Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
1. Who am I
๏ต 3rd
Year Engineering Student in Northern India Engineering College,
IP University
๏ต Currently interning in Main Brain Tech, funded startup operarting out
of Hyderabad and Bangalore
๏ต Former intern in EY, Microsoft AFs, and 3 other firms
๏ต Primary interest in corporate cyber security, ranging from black box
testing to the strategy incorporation in ASOCs
๏ต Secondary interests in mobile security, package reverse
engineering, android malware, analysis using A.R.E.
๏ต 6 years of exposure to cyber security
๏ต Other skills include public speaking, graphic design, website design
and deployment (backend and frontend),
4. Introduction - Darknet
๏ต Most frequently refers to an area of the Internet only accessible by
using an encryption tool called The Onion Router (Tor)
๏ต Aimed at those desiring privacy online, although frequently attracts
those with criminal intentions
๏ต Ability to host websites anonymously and with a degree of impunity
๏ต Tor makes it difficult for governments to censor sites or content that
may be hosted elsewhere in the world
๏ต Critical mass of users averaging 2.5 million per day as of June 2016
(Tor Project 2016 statistics)
๏ต Frequently cited as one of the key tools against government
surveillance
๏ต Is a part of the Deepweb (sites that are not indexed by search
engines)
๏ต https://www.torproject.org/
5. Softwares used to
access the Deep
Web
The Onion Router (Tor) is an open-
source software program that allows users
to protect their privacy and security
against a common form of Internet
surveillance known as traffic analysis. Tor
was originally developed for the U.S.
Navy in an effort to protect government
communications. The name of the
software originated as an acronym for
the Onion Router, but Tor is now the
official name of the program.ย
It is the most used software, due to the
services it hosts, in addition to its reliability
over the years.
6. Softwares used to
access the Deep
Web
Invisible Internet Project(I2P) is an
anonymous network, exposing a simple
layer that applications can use to
anonymously and securely send
messages to each other. The network
itself is strictly message based (a laย IP),
but there is a library available to allow
reliable streaming communication on top
of it (a laย TCP). All communication is end
to end encrypted (in total there are four
layers of encryption used when sending a
message), and even the end points
("destinations") are cryptographic
identifiers (essentially a pair ofย public
keys).
It is the most used software, due to the
services it hosts, in addition to its reliability
over the years.
It is lesser known than Tor, and therefore
less prone to deanonymization attacks.
7. Other softwares part of the Deep
Web
๏ต Freenet
๏ต Subgraph os
๏ต Freepto
๏ต iprediaOS
๏ต JonDo Live-CD (combination of TOR and other commonly used
darknet applications)
๏ต Whonix
๏ต Tails
๏ต Tox (encryped IM and video/audio calls, with voice modulation)
8. History in Brief
๏ต 1995 - Development began on โOnion Routingโ (ONR)
๏ต 1997 โ Funded by DARPA High Confidence Networks Program as
part of the Memex project was to invent better methods for
interacting with and sharing information, so users can quickly and
thoroughly organize and search subsets of information relevant to
their individual interests. The technologies developed in the
program would provide the mechanisms for improved content
discovery, information extraction, information retrieval, user
collaboration and other key search functions.
๏ต 1998 โ 13 nodes created, 1 in Canadian Ministry of Defence
๏ต 2001 โ More DARPA funding
๏ต 2003 - US Naval Research Lab releases ONR v2 (aka TOR)
๏ต 2004 - Hidden Services introduced
๏ต 2014 - Sponsors include SRI, US Department of State. NSF, Radio Free
Asia, The Ford Foundation, Google, EFF, 4300 individuals
9. Other softwares used to access
parts of the Darknet
๏ต Freenet is a popular darknet (friend-to-friend) by default; since version
0.7 it can run as a "opennet" (peer nodes are discovered
automatically).
๏ต RetroShare can be run as a darknet (friend-to-friend) by default to
perform anonymous file transfers if DHT and Discovery features are
disabled.
๏ต GNUnet is a darknet if the "F2F (network) topology" option is enabled.
๏ต Zeronet is open source software aimed to build an internet-like
computer network of peer-to-peer users of Tor.
๏ต Syndie is software used to publish distributed forums over the
anonymous networks of I2P, Tor and Freenet.
๏ต OneSwarm can be run as a darknet for friend-to-friend file-sharing.
๏ต Tribler can be run as a darknet for file-sharing.
13. How it works
๏ต Volunteers run thousands of
โrelays,โ a server that any other
user can ask to route traffic
through
๏ต Observer can see traffic entering
and leaving the relay, but they
cannot determine which user is
visiting which site because the
traffic is encrypted
๏ต When a user visits any sites through
a relay, his traffic appears to
come from the relay rather than
the userโs computer. Thus, the user
remains anonymous to the site
itself
๏ต How it works
Relay
Site A
Site B
Site C
User A
User B
User C
Observer
14.
15. Hidden Services (HSes) in Tor
๏ต It is the ability to host a website (or Internet service) anonymously. In
this case, both the visitor and the site are anonymous to each other.
๏ต Analogous to websites on the internet
๏ต Also allows the possibility of criminally oriented material to be
hosted with a degree of impunity
๏ต 2016 study estimated that there were 43,000 HSes at any one time
๏ต Services use .onion as a domain name instead of .com etc
16. Different HSes offered
๏ต Hidden Wiki (like Wikipedia)
๏ต Torfind (Like Bing)
๏ต Grams (Like Google)
๏ต The Pirate Bay (Famous piracy p2p magnet site)
๏ต Assassination Market (Hire hitmen to assassinate people of interest)
๏ต Rent-A-Hacker (Hacking for money) (BlackHat ONLY)
๏ต TorCarding Forum (Trading of identities, hacking info, requires 50
USD for purchase)
๏ต Intel Exchange
๏ต HackBB (Advanced hacking tutorials)
๏ต SilkRoad 2.0 (Full fledged blackmarket for all kinds of recreational
drugs)
17. Different HSes offered (Contd.)
๏ต Agora (Same as Silk Road, online drugs marketplace and other illicit
items)
๏ต Fake US driver licences
๏ต Fake Passports/Drivers Licences of other countries
18.
19. Transaction Methods in Darknet
๏ต Bitcoin is the only method of transactions on TOR.
๏ต Transfer BTC to wallet on any marketplace account, then use like
any normal E-commerce website
๏ต Ship to pick-up location, home, anywhere else
๏ต BTC (or any cryptocurrency) boils down to a global transaction
ledger maintained by the computational power of a P2P network.
20.
21. Bitcoins
๏ต Bitcoins are not physical currency; the currency itself depends on
transactions and no actual money changes hands
๏ต Cryptocurrency is extremely hard to track, since Bitcoin accounts
are alphanumeric strings, instead of normal names
๏ต It is therefore viable for anonymous transactions i.e. for the
exchange of illegal services for bitcoins ( like hacking ranging from
lone wolf to full black box attacks, to assassinations, obtaining
federal intelligence, stalking, compromised credit card and email
details)
22. Considerations for TOR
๏ต Tor can in some cases reveal your true identity
๏ต If someone owns both an entry and exit node, they can correlate
between the two (this is known as a correlation attack)
๏ต Browser exploits like JavaScript Engine, XSS and pingbacks over non
Tor connections
๏ต BTC is not fully anonymous, the block chain is made available to the
public
23. Alternative to TOR โ I2P
(Invisible Internet Project)
๏ต The โInvisible Internet Projectโ
๏ต Messages encrypted
๏ต Outbound and Inbound tunnels
๏ต Data exchange
๏ต 1st query must be made to I2P networkโs โdatabaseโ
๏ต Acts like a distributed hash table
24. Content on the Darknet
๏ต Abuse: sites where the title indicates some form of sexual abuse
(typically minors)
๏ต Anonymity: sites aimed at promoting (or teaching) the use of anonymity
tools or anonymous culture
๏ต Bitcoin: currency exchange from a mainstream currency to bitcoin, but
more often money-laundering services
๏ต Blog: personal or topical blog, often covering topics such as hacktivism
๏ต Books: ebook service typically offering copyrighted material for free
๏ต Chat: web-based chat service, excluding services such as Jabber and
Internet Relay Chat
๏ต Counterfeit: sites offering counterfeit items; notable fake currency, such
as notes, or fake passports/ identity documents
๏ต Directory: site offering links to other sites within the Dark Net, often used
for discovering other sites
25. Content on the Darknet (Contd.)
๏ต Drugs: the sale or purchase of narcotics; typically, marketplaces
connecting buyers and sellers
๏ต Forum: web-based forum whose primary purpose does not fit into
another category; for example, generalist forum
๏ต Fraud: sites attempting to obtain a pecuniary advantage by deception
๏ต Gambling: any site that promotes/supports gambling. Bitcoin gambling
services were most prevalent here, whereby users would first convert
their fiat currency to bitcoin
๏ต Guns: sites exclusively aimed at selling guns
๏ต Hacking: site providing instructional information on illegal computer
hacking
๏ต Hosting: Dark Net hosting service allowing users to host another Dark Net
site
๏ต Mail: Dark Net web-based email or messaging service; examples
include Mail2Tor and the now defunct TorMail
26. Content on the Darknet (Contd.)
๏ต Market: a marketplace selling items other than drugs or services
covered in other categories
๏ต News: news service such as current affairs or news specific to the
Dark Net
๏ต Porn: Pornography sites that carry material that would be legal in
most Western jurisdictions
๏ต Search: site providing a search engine-type service; one example is
Ahmia
๏ต Whistleblower: sites typically operated by journalists for
whistleblowers to submit documents. The GlobaLeaks platform
(Hermes Center for Transparency and Digital Human Rights 2014)
and SecureDrop platform (Freedom of the Press Foundation 2014)
were prominently featured in this category.
27.
28. Breaking the anonymity of Tor Users
and HSes
๏ต In reality, any suitably resourced entity can launch attacks with high
success rates while maintaining a minimal risk of detection
๏ต A typical user may send millions of bytes and an observer can see
the precise time they were sent and received. It is therefore easy to
confirm with high probability that two parties are communicating.
๏ต No cases whereby a deanonymization attack alone has been used
to seek a conviction
๏ต Therefore this process involves guesswork
29. Breaking the anonymity of Tor Users
and HSes
๏ต When visitors accessed a website, the FBI deployed a network
investigative technique (NIT) โ a hacking tool โ and used a single
warrant to uncover 1,300 IP addresses, tracing these addresses
back to actual individuals, in the case of Playpen.
๏ต When visitors accessed the website, although their traffic might
have been encrypted, a Flash application was secretly installed on
the user's computer that quietly sent important data about the user
straight to the FBI so that it did not pass through the Tor network at
all.
30. Case Studies โ 1(Harvard)
๏ต Eldo Kim made a bomb threat to Harvard's student newspaper and
some other Harvard officials
๏ต The reasons under the sun to do something like this his was that he
wanted to get out of a final exam
๏ต He used tor to send the threat via email
๏ต He connected to TOR through his student account
๏ต Because of this fact and the fact that he was the only one
connected to TOR at the time the email was sent it was easy for
them to correlate that he may have sent the threat. As if that
wasn't enough, Eldo puts the final nail in his own coffin by actually
admitting that he was the one who made the bomb threat.
31. Lessons Learned
๏ต Don't be the only person using Tor on a monitored network at a
given time
๏ต Use a bridge
๏ต DON'T ADMIT ANYTHING
๏ต Correlation attacks are a bitch
32. Case Studies โ 2 (Citizen of the US)
๏ต Hector (Sabu) was already being watched by the FBI. However, his
mistake was that he became careless
๏ต Slipping up, he connected to IRC without tor, when he normally
would. This allowed the FBI to get his home IP address.
๏ต Jeremy( sup_g ), when speaking with Hector on IRC spoke carelessly
of places he had previously been arrested and other groups that he
was involved with. The FBI used this information to narrow their
suspect pool and allowed them to obtain a court order to monitor
his internet traffic.
๏ต Once again correlation proves to be a bitch say this because
although the FBI did not exploit tor to bust Jeremy, they were,
however, able to correlate the times 'sup_g' spoke with 'Sabu' on
IRC with when Jeremy was at home using his computer.
33. Lessons Learned
๏ต Use Tor consistently
๏ต Don't give personal information
๏ต Correlation attacks are still a b!$%*%!
34. Case Studies โ 3 (Freedom hosting)
๏ต Freedom Hosting was known for hosting child pornography. This is
enough to make you a mark for all sorts. In fact, Freedom had
already been under attack from Anonymous during Op Darknet
because of the child porn.ย
๏ต The FBI was able to compromise Freedom because they were using
an outdated version, 17 ESR, of tor browser. This allowed the FBI to
exploit bug CVE-2013-1690.
๏ต Freedom Hosting did not update their version of the TOR browser.
๏ต The FBI used a payload called Magneto that gave them Freedom's
IP address, MAC address, and Windows host name with the unique
serial number that ties a user to a site visit (Cookie malware!!)
35. Lessons Learned
๏ต Don't host Captain Picard or Julian Bashir
๏ต Patch, patch, patch
๏ต Follow the money
๏ต Leave encrypted laptops in a powered down state when not in use!
36. Case Studies โ 4 (Silk Road)
๏ต Famous drug acquisition site - Ross Ulbricht (Dread Pirate Roberts)
๏ต To market his site [The Silk Road] he would post around in clear net
forums (reddit, HF.net etc.)
๏ต The FBI claims the former physics and engineering student even
publicly alluded to his alleged criminal enterprise on his LinkedIn
profile
๏ต He put his links on his G+ account and regularly posted that he was
using Ubuntu on the actual Hses
๏ต He would go as far as the neighborhood Starbucks or library, which
was just around the corner from his house, to logon to and
administrate his Silk Road onion
37. Lessons Learned
๏ต Donโt do drugs, drugs are bad
๏ต Keep online identities separate
๏ต Have a consistent story
๏ต Don't talk about personal interests
๏ต Don't volunteer information!
38. Blocking Of Tor
๏ต Since the list of relays (known as the consensus) is public, anyone is
able to download the list and block access to all of them. The user
would then be unable to connect to the first hop and into the
network
๏ต An individual can block a single site by launching several relays and
ensuring they occupy the positions in the DHT of the responsible
relays for that service. If someone comes to the relay asking for the
descriptor, the individual can simply deny it
๏ต Operators of Tor relays could themselves choose to block the
content by patching their relays to deny requests to these sites. This
would require the cooperation of a large percentage of relay
operators to be effective, but it would be a decentralized blocking
mechanism requiring some consensus
39. Examples of TOR Relay Lists
๏ต https://torstatus.blutmagie.de/ - Common list of approximately 7000
routers being used as Onion relays
๏ต https://atlas.torproject.org/#/top10 - Top 10 relays in order of
bandwidth provided ( remember that a TOR network is only as fast
as its slowest router, depending upon bandwidth as well as latency)
๏ต https://www.dan.me.uk/tornodes - List of entry and exit nodes
updated every 30 minutes. Commonly used in the EU to ban entry
to the TOR network.
๏ต https://onionview.com/ - Provides a visual map of entry, exit and
internal relays around the globe.
40. Legalities involved with relevance
to Darknet as a whole
๏ต India has NO laws that deal with accessing the Darknet, using Tor or
other softwares, using TAILS or other operating systems that either
promise, claim or guarantee anonymity. Torrents are legal in India,
depending on what is being downloaded using a P2P connection
(keeping in mind the International Intellectual Property Law)
๏ต Almost all Western countries, China and Russia have implemented
defenses against the Darknet, however Tor is a state sponsored
resource that is used by the public for concerns of privacy
๏ต Need is to build cyber laws that can tackle illicit
transactions/trade/barter on the internet as well as the Darknet.
41. Conclusion
๏ต Socio-cultural forces are involved in the โgeneration and sustainabilityโ of criminal
entities that use the Darknet. For example, some countries do not have functioning or
sufficient markets in legal goods, a context in which the Darknet may actually facilitate
increased social welfare and economic efficiency.
๏ต The Deep Web and the Darknet are attractive to many because of the prosecution,
regulation, and national security surveillance efforts of states in the physical world and
Surface Web. Illicit activity is being driven below the electronic thermocline of
common search engines and usual investigative techniques, and states must be willing
to dive beneath it to gather information and take action.
๏ต The transnationality of these networks frustrates eradication, regulatory, and
prosecution efforts of any one state, creating cooperation, collective action, and law
harmonization problems for state actors attempting to work together to counter illicit
use of the Internet.