • Fetch network to know online exit relays • Get fed with set of exit relays ▫ Random permutation • Initiate circuits over exit relays • Invoke desired probing module that estabilish decoy connection ▫ __LeaveStreamsUnattached ▫ __DisablePredictedCircuits Spoiled Onions: Using ExitMap
  • 12. • HTTPS module ▫ Fetches decoy destination’s X.509 certificate -> extract fingerprint ▫ Compare to expected fingerprint (hard-coded inside) ▫ If mismatch -> ALERT! • SSLSTRIP module ▫ Sslstrip attack: rewrite HTTPS answer as HTTP ▫ Silent attack: browsers don’t show alert  You must notice the absence of TLS indicator (green address bar) ▫ The module verifies if the expected HTTPS link was «downgraded» to HTTP Spoiled Onions: Probing modules
  • 13. • In 2014: ▫ N = 1000 exit relays ▫ M = 25 malicious exit relays ▫ 2 relays: DNS censorship ▫ 1 relay: misconfigurated ▫ All the others: MitM attack Spoiled Onions: Enemies Found!
  • 14. • Connection with decoy destination • Change decoy’s certificate with their own self-signed version • Certificate is not issued by trusted autority of Tor’s certificate store • Probable Man in the Middle attack! ▫ User redirected to the about:certerror warning page Spoiled Onions: Enemies Found! (cont’d)
  • 15. • Subset of malicious relays run by same group of people ▫ Same self-signed certificate (Main Autority) ▫ Same country (Russia) ▫ Same VPS provider ▫ Same netblock (176.99.0.0/20) ▫ Same old version of Tor ▫ Same destination target: Facebook  Social Networks are often attacked using MitM Spoiled Onions: Enemies Found! (cont’d)
  • 16. • ExitMap checks browser event DOMContentLoaded ▫ Whenever a document is loaded by the browser • Check URI to find «about:certerror» warning page • If found, there is self-signed certificate • It can be authentic, but not in tor certificate store • Refetch certificate with another circuit • Compares the two fingerprints ▫ If same = authentic ▫ If not same = MitM attack Spoiled Onions: Extension design
  • 17. • If Man in the Middle attack: ▫ Show a warning pop-up ▫ User can send info about the case Spoiled Onions: Extension design (cont’d)
  • 18. • In 2014 there were ~1000 Tor exit relays • Researchers developed a scanner to monitor exit relays for 4 months • M = 25 malicious exit relay discovered • The majority of MitM attacks were coordinated • To avoid user deanonymization ▫ Developed ExitMap ▫ Developed a set of patches for Tor browser which are capable to fetch self- signed certificates to evaluate their trust-worthiness and advise the user Spoiled Onions: Conclusion
  • 19. • Slideshare: ▫ http://www.slideshare.net/AlessandroGranato/deanonymization -in-tor-web • Infosec: ▫ http://resources.infosecinstitute.com/hacking-tor-online- anonymity/ • Spoiled Onion paper: ▫ http://www.cs.kau.se/philwint/spoiled_onions/techreport.pdf Useful links
  • 20. Thank you! Deanonymization – The Onion Router Web Security and Privacy course – 2015/2016 – «La Sapienza» University Questions?

Hinweis der Redaktion

  1. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  2. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  3. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  4. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  5. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  6. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  7. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  8. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  9. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  10. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  11. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  12. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  13. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  14. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  15. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  16. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  17. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.