YoVDO

Common Darknet Weaknesses

Offered By: YouTube

Tags

Conference Talks Courses Network Security Courses Deep Web Courses Encryption Courses Threat Models Courses Denial-of-Service Attacks Courses Memory Forensics Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore common weaknesses in darknet technologies like Tor and I2P in this comprehensive conference talk. Gain a practical understanding of how encrypted anonymizing networks can be subverted to reveal identities, presented in a manner accessible to security practitioners. Delve into topics including darknet fundamentals, threat models, encryption methods, common attacks, and mitigation strategies. Examine specific vulnerabilities like DNS leaks, HTTP proxies, BitTorrent usage, and metadata analysis. Learn about denial of service techniques, network splitting, correlation attacks, and local forensics approaches. Discover how to better protect darknet implementations and user privacy through various defensive measures and best practices.

Syllabus

Introduction
What is a Darknet
A few notes
Other attacks
Threat models
ITP
Directory Server
Model Encryption
Onion Routing
Common Weaknesses
Mitigation
Common Attacks
Overview
DNS Leak
Solutions
HTTP out proxies
BitTorrent
IRC
Doodle Mitigations
Denial of Service
Total or Severe Blocking
Net Split
Bridge nodes
Mesh storage networks
Mesh networks
hocbased attacks
remote clocks
Murdochs research
Correlation attack
Mitigations
Metadata
Metadata Examples
Metadata Mitigation
Local Attacks
Browser Bundle
Memory Forensics
Live USB Drives
Civil Attacks
Multiple Nodes


Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity