Common Darknet Weaknesses
Offered By: YouTube
Course Description
Overview
Explore common weaknesses in darknet technologies like Tor and I2P in this comprehensive conference talk. Gain a practical understanding of how encrypted anonymizing networks can be subverted to reveal identities, presented in a manner accessible to security practitioners. Delve into topics including darknet fundamentals, threat models, encryption methods, common attacks, and mitigation strategies. Examine specific vulnerabilities like DNS leaks, HTTP proxies, BitTorrent usage, and metadata analysis. Learn about denial of service techniques, network splitting, correlation attacks, and local forensics approaches. Discover how to better protect darknet implementations and user privacy through various defensive measures and best practices.
Syllabus
Introduction
What is a Darknet
A few notes
Other attacks
Threat models
ITP
Directory Server
Model Encryption
Onion Routing
Common Weaknesses
Mitigation
Common Attacks
Overview
DNS Leak
Solutions
HTTP out proxies
BitTorrent
IRC
Doodle Mitigations
Denial of Service
Total or Severe Blocking
Net Split
Bridge nodes
Mesh storage networks
Mesh networks
hocbased attacks
remote clocks
Murdochs research
Correlation attack
Mitigations
Metadata
Metadata Examples
Metadata Mitigation
Local Attacks
Browser Bundle
Memory Forensics
Live USB Drives
Civil Attacks
Multiple Nodes
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube