Overview of Darknets
Offered By: YouTube
Course Description
Overview
Explore an in-depth overview of darknets in this 57-minute conference talk from the AIDE (Appalachian Institute of Digital Evidence) Conference 2015. Delve into various darknet technologies, including Anonet, DN42, Freenet, Tor, and I2P. Learn about their pros and cons, installation processes, and operational modes. Discover key concepts such as Nmap scanning, hidden services, node types, and encryption layers. Examine potential security risks like correlation attacks, timing correlation, and DNS leaks. Gain insights into Bitcoin usage, Tor Hidden Service IRC, and private Tor-based networks. Understand the importance of perspective and general warnings when exploring these technologies.
Syllabus
Intro
Perspective and General Warnings
A little background...
Install
Nmap scan using UFO client port
Anonet and DN42 Pros and cons Pros
Similar networks
Key types
Modes of operation
Freenet Pros and cons
Overview
Tor: The Onion Router
Layers like an Ogre
Layout to connect to Hidden Sevice
Node types
Applications/Sites
Obfsproxy: Pluggable Transports
Bitcoin?
Tor Hidden Service IRC
Private Tor based network
Encryption Layers
Naming and Addresses
12P Pros and Cons
Correlation of end point and exit point
Timing Correlation
DNS Leaks
Make hidden server contact you over public Internet
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube