SlideShare ist ein Scribd-Unternehmen logo
1 von 17
THE ONION ROUTER
     DHARAMVIR BISHT
Who needs Anonymity

•   Government Organization ?
•   Private Organization?
•   Hackers
•   And yes !!!Criminals? But they already have it
•   What About YOU
TOR
• Onion routing is an anonymous communication
  technique over a computer network. Messages
  are constantly encrypted and then sent through
  several network nodes called onion routers
  which creates a circuit of nodes
Anonymous Connection and
     Onion Routing
Who is Talking to Whom ?
In a Public Network
>Packet headers identify recipients
>Packet routes can be tracked
Traffic Analysis Reveals
            Identities
>Who is searching a public database?
>Which companies are collaborating?
>What are you talking to via-Email?
>What do you shop online?
Objectives
Design an infrastructure that
>Makes traffic analysis hard
>Separates identification from routing
Our goals is anonymous connections, not
  anonymous communication.
An infrastructure, Onion Routing, has been
  implemented.
Steps for Onion Routing

> Define the route
>Construct the anonymous connection
>Move and encrypt the data through the
  connection
>Destroy the anonymous connection
Tor in brief – 1/3




Step 1: Alice‘s Tor client obtains a list of Tor
  nodes from a directory server
Tor in brief – 2/3




Step 2: Alice‘s Tor client picks a random path to
  destination Server. Green links are encrypted, red
  links are in the clear.
Tor in brief – 3/3




Step 3: If the user wants access to another site, Alice‘s
  Tor client selects a second random path. Again, green
  links are encrypted, red links are in the clear.
Example
Let onion routers 4, 3, and 5 be randomly selected by
the onion proxy
Onion Sent by Client to 4
Router 4 will decrypt the E{4u} layer using
Its private key, to find the next router’s Ip address,
and encrypted
Onion Sent by 4 to 3
Router 3 will decrypt the E{3u} layer using
Its private key, to find the next router’s Ip address,
and encrypted
Onion Sent by 3 to 5
Router 5 will decrypt the E{5u} layer using
Its private key, to just find unencrypted data packet




                                                  Data Sent by 5 to Target
TOOLS

•   TOR BROWSER
•   TOR GATEWAY
•   TOR WORK STATION
•   JANUSVM
References
• https://www.torproject.org/about/overview.h
  tml.en
• http://www.onion-router.net/
• http://ntrg.cs.tcd.ie/undergrad/4ba2.05/grou
  p10/index
• http://en.wikipedia.org/wiki/Onion_routing

Weitere ähnliche Inhalte

Was ist angesagt?

Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
Anushakp9
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
Amrit Kaur
 
Proxy servers
Proxy serversProxy servers
Proxy servers
Kumar
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 

Was ist angesagt? (20)

Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Spoofing
SpoofingSpoofing
Spoofing
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
TOR - The Onion Router
TOR - The Onion Router TOR - The Onion Router
TOR - The Onion Router
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Application layer
Application layerApplication layer
Application layer
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 

Andere mochten auch

Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion Routing
Ali Habeeb
 
Deep Web
Deep WebDeep Web
Deep Web
St John
 
How To Dice And Saute An Onion
How To Dice And Saute An OnionHow To Dice And Saute An Onion
How To Dice And Saute An Onion
s3232334
 
Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networks
pauldeng
 

Andere mochten auch (17)

How TOR works?
How TOR works?How TOR works?
How TOR works?
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion Routing
 
Tor
TorTor
Tor
 
Deep web
Deep webDeep web
Deep web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Deep Web
Deep WebDeep Web
Deep Web
 
ONION Routing - Jovial learning
ONION Routing - Jovial learningONION Routing - Jovial learning
ONION Routing - Jovial learning
 
How To Dice And Saute An Onion
How To Dice And Saute An OnionHow To Dice And Saute An Onion
How To Dice And Saute An Onion
 
Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networks
 
Maximizing Classroom Collaboration Using Web 2.0 Technology
Maximizing Classroom Collaboration Using Web 2.0 TechnologyMaximizing Classroom Collaboration Using Web 2.0 Technology
Maximizing Classroom Collaboration Using Web 2.0 Technology
 
Pixel Bar Charts A New Technique for Visualizing Large Multi-Attribute Data S...
Pixel Bar Charts A New Technique for Visualizing Large Multi-Attribute Data S...Pixel Bar Charts A New Technique for Visualizing Large Multi-Attribute Data S...
Pixel Bar Charts A New Technique for Visualizing Large Multi-Attribute Data S...
 
Colloborating with google docs in the cloud m rice
Colloborating with google docs in the cloud m riceColloborating with google docs in the cloud m rice
Colloborating with google docs in the cloud m rice
 
Onion network architecture
Onion network architectureOnion network architecture
Onion network architecture
 
Deep web
Deep webDeep web
Deep web
 
Tor
TorTor
Tor
 
Web search engines ( Mr.Mirza )
Web search engines ( Mr.Mirza )Web search engines ( Mr.Mirza )
Web search engines ( Mr.Mirza )
 

Ähnlich wie Tor the onion router

Anon p2p slides
Anon p2p slidesAnon p2p slides
Anon p2p slides
chintaan
 

Ähnlich wie Tor the onion router (20)

Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
Tor browser
Tor browserTor browser
Tor browser
 
.Onion
.Onion.Onion
.Onion
 
Onion Routing.ppt
Onion Routing.pptOnion Routing.ppt
Onion Routing.ppt
 
Tor Pivoting Networks Share
Tor Pivoting Networks Share Tor Pivoting Networks Share
Tor Pivoting Networks Share
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)
 
Anon p2p slides
Anon p2p slidesAnon p2p slides
Anon p2p slides
 
Anonymous Security Scanning and Browsing
Anonymous Security Scanning and BrowsingAnonymous Security Scanning and Browsing
Anonymous Security Scanning and Browsing
 
Tor Tracer
Tor TracerTor Tracer
Tor Tracer
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
 
Tor
TorTor
Tor
 
osint + python: extracting information from tor network and darkweb
osint + python: extracting information from tor network and darkweb osint + python: extracting information from tor network and darkweb
osint + python: extracting information from tor network and darkweb
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Why and How to use Onion Networking - #EMFCamp2018
Why and How to use Onion Networking - #EMFCamp2018Why and How to use Onion Networking - #EMFCamp2018
Why and How to use Onion Networking - #EMFCamp2018
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit MaheshwariScratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
 
Deep Web
Deep WebDeep Web
Deep Web
 
Tor
TorTor
Tor
 

Mehr von n|u - The Open Security Community

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Tor the onion router

  • 1. THE ONION ROUTER DHARAMVIR BISHT
  • 2. Who needs Anonymity • Government Organization ? • Private Organization? • Hackers • And yes !!!Criminals? But they already have it • What About YOU
  • 3. TOR • Onion routing is an anonymous communication technique over a computer network. Messages are constantly encrypted and then sent through several network nodes called onion routers which creates a circuit of nodes
  • 4. Anonymous Connection and Onion Routing
  • 5. Who is Talking to Whom ? In a Public Network >Packet headers identify recipients >Packet routes can be tracked
  • 6. Traffic Analysis Reveals Identities >Who is searching a public database? >Which companies are collaborating? >What are you talking to via-Email? >What do you shop online?
  • 7. Objectives Design an infrastructure that >Makes traffic analysis hard >Separates identification from routing Our goals is anonymous connections, not anonymous communication. An infrastructure, Onion Routing, has been implemented.
  • 8. Steps for Onion Routing > Define the route >Construct the anonymous connection >Move and encrypt the data through the connection >Destroy the anonymous connection
  • 9. Tor in brief – 1/3 Step 1: Alice‘s Tor client obtains a list of Tor nodes from a directory server
  • 10. Tor in brief – 2/3 Step 2: Alice‘s Tor client picks a random path to destination Server. Green links are encrypted, red links are in the clear.
  • 11. Tor in brief – 3/3 Step 3: If the user wants access to another site, Alice‘s Tor client selects a second random path. Again, green links are encrypted, red links are in the clear.
  • 12. Example Let onion routers 4, 3, and 5 be randomly selected by the onion proxy
  • 13. Onion Sent by Client to 4 Router 4 will decrypt the E{4u} layer using Its private key, to find the next router’s Ip address, and encrypted
  • 14. Onion Sent by 4 to 3 Router 3 will decrypt the E{3u} layer using Its private key, to find the next router’s Ip address, and encrypted
  • 15. Onion Sent by 3 to 5 Router 5 will decrypt the E{5u} layer using Its private key, to just find unencrypted data packet Data Sent by 5 to Target
  • 16. TOOLS • TOR BROWSER • TOR GATEWAY • TOR WORK STATION • JANUSVM
  • 17. References • https://www.torproject.org/about/overview.h tml.en • http://www.onion-router.net/ • http://ntrg.cs.tcd.ie/undergrad/4ba2.05/grou p10/index • http://en.wikipedia.org/wiki/Onion_routing