SlideShare a Scribd company logo
1 of 42
Who am I
๏ต 3rd
Year Engineering Student in Northern India Engineering College,
IP University
๏ต Currently interning in Main Brain Tech, funded startup operarting out
of Hyderabad and Bangalore
๏ต Former intern in EY, Microsoft AFs, and 3 other firms
๏ต Primary interest in corporate cyber security, ranging from black box
testing to the strategy incorporation in ASOCs
๏ต Secondary interests in mobile security, package reverse
engineering, android malware, analysis using A.R.E.
๏ต 6 years of exposure to cyber security
๏ต Other skills include public speaking, graphic design, website design
and deployment (backend and frontend),
Darknet
Introduction - Darknet
๏ต Most frequently refers to an area of the Internet only accessible by
using an encryption tool called The Onion Router (Tor)
๏ต Aimed at those desiring privacy online, although frequently attracts
those with criminal intentions
๏ต Ability to host websites anonymously and with a degree of impunity
๏ต Tor makes it difficult for governments to censor sites or content that
may be hosted elsewhere in the world
๏ต Critical mass of users averaging 2.5 million per day as of June 2016
(Tor Project 2016 statistics)
๏ต Frequently cited as one of the key tools against government
surveillance
๏ต Is a part of the Deepweb (sites that are not indexed by search
engines)
๏ต https://www.torproject.org/
Softwares used to
access the Deep
Web
The Onion Router (Tor) is an open-
source software program that allows users
to protect their privacy and security
against a common form of Internet
surveillance known as traffic analysis. Tor
was originally developed for the U.S.
Navy in an effort to protect government
communications. The name of the
software originated as an acronym for
the Onion Router, but Tor is now the
official name of the program.ย 
It is the most used software, due to the
services it hosts, in addition to its reliability
over the years.
Softwares used to
access the Deep
Web
Invisible Internet Project(I2P) is an
anonymous network, exposing a simple
layer that applications can use to
anonymously and securely send
messages to each other. The network
itself is strictly message based (a laย IP),
but there is a library available to allow
reliable streaming communication on top
of it (a laย TCP). All communication is end
to end encrypted (in total there are four
layers of encryption used when sending a
message), and even the end points
("destinations") are cryptographic
identifiers (essentially a pair ofย public
keys).
It is the most used software, due to the
services it hosts, in addition to its reliability
over the years.
It is lesser known than Tor, and therefore
less prone to deanonymization attacks.
Other softwares part of the Deep
Web
๏ต Freenet
๏ต Subgraph os
๏ต Freepto
๏ต iprediaOS
๏ต JonDo Live-CD (combination of TOR and other commonly used
darknet applications)
๏ต Whonix
๏ต Tails
๏ต Tox (encryped IM and video/audio calls, with voice modulation)
History in Brief
๏ต 1995 - Development began on โ€œOnion Routingโ€ (ONR)
๏ต 1997 โ€“ Funded by DARPA High Confidence Networks Program as
part of the Memex project was to invent better methods for
interacting with and sharing information, so users can quickly and
thoroughly organize and search subsets of information relevant to
their individual interests. The technologies developed in the
program would provide the mechanisms for improved content
discovery, information extraction, information retrieval, user
collaboration and other key search functions.
๏ต 1998 โ€“ 13 nodes created, 1 in Canadian Ministry of Defence
๏ต 2001 โ€“ More DARPA funding
๏ต 2003 - US Naval Research Lab releases ONR v2 (aka TOR)
๏ต 2004 - Hidden Services introduced
๏ต 2014 - Sponsors include SRI, US Department of State. NSF, Radio Free
Asia, The Ford Foundation, Google, EFF, 4300 individuals
Other softwares used to access
parts of the Darknet
๏ต Freenet is a popular darknet (friend-to-friend) by default; since version
0.7 it can run as a "opennet" (peer nodes are discovered
automatically).
๏ต RetroShare can be run as a darknet (friend-to-friend) by default to
perform anonymous file transfers if DHT and Discovery features are
disabled.
๏ต GNUnet is a darknet if the "F2F (network) topology" option is enabled.
๏ต Zeronet is open source software aimed to build an internet-like
computer network of peer-to-peer users of Tor.
๏ต Syndie is software used to publish distributed forums over the
anonymous networks of I2P, Tor and Freenet.
๏ต OneSwarm can be run as a darknet for friend-to-friend file-sharing.
๏ต Tribler can be run as a darknet for file-sharing.
Figures connecting India and Tor
Figures connecting India and Tor
How it works
๏ต Volunteers run thousands of
โ€œrelays,โ€ a server that any other
user can ask to route traffic
through
๏ต Observer can see traffic entering
and leaving the relay, but they
cannot determine which user is
visiting which site because the
traffic is encrypted
๏ต When a user visits any sites through
a relay, his traffic appears to
come from the relay rather than
the userโ€™s computer. Thus, the user
remains anonymous to the site
itself
๏ต How it works
Relay
Site A
Site B
Site C
User A
User B
User C
Observer
Hidden Services (HSes) in Tor
๏ต It is the ability to host a website (or Internet service) anonymously. In
this case, both the visitor and the site are anonymous to each other.
๏ต Analogous to websites on the internet
๏ต Also allows the possibility of criminally oriented material to be
hosted with a degree of impunity
๏ต 2016 study estimated that there were 43,000 HSes at any one time
๏ต Services use .onion as a domain name instead of .com etc
Different HSes offered
๏ต Hidden Wiki (like Wikipedia)
๏ต Torfind (Like Bing)
๏ต Grams (Like Google)
๏ต The Pirate Bay (Famous piracy p2p magnet site)
๏ต Assassination Market (Hire hitmen to assassinate people of interest)
๏ต Rent-A-Hacker (Hacking for money) (BlackHat ONLY)
๏ต TorCarding Forum (Trading of identities, hacking info, requires 50
USD for purchase)
๏ต Intel Exchange
๏ต HackBB (Advanced hacking tutorials)
๏ต SilkRoad 2.0 (Full fledged blackmarket for all kinds of recreational
drugs)
Different HSes offered (Contd.)
๏ต Agora (Same as Silk Road, online drugs marketplace and other illicit
items)
๏ต Fake US driver licences
๏ต Fake Passports/Drivers Licences of other countries
Transaction Methods in Darknet
๏ต Bitcoin is the only method of transactions on TOR.
๏ต Transfer BTC to wallet on any marketplace account, then use like
any normal E-commerce website
๏ต Ship to pick-up location, home, anywhere else
๏ต BTC (or any cryptocurrency) boils down to a global transaction
ledger maintained by the computational power of a P2P network.
Bitcoins
๏ต Bitcoins are not physical currency; the currency itself depends on
transactions and no actual money changes hands
๏ต Cryptocurrency is extremely hard to track, since Bitcoin accounts
are alphanumeric strings, instead of normal names
๏ต It is therefore viable for anonymous transactions i.e. for the
exchange of illegal services for bitcoins ( like hacking ranging from
lone wolf to full black box attacks, to assassinations, obtaining
federal intelligence, stalking, compromised credit card and email
details)
Considerations for TOR
๏ต Tor can in some cases reveal your true identity
๏ต If someone owns both an entry and exit node, they can correlate
between the two (this is known as a correlation attack)
๏ต Browser exploits like JavaScript Engine, XSS and pingbacks over non
Tor connections
๏ต BTC is not fully anonymous, the block chain is made available to the
public
Alternative to TOR โ€“ I2P
(Invisible Internet Project)
๏ต The โ€œInvisible Internet Projectโ€
๏ต Messages encrypted
๏ต Outbound and Inbound tunnels
๏ต Data exchange
๏ต 1st query must be made to I2P networkโ€™s โ€œdatabaseโ€
๏ต Acts like a distributed hash table
Content on the Darknet
๏ต Abuse: sites where the title indicates some form of sexual abuse
(typically minors)
๏ต Anonymity: sites aimed at promoting (or teaching) the use of anonymity
tools or anonymous culture
๏ต Bitcoin: currency exchange from a mainstream currency to bitcoin, but
more often money-laundering services
๏ต Blog: personal or topical blog, often covering topics such as hacktivism
๏ต Books: ebook service typically offering copyrighted material for free
๏ต Chat: web-based chat service, excluding services such as Jabber and
Internet Relay Chat
๏ต Counterfeit: sites offering counterfeit items; notable fake currency, such
as notes, or fake passports/ identity documents
๏ต Directory: site offering links to other sites within the Dark Net, often used
for discovering other sites
Content on the Darknet (Contd.)
๏ต Drugs: the sale or purchase of narcotics; typically, marketplaces
connecting buyers and sellers
๏ต Forum: web-based forum whose primary purpose does not fit into
another category; for example, generalist forum
๏ต Fraud: sites attempting to obtain a pecuniary advantage by deception
๏ต Gambling: any site that promotes/supports gambling. Bitcoin gambling
services were most prevalent here, whereby users would first convert
their fiat currency to bitcoin
๏ต Guns: sites exclusively aimed at selling guns
๏ต Hacking: site providing instructional information on illegal computer
hacking
๏ต Hosting: Dark Net hosting service allowing users to host another Dark Net
site
๏ต Mail: Dark Net web-based email or messaging service; examples
include Mail2Tor and the now defunct TorMail
Content on the Darknet (Contd.)
๏ต Market: a marketplace selling items other than drugs or services
covered in other categories
๏ต News: news service such as current affairs or news specific to the
Dark Net
๏ต Porn: Pornography sites that carry material that would be legal in
most Western jurisdictions
๏ต Search: site providing a search engine-type service; one example is
Ahmia
๏ต Whistleblower: sites typically operated by journalists for
whistleblowers to submit documents. The GlobaLeaks platform
(Hermes Center for Transparency and Digital Human Rights 2014)
and SecureDrop platform (Freedom of the Press Foundation 2014)
were prominently featured in this category.
Breaking the anonymity of Tor Users
and HSes
๏ต In reality, any suitably resourced entity can launch attacks with high
success rates while maintaining a minimal risk of detection
๏ต A typical user may send millions of bytes and an observer can see
the precise time they were sent and received. It is therefore easy to
confirm with high probability that two parties are communicating.
๏ต No cases whereby a deanonymization attack alone has been used
to seek a conviction
๏ต Therefore this process involves guesswork
Breaking the anonymity of Tor Users
and HSes
๏ต When visitors accessed a website, the FBI deployed a network
investigative technique (NIT) โ€“ a hacking tool โ€“ and used a single
warrant to uncover 1,300 IP addresses, tracing these addresses
back to actual individuals, in the case of Playpen.
๏ต When visitors accessed the website, although their traffic might
have been encrypted, a Flash application was secretly installed on
the user's computer that quietly sent important data about the user
straight to the FBI so that it did not pass through the Tor network at
all.
Case Studies โ€“ 1(Harvard)
๏ต Eldo Kim made a bomb threat to Harvard's student newspaper and
some other Harvard officials
๏ต The reasons under the sun to do something like this his was that he
wanted to get out of a final exam
๏ต He used tor to send the threat via email
๏ต He connected to TOR through his student account
๏ต Because of this fact and the fact that he was the only one
connected to TOR at the time the email was sent it was easy for
them to correlate that he may have sent the threat. As if that
wasn't enough, Eldo puts the final nail in his own coffin by actually
admitting that he was the one who made the bomb threat.
Lessons Learned
๏ต Don't be the only person using Tor on a monitored network at a
given time
๏ต Use a bridge
๏ต DON'T ADMIT ANYTHING
๏ต Correlation attacks are a bitch
Case Studies โ€“ 2 (Citizen of the US)
๏ต Hector (Sabu) was already being watched by the FBI. However, his
mistake was that he became careless
๏ต Slipping up, he connected to IRC without tor, when he normally
would. This allowed the FBI to get his home IP address.
๏ต Jeremy( sup_g ), when speaking with Hector on IRC spoke carelessly
of places he had previously been arrested and other groups that he
was involved with. The FBI used this information to narrow their
suspect pool and allowed them to obtain a court order to monitor
his internet traffic.
๏ต Once again correlation proves to be a bitch say this because
although the FBI did not exploit tor to bust Jeremy, they were,
however, able to correlate the times 'sup_g' spoke with 'Sabu' on
IRC with when Jeremy was at home using his computer.
Lessons Learned
๏ต Use Tor consistently
๏ต Don't give personal information
๏ต Correlation attacks are still a b!$%*%!
Case Studies โ€“ 3 (Freedom hosting)
๏ต Freedom Hosting was known for hosting child pornography. This is
enough to make you a mark for all sorts. In fact, Freedom had
already been under attack from Anonymous during Op Darknet
because of the child porn.ย 
๏ต The FBI was able to compromise Freedom because they were using
an outdated version, 17 ESR, of tor browser. This allowed the FBI to
exploit bug CVE-2013-1690.
๏ต Freedom Hosting did not update their version of the TOR browser.
๏ต The FBI used a payload called Magneto that gave them Freedom's
IP address, MAC address, and Windows host name with the unique
serial number that ties a user to a site visit (Cookie malware!!)
Lessons Learned
๏ต Don't host Captain Picard or Julian Bashir
๏ต Patch, patch, patch
๏ต Follow the money
๏ต Leave encrypted laptops in a powered down state when not in use!
Case Studies โ€“ 4 (Silk Road)
๏ต Famous drug acquisition site - Ross Ulbricht (Dread Pirate Roberts)
๏ต To market his site [The Silk Road] he would post around in clear net
forums (reddit, HF.net etc.)
๏ต The FBI claims the former physics and engineering student even
publicly alluded to his alleged criminal enterprise on his LinkedIn
profile
๏ต He put his links on his G+ account and regularly posted that he was
using Ubuntu on the actual Hses
๏ต He would go as far as the neighborhood Starbucks or library, which
was just around the corner from his house, to logon to and
administrate his Silk Road onion
Lessons Learned
๏ต Donโ€™t do drugs, drugs are bad
๏ต Keep online identities separate
๏ต Have a consistent story
๏ต Don't talk about personal interests
๏ต Don't volunteer information!
Blocking Of Tor
๏ต Since the list of relays (known as the consensus) is public, anyone is
able to download the list and block access to all of them. The user
would then be unable to connect to the first hop and into the
network
๏ต An individual can block a single site by launching several relays and
ensuring they occupy the positions in the DHT of the responsible
relays for that service. If someone comes to the relay asking for the
descriptor, the individual can simply deny it
๏ต Operators of Tor relays could themselves choose to block the
content by patching their relays to deny requests to these sites. This
would require the cooperation of a large percentage of relay
operators to be effective, but it would be a decentralized blocking
mechanism requiring some consensus
Examples of TOR Relay Lists
๏ต https://torstatus.blutmagie.de/ - Common list of approximately 7000
routers being used as Onion relays
๏ต https://atlas.torproject.org/#/top10 - Top 10 relays in order of
bandwidth provided ( remember that a TOR network is only as fast
as its slowest router, depending upon bandwidth as well as latency)
๏ต https://www.dan.me.uk/tornodes - List of entry and exit nodes
updated every 30 minutes. Commonly used in the EU to ban entry
to the TOR network.
๏ต https://onionview.com/ - Provides a visual map of entry, exit and
internal relays around the globe.
Legalities involved with relevance
to Darknet as a whole
๏ต India has NO laws that deal with accessing the Darknet, using Tor or
other softwares, using TAILS or other operating systems that either
promise, claim or guarantee anonymity. Torrents are legal in India,
depending on what is being downloaded using a P2P connection
(keeping in mind the International Intellectual Property Law)
๏ต Almost all Western countries, China and Russia have implemented
defenses against the Darknet, however Tor is a state sponsored
resource that is used by the public for concerns of privacy
๏ต Need is to build cyber laws that can tackle illicit
transactions/trade/barter on the internet as well as the Darknet.
Conclusion
๏ต Socio-cultural forces are involved in the โ€œgeneration and sustainabilityโ€ of criminal
entities that use the Darknet. For example, some countries do not have functioning or
sufficient markets in legal goods, a context in which the Darknet may actually facilitate
increased social welfare and economic efficiency.
๏ต The Deep Web and the Darknet are attractive to many because of the prosecution,
regulation, and national security surveillance efforts of states in the physical world and
Surface Web. Illicit activity is being driven below the electronic thermocline of
common search engines and usual investigative techniques, and states must be willing
to dive beneath it to gather information and take action.
๏ต The transnationality of these networks frustrates eradication, regulatory, and
prosecution efforts of any one state, creating cooperation, collective action, and law
harmonization problems for state actors attempting to work together to counter illicit
use of the Internet.
Questions?
P.s. hiteshbhatia3559@gmail.com

More Related Content

What's hot

Guide to dark web
Guide to dark webGuide to dark web
Guide to dark webJspider - Noida
ย 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
ย 
The dark web
The dark webThe dark web
The dark webhellboytonmoy
ย 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark WebAdityakumar Yadav
ย 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfRajanshumanPradhan2
ย 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
ย 
The dark web
The dark webThe dark web
The dark webBella M
ย 
My darkweb-presentation
My darkweb-presentationMy darkweb-presentation
My darkweb-presentationPaul Wilson
ย 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
ย 
PPT dark web
PPT dark webPPT dark web
PPT dark webjitiyaashwin
ย 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to TorJaskaran Narula
ย 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the WebPaula Ripoll Cacho
ย 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORKRishikese MR
ย 
Darknet
DarknetDarknet
Darknettchou21
ย 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine ImpasClaudine Impas
ย 

What's hot (20)

Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
ย 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
ย 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
ย 
The dark web
The dark webThe dark web
The dark web
ย 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
ย 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
ย 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
ย 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
ย 
The dark web
The dark webThe dark web
The dark web
ย 
My darkweb-presentation
My darkweb-presentationMy darkweb-presentation
My darkweb-presentation
ย 
Dark web
Dark webDark web
Dark web
ย 
Dark wed
Dark wedDark wed
Dark wed
ย 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
ย 
PPT dark web
PPT dark webPPT dark web
PPT dark web
ย 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
ย 
Deep web
Deep webDeep web
Deep web
ย 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
ย 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
ย 
Darknet
DarknetDarknet
Darknet
ย 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
ย 

Viewers also liked

Hacking & Securing of iOS Apps by Saurabh Mishra
Hacking & Securing of iOS Apps by Saurabh MishraHacking & Securing of iOS Apps by Saurabh Mishra
Hacking & Securing of iOS Apps by Saurabh MishraOWASP Delhi
ย 
DFIR using Docker Containers by Deep Shankar Yadav
DFIR using Docker Containers by Deep Shankar YadavDFIR using Docker Containers by Deep Shankar Yadav
DFIR using Docker Containers by Deep Shankar YadavOWASP Delhi
ย 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
ย 
OWASP top 10-2013
OWASP top 10-2013OWASP top 10-2013
OWASP top 10-2013tmd800
ย 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGSCrowdStrike
ย 
OWASP Top 10 2013
OWASP Top 10 2013OWASP Top 10 2013
OWASP Top 10 2013markstory
ย 
How TOR works?
How TOR works?How TOR works?
How TOR works?Onkar Badiger
ย 
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...OWASP Delhi
ย 
Minority business solutions
Minority business solutionsMinority business solutions
Minority business solutionsJack740
ย 
J1 shen xiao hui
J1 shen xiao huiJ1 shen xiao hui
J1 shen xiao huiAkiko Murata
ย 
The art of android hacking by Abhinav Mishra (0ctac0der)
The art of  android hacking by Abhinav Mishra (0ctac0der)The art of  android hacking by Abhinav Mishra (0ctac0der)
The art of android hacking by Abhinav Mishra (0ctac0der)OWASP Delhi
ย 
[Webinar] - 6 steps guide to select a business phone system
[Webinar] - 6 steps guide to select a business phone system[Webinar] - 6 steps guide to select a business phone system
[Webinar] - 6 steps guide to select a business phone systemTaraSpan
ย 
A London Tale of Gin and Sin
A London Tale of Gin and SinA London Tale of Gin and Sin
A London Tale of Gin and SinTales of the Cocktail
ย 
Roca bathroom
Roca bathroomRoca bathroom
Roca bathroomfountaindirect
ย 
Thetexaslawyer
ThetexaslawyerThetexaslawyer
ThetexaslawyerJack740
ย 
ฮฝฮตฮฟ ฮปฯ…ฮบฮตฮนฮฟ
ฮฝฮตฮฟ ฮปฯ…ฮบฮตฮนฮฟฮฝฮตฮฟ ฮปฯ…ฮบฮตฮนฮฟ
ฮฝฮตฮฟ ฮปฯ…ฮบฮตฮนฮฟelpitheo
ย 

Viewers also liked (17)

Hacking & Securing of iOS Apps by Saurabh Mishra
Hacking & Securing of iOS Apps by Saurabh MishraHacking & Securing of iOS Apps by Saurabh Mishra
Hacking & Securing of iOS Apps by Saurabh Mishra
ย 
DFIR using Docker Containers by Deep Shankar Yadav
DFIR using Docker Containers by Deep Shankar YadavDFIR using Docker Containers by Deep Shankar Yadav
DFIR using Docker Containers by Deep Shankar Yadav
ย 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
ย 
Deep web
Deep webDeep web
Deep web
ย 
OWASP top 10-2013
OWASP top 10-2013OWASP top 10-2013
OWASP top 10-2013
ย 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
ย 
OWASP Top 10 2013
OWASP Top 10 2013OWASP Top 10 2013
OWASP Top 10 2013
ย 
How TOR works?
How TOR works?How TOR works?
How TOR works?
ย 
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
ย 
Minority business solutions
Minority business solutionsMinority business solutions
Minority business solutions
ย 
J1 shen xiao hui
J1 shen xiao huiJ1 shen xiao hui
J1 shen xiao hui
ย 
The art of android hacking by Abhinav Mishra (0ctac0der)
The art of  android hacking by Abhinav Mishra (0ctac0der)The art of  android hacking by Abhinav Mishra (0ctac0der)
The art of android hacking by Abhinav Mishra (0ctac0der)
ย 
[Webinar] - 6 steps guide to select a business phone system
[Webinar] - 6 steps guide to select a business phone system[Webinar] - 6 steps guide to select a business phone system
[Webinar] - 6 steps guide to select a business phone system
ย 
A London Tale of Gin and Sin
A London Tale of Gin and SinA London Tale of Gin and Sin
A London Tale of Gin and Sin
ย 
Roca bathroom
Roca bathroomRoca bathroom
Roca bathroom
ย 
Thetexaslawyer
ThetexaslawyerThetexaslawyer
Thetexaslawyer
ย 
ฮฝฮตฮฟ ฮปฯ…ฮบฮตฮนฮฟ
ฮฝฮตฮฟ ฮปฯ…ฮบฮตฮนฮฟฮฝฮตฮฟ ฮปฯ…ฮบฮตฮนฮฟ
ฮฝฮตฮฟ ฮปฯ…ฮบฮตฮนฮฟ
ย 

Similar to Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia

Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptxeliofatjon
ย 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
ย 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
ย 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli Shahbazi Khojasteh
ย 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknetDvir Barel
ย 
Dw communication
Dw communicationDw communication
Dw communicationArjun Chetry
ย 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
ย 
(130727) #fitalk anonymous network concepts and implementation
(130727) #fitalk   anonymous network concepts and implementation(130727) #fitalk   anonymous network concepts and implementation
(130727) #fitalk anonymous network concepts and implementationINSIGHT FORENSIC
ย 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Saprative Jana
ย 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Auto Parts Wholesale Online
ย 
Dark Net
Dark NetDark Net
Dark Netjangezkhan
ย 
seminar PowerPoint Presentation.pptx
seminar  PowerPoint Presentation.pptxseminar  PowerPoint Presentation.pptx
seminar PowerPoint Presentation.pptxSriHarshaThirumala
ย 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
ย 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docxRoshniChauhan24
ย 

Similar to Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia (20)

Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
ย 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
ย 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
ย 
Invisible Web
Invisible Web Invisible Web
Invisible Web
ย 
Dark Web
Dark WebDark Web
Dark Web
ย 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
ย 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknet
ย 
Dw communication
Dw communicationDw communication
Dw communication
ย 
Onion protocol
Onion protocolOnion protocol
Onion protocol
ย 
Darknet
DarknetDarknet
Darknet
ย 
.Onion
.Onion.Onion
.Onion
ย 
(130727) #fitalk anonymous network concepts and implementation
(130727) #fitalk   anonymous network concepts and implementation(130727) #fitalk   anonymous network concepts and implementation
(130727) #fitalk anonymous network concepts and implementation
ย 
Dark net
Dark netDark net
Dark net
ย 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)
ย 
Deep web
Deep webDeep web
Deep web
ย 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
ย 
Dark Net
Dark NetDark Net
Dark Net
ย 
seminar PowerPoint Presentation.pptx
seminar  PowerPoint Presentation.pptxseminar  PowerPoint Presentation.pptx
seminar PowerPoint Presentation.pptx
ย 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
ย 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
ย 

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
ย 
Securing dns records from subdomain takeover
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
ย 
Effective Cyber Security Report Writing
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
ย 
Data sniffing over Air Gap
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
ย 
UDP Hunter
UDP HunterUDP Hunter
UDP HunterOWASP Delhi
ย 
Demystifying Container Escapes
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi
ย 
Automating WAF using Terraform
Automating WAF using TerraformAutomating WAF using Terraform
Automating WAF using TerraformOWASP Delhi
ย 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat IntelligenceOWASP Delhi
ย 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghOWASP Delhi
ย 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOWASP Delhi
ย 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap OWASP Delhi
ย 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriOWASP Delhi
ย 
DMARC Overview
DMARC OverviewDMARC Overview
DMARC OverviewOWASP Delhi
ย 
Cloud assessments by :- Aakash Goel
Cloud assessments  by :- Aakash GoelCloud assessments  by :- Aakash Goel
Cloud assessments by :- Aakash GoelOWASP Delhi
ย 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarOWASP Delhi
ย 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanOWASP Delhi
ย 
IETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit BatraIETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit BatraOWASP Delhi
ย 
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraMalicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraOWASP Delhi
ย 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghOWASP Delhi
ย 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraThwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraOWASP Delhi
ย 

More from OWASP Delhi (20)

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
ย 
Securing dns records from subdomain takeover
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeover
ย 
Effective Cyber Security Report Writing
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report Writing
ย 
Data sniffing over Air Gap
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air Gap
ย 
UDP Hunter
UDP HunterUDP Hunter
UDP Hunter
ย 
Demystifying Container Escapes
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container Escapes
ย 
Automating WAF using Terraform
Automating WAF using TerraformAutomating WAF using Terraform
Automating WAF using Terraform
ย 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
ย 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
ย 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
ย 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap
ย 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit Giri
ย 
DMARC Overview
DMARC OverviewDMARC Overview
DMARC Overview
ย 
Cloud assessments by :- Aakash Goel
Cloud assessments  by :- Aakash GoelCloud assessments  by :- Aakash Goel
Cloud assessments by :- Aakash Goel
ย 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang Bhatnagar
ย 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit Ranjan
ย 
IETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit BatraIETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit Batra
ย 
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraMalicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
ย 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
ย 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraThwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
ย 

Recently uploaded

VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
ย 
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
ย 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...SUHANI PANDEY
ย 
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceBusty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceDelhi Call girls
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
ย 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹nirzagarg
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceEscorts Call Girls
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
ย 

Recently uploaded (20)

VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
ย 
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
ย 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
ย 
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceBusty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
ย 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
ย 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
ย 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย 

Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia

  • 1. Who am I ๏ต 3rd Year Engineering Student in Northern India Engineering College, IP University ๏ต Currently interning in Main Brain Tech, funded startup operarting out of Hyderabad and Bangalore ๏ต Former intern in EY, Microsoft AFs, and 3 other firms ๏ต Primary interest in corporate cyber security, ranging from black box testing to the strategy incorporation in ASOCs ๏ต Secondary interests in mobile security, package reverse engineering, android malware, analysis using A.R.E. ๏ต 6 years of exposure to cyber security ๏ต Other skills include public speaking, graphic design, website design and deployment (backend and frontend),
  • 3.
  • 4. Introduction - Darknet ๏ต Most frequently refers to an area of the Internet only accessible by using an encryption tool called The Onion Router (Tor) ๏ต Aimed at those desiring privacy online, although frequently attracts those with criminal intentions ๏ต Ability to host websites anonymously and with a degree of impunity ๏ต Tor makes it difficult for governments to censor sites or content that may be hosted elsewhere in the world ๏ต Critical mass of users averaging 2.5 million per day as of June 2016 (Tor Project 2016 statistics) ๏ต Frequently cited as one of the key tools against government surveillance ๏ต Is a part of the Deepweb (sites that are not indexed by search engines) ๏ต https://www.torproject.org/
  • 5. Softwares used to access the Deep Web The Onion Router (Tor) is an open- source software program that allows users to protect their privacy and security against a common form of Internet surveillance known as traffic analysis. Tor was originally developed for the U.S. Navy in an effort to protect government communications. The name of the software originated as an acronym for the Onion Router, but Tor is now the official name of the program.ย  It is the most used software, due to the services it hosts, in addition to its reliability over the years.
  • 6. Softwares used to access the Deep Web Invisible Internet Project(I2P) is an anonymous network, exposing a simple layer that applications can use to anonymously and securely send messages to each other. The network itself is strictly message based (a laย IP), but there is a library available to allow reliable streaming communication on top of it (a laย TCP). All communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points ("destinations") are cryptographic identifiers (essentially a pair ofย public keys). It is the most used software, due to the services it hosts, in addition to its reliability over the years. It is lesser known than Tor, and therefore less prone to deanonymization attacks.
  • 7. Other softwares part of the Deep Web ๏ต Freenet ๏ต Subgraph os ๏ต Freepto ๏ต iprediaOS ๏ต JonDo Live-CD (combination of TOR and other commonly used darknet applications) ๏ต Whonix ๏ต Tails ๏ต Tox (encryped IM and video/audio calls, with voice modulation)
  • 8. History in Brief ๏ต 1995 - Development began on โ€œOnion Routingโ€ (ONR) ๏ต 1997 โ€“ Funded by DARPA High Confidence Networks Program as part of the Memex project was to invent better methods for interacting with and sharing information, so users can quickly and thoroughly organize and search subsets of information relevant to their individual interests. The technologies developed in the program would provide the mechanisms for improved content discovery, information extraction, information retrieval, user collaboration and other key search functions. ๏ต 1998 โ€“ 13 nodes created, 1 in Canadian Ministry of Defence ๏ต 2001 โ€“ More DARPA funding ๏ต 2003 - US Naval Research Lab releases ONR v2 (aka TOR) ๏ต 2004 - Hidden Services introduced ๏ต 2014 - Sponsors include SRI, US Department of State. NSF, Radio Free Asia, The Ford Foundation, Google, EFF, 4300 individuals
  • 9. Other softwares used to access parts of the Darknet ๏ต Freenet is a popular darknet (friend-to-friend) by default; since version 0.7 it can run as a "opennet" (peer nodes are discovered automatically). ๏ต RetroShare can be run as a darknet (friend-to-friend) by default to perform anonymous file transfers if DHT and Discovery features are disabled. ๏ต GNUnet is a darknet if the "F2F (network) topology" option is enabled. ๏ต Zeronet is open source software aimed to build an internet-like computer network of peer-to-peer users of Tor. ๏ต Syndie is software used to publish distributed forums over the anonymous networks of I2P, Tor and Freenet. ๏ต OneSwarm can be run as a darknet for friend-to-friend file-sharing. ๏ต Tribler can be run as a darknet for file-sharing.
  • 10.
  • 13. How it works ๏ต Volunteers run thousands of โ€œrelays,โ€ a server that any other user can ask to route traffic through ๏ต Observer can see traffic entering and leaving the relay, but they cannot determine which user is visiting which site because the traffic is encrypted ๏ต When a user visits any sites through a relay, his traffic appears to come from the relay rather than the userโ€™s computer. Thus, the user remains anonymous to the site itself ๏ต How it works Relay Site A Site B Site C User A User B User C Observer
  • 14.
  • 15. Hidden Services (HSes) in Tor ๏ต It is the ability to host a website (or Internet service) anonymously. In this case, both the visitor and the site are anonymous to each other. ๏ต Analogous to websites on the internet ๏ต Also allows the possibility of criminally oriented material to be hosted with a degree of impunity ๏ต 2016 study estimated that there were 43,000 HSes at any one time ๏ต Services use .onion as a domain name instead of .com etc
  • 16. Different HSes offered ๏ต Hidden Wiki (like Wikipedia) ๏ต Torfind (Like Bing) ๏ต Grams (Like Google) ๏ต The Pirate Bay (Famous piracy p2p magnet site) ๏ต Assassination Market (Hire hitmen to assassinate people of interest) ๏ต Rent-A-Hacker (Hacking for money) (BlackHat ONLY) ๏ต TorCarding Forum (Trading of identities, hacking info, requires 50 USD for purchase) ๏ต Intel Exchange ๏ต HackBB (Advanced hacking tutorials) ๏ต SilkRoad 2.0 (Full fledged blackmarket for all kinds of recreational drugs)
  • 17. Different HSes offered (Contd.) ๏ต Agora (Same as Silk Road, online drugs marketplace and other illicit items) ๏ต Fake US driver licences ๏ต Fake Passports/Drivers Licences of other countries
  • 18.
  • 19. Transaction Methods in Darknet ๏ต Bitcoin is the only method of transactions on TOR. ๏ต Transfer BTC to wallet on any marketplace account, then use like any normal E-commerce website ๏ต Ship to pick-up location, home, anywhere else ๏ต BTC (or any cryptocurrency) boils down to a global transaction ledger maintained by the computational power of a P2P network.
  • 20.
  • 21. Bitcoins ๏ต Bitcoins are not physical currency; the currency itself depends on transactions and no actual money changes hands ๏ต Cryptocurrency is extremely hard to track, since Bitcoin accounts are alphanumeric strings, instead of normal names ๏ต It is therefore viable for anonymous transactions i.e. for the exchange of illegal services for bitcoins ( like hacking ranging from lone wolf to full black box attacks, to assassinations, obtaining federal intelligence, stalking, compromised credit card and email details)
  • 22. Considerations for TOR ๏ต Tor can in some cases reveal your true identity ๏ต If someone owns both an entry and exit node, they can correlate between the two (this is known as a correlation attack) ๏ต Browser exploits like JavaScript Engine, XSS and pingbacks over non Tor connections ๏ต BTC is not fully anonymous, the block chain is made available to the public
  • 23. Alternative to TOR โ€“ I2P (Invisible Internet Project) ๏ต The โ€œInvisible Internet Projectโ€ ๏ต Messages encrypted ๏ต Outbound and Inbound tunnels ๏ต Data exchange ๏ต 1st query must be made to I2P networkโ€™s โ€œdatabaseโ€ ๏ต Acts like a distributed hash table
  • 24. Content on the Darknet ๏ต Abuse: sites where the title indicates some form of sexual abuse (typically minors) ๏ต Anonymity: sites aimed at promoting (or teaching) the use of anonymity tools or anonymous culture ๏ต Bitcoin: currency exchange from a mainstream currency to bitcoin, but more often money-laundering services ๏ต Blog: personal or topical blog, often covering topics such as hacktivism ๏ต Books: ebook service typically offering copyrighted material for free ๏ต Chat: web-based chat service, excluding services such as Jabber and Internet Relay Chat ๏ต Counterfeit: sites offering counterfeit items; notable fake currency, such as notes, or fake passports/ identity documents ๏ต Directory: site offering links to other sites within the Dark Net, often used for discovering other sites
  • 25. Content on the Darknet (Contd.) ๏ต Drugs: the sale or purchase of narcotics; typically, marketplaces connecting buyers and sellers ๏ต Forum: web-based forum whose primary purpose does not fit into another category; for example, generalist forum ๏ต Fraud: sites attempting to obtain a pecuniary advantage by deception ๏ต Gambling: any site that promotes/supports gambling. Bitcoin gambling services were most prevalent here, whereby users would first convert their fiat currency to bitcoin ๏ต Guns: sites exclusively aimed at selling guns ๏ต Hacking: site providing instructional information on illegal computer hacking ๏ต Hosting: Dark Net hosting service allowing users to host another Dark Net site ๏ต Mail: Dark Net web-based email or messaging service; examples include Mail2Tor and the now defunct TorMail
  • 26. Content on the Darknet (Contd.) ๏ต Market: a marketplace selling items other than drugs or services covered in other categories ๏ต News: news service such as current affairs or news specific to the Dark Net ๏ต Porn: Pornography sites that carry material that would be legal in most Western jurisdictions ๏ต Search: site providing a search engine-type service; one example is Ahmia ๏ต Whistleblower: sites typically operated by journalists for whistleblowers to submit documents. The GlobaLeaks platform (Hermes Center for Transparency and Digital Human Rights 2014) and SecureDrop platform (Freedom of the Press Foundation 2014) were prominently featured in this category.
  • 27.
  • 28. Breaking the anonymity of Tor Users and HSes ๏ต In reality, any suitably resourced entity can launch attacks with high success rates while maintaining a minimal risk of detection ๏ต A typical user may send millions of bytes and an observer can see the precise time they were sent and received. It is therefore easy to confirm with high probability that two parties are communicating. ๏ต No cases whereby a deanonymization attack alone has been used to seek a conviction ๏ต Therefore this process involves guesswork
  • 29. Breaking the anonymity of Tor Users and HSes ๏ต When visitors accessed a website, the FBI deployed a network investigative technique (NIT) โ€“ a hacking tool โ€“ and used a single warrant to uncover 1,300 IP addresses, tracing these addresses back to actual individuals, in the case of Playpen. ๏ต When visitors accessed the website, although their traffic might have been encrypted, a Flash application was secretly installed on the user's computer that quietly sent important data about the user straight to the FBI so that it did not pass through the Tor network at all.
  • 30. Case Studies โ€“ 1(Harvard) ๏ต Eldo Kim made a bomb threat to Harvard's student newspaper and some other Harvard officials ๏ต The reasons under the sun to do something like this his was that he wanted to get out of a final exam ๏ต He used tor to send the threat via email ๏ต He connected to TOR through his student account ๏ต Because of this fact and the fact that he was the only one connected to TOR at the time the email was sent it was easy for them to correlate that he may have sent the threat. As if that wasn't enough, Eldo puts the final nail in his own coffin by actually admitting that he was the one who made the bomb threat.
  • 31. Lessons Learned ๏ต Don't be the only person using Tor on a monitored network at a given time ๏ต Use a bridge ๏ต DON'T ADMIT ANYTHING ๏ต Correlation attacks are a bitch
  • 32. Case Studies โ€“ 2 (Citizen of the US) ๏ต Hector (Sabu) was already being watched by the FBI. However, his mistake was that he became careless ๏ต Slipping up, he connected to IRC without tor, when he normally would. This allowed the FBI to get his home IP address. ๏ต Jeremy( sup_g ), when speaking with Hector on IRC spoke carelessly of places he had previously been arrested and other groups that he was involved with. The FBI used this information to narrow their suspect pool and allowed them to obtain a court order to monitor his internet traffic. ๏ต Once again correlation proves to be a bitch say this because although the FBI did not exploit tor to bust Jeremy, they were, however, able to correlate the times 'sup_g' spoke with 'Sabu' on IRC with when Jeremy was at home using his computer.
  • 33. Lessons Learned ๏ต Use Tor consistently ๏ต Don't give personal information ๏ต Correlation attacks are still a b!$%*%!
  • 34. Case Studies โ€“ 3 (Freedom hosting) ๏ต Freedom Hosting was known for hosting child pornography. This is enough to make you a mark for all sorts. In fact, Freedom had already been under attack from Anonymous during Op Darknet because of the child porn.ย  ๏ต The FBI was able to compromise Freedom because they were using an outdated version, 17 ESR, of tor browser. This allowed the FBI to exploit bug CVE-2013-1690. ๏ต Freedom Hosting did not update their version of the TOR browser. ๏ต The FBI used a payload called Magneto that gave them Freedom's IP address, MAC address, and Windows host name with the unique serial number that ties a user to a site visit (Cookie malware!!)
  • 35. Lessons Learned ๏ต Don't host Captain Picard or Julian Bashir ๏ต Patch, patch, patch ๏ต Follow the money ๏ต Leave encrypted laptops in a powered down state when not in use!
  • 36. Case Studies โ€“ 4 (Silk Road) ๏ต Famous drug acquisition site - Ross Ulbricht (Dread Pirate Roberts) ๏ต To market his site [The Silk Road] he would post around in clear net forums (reddit, HF.net etc.) ๏ต The FBI claims the former physics and engineering student even publicly alluded to his alleged criminal enterprise on his LinkedIn profile ๏ต He put his links on his G+ account and regularly posted that he was using Ubuntu on the actual Hses ๏ต He would go as far as the neighborhood Starbucks or library, which was just around the corner from his house, to logon to and administrate his Silk Road onion
  • 37. Lessons Learned ๏ต Donโ€™t do drugs, drugs are bad ๏ต Keep online identities separate ๏ต Have a consistent story ๏ต Don't talk about personal interests ๏ต Don't volunteer information!
  • 38. Blocking Of Tor ๏ต Since the list of relays (known as the consensus) is public, anyone is able to download the list and block access to all of them. The user would then be unable to connect to the first hop and into the network ๏ต An individual can block a single site by launching several relays and ensuring they occupy the positions in the DHT of the responsible relays for that service. If someone comes to the relay asking for the descriptor, the individual can simply deny it ๏ต Operators of Tor relays could themselves choose to block the content by patching their relays to deny requests to these sites. This would require the cooperation of a large percentage of relay operators to be effective, but it would be a decentralized blocking mechanism requiring some consensus
  • 39. Examples of TOR Relay Lists ๏ต https://torstatus.blutmagie.de/ - Common list of approximately 7000 routers being used as Onion relays ๏ต https://atlas.torproject.org/#/top10 - Top 10 relays in order of bandwidth provided ( remember that a TOR network is only as fast as its slowest router, depending upon bandwidth as well as latency) ๏ต https://www.dan.me.uk/tornodes - List of entry and exit nodes updated every 30 minutes. Commonly used in the EU to ban entry to the TOR network. ๏ต https://onionview.com/ - Provides a visual map of entry, exit and internal relays around the globe.
  • 40. Legalities involved with relevance to Darknet as a whole ๏ต India has NO laws that deal with accessing the Darknet, using Tor or other softwares, using TAILS or other operating systems that either promise, claim or guarantee anonymity. Torrents are legal in India, depending on what is being downloaded using a P2P connection (keeping in mind the International Intellectual Property Law) ๏ต Almost all Western countries, China and Russia have implemented defenses against the Darknet, however Tor is a state sponsored resource that is used by the public for concerns of privacy ๏ต Need is to build cyber laws that can tackle illicit transactions/trade/barter on the internet as well as the Darknet.
  • 41. Conclusion ๏ต Socio-cultural forces are involved in the โ€œgeneration and sustainabilityโ€ of criminal entities that use the Darknet. For example, some countries do not have functioning or sufficient markets in legal goods, a context in which the Darknet may actually facilitate increased social welfare and economic efficiency. ๏ต The Deep Web and the Darknet are attractive to many because of the prosecution, regulation, and national security surveillance efforts of states in the physical world and Surface Web. Illicit activity is being driven below the electronic thermocline of common search engines and usual investigative techniques, and states must be willing to dive beneath it to gather information and take action. ๏ต The transnationality of these networks frustrates eradication, regulatory, and prosecution efforts of any one state, creating cooperation, collective action, and law harmonization problems for state actors attempting to work together to counter illicit use of the Internet.