YoVDO

TOR - Attacks and Countermeasures

Offered By: Security BSides London via YouTube

Tags

Security BSides Courses Cybersecurity Courses Tor (The Onion Router) Courses Network Infrastructure Courses Censorship Courses

Course Description

Overview

Explore the inner workings of the Tor anonymization network in this comprehensive conference talk from Security BSides London. Delve into the infrastructure and high-level protocol of Tor, including Hidden Services and their role in bypassing censorship. Examine attempts by countries like China and Iran to block Tor access and the countermeasures developed. Analyze various attacks against Tor users and network infrastructure, along with potential defenses. Investigate the FBI's takedown of Silk Road and the exploit used to deanonymize visitors to Tor hidden services. Gain insights into traffic confirmation attacks, distributed hash tables, and methods for deanonymizing hidden services and their users.

Syllabus

Intro
Overview
The problems
The Tor Ecosystem
Building circuits through Tor
Obvious attacks
Tor Censorship
How China blocks Tor
Tor Hidden Services
Distributed Hash Tables
Hidden Service popularity
Deanonymising Hidden Service users • Traffic confirmation attacks are MUCH more powerful.
Deanonymising Hidden Services


Taught by

Security BSides London

Related Courses

Security and Privacy in TOR Network
University of Colorado System via Coursera
The Complete Cyber Security Course : Anonymous Browsing!
Udemy
The Complete Ethical Hacking Course: Beginner to Advanced!
Udemy
The Ultimate Dark Web, Anonymity, Privacy & Security Course
Udemy
Hacker Ético Profissional com Kali Linux v2023
Udemy