SlideShare uma empresa Scribd logo
1 de 48
Baixar para ler offline
Different Perspectives
Rafel Ivgi,
CEO @ Defensia
• Enterprise/Government Data Leakage
• Proxy vs. Tor and Socksifiers vs. VPN (and why not L2VPN…)
• Full 2 Way Anonymity
• 1 Way Reverse Anonymity
• Maximum Anonymity Hosting
• Wiki Leaks!
• Open Wi-Fi to Dark node 
• ChoosingYour Exit Locations
• Combining Darknets With Bit Torrent
• Combining Darknets With Other Darknets (Tor, I2P, Freenet)
Agenda
The Evolvement of P2P File Sharing
Law
Suite
Napster
Kazaa
Emule
DC
BitTorrent
Crypto-anarchism
Crypto-anarchism: RansomWare
P2P Always Existed – But now it’s going
Anonymous and Decentralized
P2P Also goes Encrypted – “Crypto
Anarchy”
• Every day data is stolen from enterprises
• Enterprises spend hundreds of thousands of
dollars per year on DLP (Data Leakage
Prevention) products
• The classical DLP Bypass involves usage of
encryption (Compression + Password, PGP)
Enterprise/Government Data Leakage
• Most advanced bypass techniques are network
bridging and VPN dial-out
• Darknets, especially Tor provide the same
functionality as a VPN
• Software exists to create a full VPN
through/via/over Tor
Enterprise/Government Data Leakage
• Using an HTTP proxy, the provider can do a full
two-way Man-In-The-Middle attack and see all
traffic, even SSL
• The alternative is using a Socks proxy, where the
provider can Man-In-The-Middle only non-
encrypted connections (HTTP, but NOT HTTPS)
• Tor provides a local HTTP Proxy and a local Socks
Proxy, eventually using someone’s station. He can
MITM any one (not knowing who you are) only on
un-encrypted connections
Proxy vs.Tor
• A Socksifier can force an application that
doesn’t support a proxy, to use a proxy, forcing
it on the app.
• Socksifier’s are good and safe, but DOES NOT
force proxy usage on ALL traffic types
• Using Tor (Socks Proxy) and a Socksifier doesn’t
provide full anonymity
Socksifiers vs.VPN
(and why not L2VPN…)
• There are many cheapVPN service providers on the
internet.
• If you use someone’sVPN service, he becomes your ISP.
• In most cases the VPN provides you Layer 2 access and
an IP via DHCP.
• This means they completely control your internet traffic
and can perform all possible attacks on your machine.
• Other users in the VPN can also attack your with very
dangerous local network attack techniques
AnonymousVPN vs.Tor –Why is it not
so attractive?
• A VPN can be configured to be your main/all
traffic gateway.
• In this case, all traffic of all types is sent
through the VPN
• If you have a “Tor VPN” or a “Tor
Gateway/Home Router” then you are ALMOST
100% anonymous.
Socksifiers vs.VPN
(and why not L2VPN…)
• Using Tor, you visit a server that you don’t know
its IP address and owner
• The server doesn’t know your IP address,
country and identity
• This is a platform for full secure 2 way trading,
information exchange and anonymity
Full 2Way Anonymity
• It is also possible that only the web server will
be in the Darknet (Tor network)
• Any normal user can access the anonymous,
Darknet server from the Internet, seamlessly,
without being a part of the Darknet
• Example: Tor2Web
1Way Reverse Anonymity
Tor2Web - 1Way ReverseAnonymity
• From the Internet to an anonymous Tor Hosting
Service Provider.
• There are FREE Tor hosting providers and paid
providers.
• Paying is still anonymous, Bitcoin and Liberty
Reserve accepted.
Maximum Anonymity Hosting
Maximum Anonymity Hosting
• Used to be a just a regular website
• Websites can be taken down by governments
• Now Darknets and distributed anonymous portals
(i.e. Osiris) provide:
• Perfect anonymous
• Decentralized
• Un-censored
WikiLeaks platform
Wiki Leaks!
Wiki Leaks – The Tor
Branch!
Your-Freedom – Another Darknet
• No Official Exit to the Internet
• Exit to the Internet can be custom made by
users
• Set of common sites:
FreeNet – A Dark DarkNet
FreeNet – A Dark DarkNet
FreeNet – A Dark DarkNet
LINKAGEDDON – FreeNet Website Index
• Any machine on any encrypted/open/cracked
Wi-Fi in the world can become a classical Tor
exit node
• An old machine or a good Wi-Fi antenna, helps
the Darknets grow
• Some even create an exit node a boat in non-
territorial water and on drones
Open Wi-Fi to Darknode 
Another Node inThe Network
Extreme Security – Custom MadeTor
Browser InsideThe JAVAVM
TOR- Manually Choosing an Exit Node
TOR- ARM GUI Add-on (originally created to
help Iranians visit the “western” Internet)
SelekTOR – Simple Exit Node Selector
SelekTOR – Simple Exit Node Selector
Telecomix Cipher System – ATor and I2P
Darknet Enabled Linux Operating System
“Tor”jan Horse  - ATrojan horse which only reports back
to the Darknet. Let’s call it “Dark-Flame”
Features
• Debian-based Linux for stability and performance, with
the Gnome desktop environment.
• Direct i2p Darknet access for secure communications
inside the i2p-network.
• Direct Tor onion routing for secure internet access.
• Upgraded Firefox browser
with NoScript,Torbutton and Privoxy proxy settings.
• http://system.telecomix.org/
Telecomix – Out of the box HIGH anonymity
for normal people
• Open-Transactions allows users to issue and
manipulate digital assets.
• Any issuer can sign and distribute new currency
contracts in order to create new digital asset types.
• Users can operate “cash-only” (without accounts) for
maximum anonymity, using untraceable digital cash.
• Users can transfer digital assets securely and provably,
with receipts signed by all parties.
OpenTransactions –Your Untraceable
Money Manager
OpenTransactions –Your Untraceable
Money Manager
OpenTransactions –Your Untraceable
Money Manager
OpenTransactions
OpenTransactions
• Osiris has many features that make it a unique product
at present; it is the result of a union between peer-to-
peer (P2P) technology and web portals.
• It allows anyone to create a web portal for free, without
depending on anyone or needing special technical
knowledge.
• Allows you to create content anonymously, allowing
you to contribute to freedom of expression and speech.
Osiris (Serverless Portal System)
Perfect Dark – P2P Files & Chat Darknet
• Current Features
• Encrypted Chat
• Encrypted Group chat
• Automated Key Exchange
• Encrypted FileTransfer
• Browsing other users shared files
• Sending files
• Presence (Online, Away, Busy, DND, Sleeping)
Waste - P2P Files & Chat Darknet
WASTE
OnionCat – Create a REAL SECURE ANONYMOUS
VPN overTor and I2P – Superslow…
• Where there is encryption – there is privacy
• Where there is encryption and several machines –
there is privacy and anonymity
• When there is privacy and anonymity – there is a
full freedom of speech and a full freedom for
thieves 
Conclusion
• Jonathan Lampert – Israel Operations Manager
jonathan@defensia.co.il
0545461091
• Meron Sellem (CTO)
meron@defensia.co.il
0543003505
Contact Us

Mais conteĂşdo relacionado

Mais procurados

Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark webJisc
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknetMichelle Devanny
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)Ali Saif Mirza
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhaniJack Mansukhani
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
Deep Web
Deep WebDeep Web
Deep WebAhmed Khan
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the WebPaula Ripoll Cacho
 
Tor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden SitesTor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden Sitesagora_url
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 

Mais procurados (20)

Darknet
DarknetDarknet
Darknet
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Deep web
Deep webDeep web
Deep web
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhani
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Deep Web
Deep WebDeep Web
Deep Web
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Darknet
DarknetDarknet
Darknet
 
Tor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden SitesTor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden Sites
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 

Destaque

Ciso back to the future - network vulnerabilities
Ciso   back to the future - network vulnerabilitiesCiso   back to the future - network vulnerabilities
Ciso back to the future - network vulnerabilitiesRafel Ivgi
 
Issa security in a virtual world
Issa   security in a virtual worldIssa   security in a virtual world
Issa security in a virtual worldRafel Ivgi
 
Cyber attacks 101
Cyber attacks 101Cyber attacks 101
Cyber attacks 101Rafel Ivgi
 
Siem & log management
Siem & log managementSiem & log management
Siem & log managementRafel Ivgi
 
Cyber crime
Cyber crimeCyber crime
Cyber crimeRafel Ivgi
 
Top 10 mistakes running a windows network
Top 10 mistakes   running a windows networkTop 10 mistakes   running a windows network
Top 10 mistakes running a windows networkRafel Ivgi
 
Hacker techniques, exploit and incident handling
Hacker techniques, exploit and incident handlingHacker techniques, exploit and incident handling
Hacker techniques, exploit and incident handlingRafel Ivgi
 
Advanced web application hacking and exploitation
Advanced web application hacking and exploitationAdvanced web application hacking and exploitation
Advanced web application hacking and exploitationRafel Ivgi
 
The darknet
The darknet The darknet
The darknet Shelly1509
 
Early childhood sdu 590721_last
Early childhood sdu 590721_lastEarly childhood sdu 590721_last
Early childhood sdu 590721_lastPattie Pattie
 
Daknet by moinuddin
Daknet by moinuddinDaknet by moinuddin
Daknet by moinuddinSyed Moinuddin
 
Java secure development part 3
Java secure development   part 3Java secure development   part 3
Java secure development part 3Rafel Ivgi
 
Java secure development part 2
Java secure development   part 2Java secure development   part 2
Java secure development part 2Rafel Ivgi
 
Implementing and auditing security controls part 2
Implementing and auditing security controls   part 2Implementing and auditing security controls   part 2
Implementing and auditing security controls part 2Rafel Ivgi
 
HD Radio Innovation
HD Radio Innovation HD Radio Innovation
HD Radio Innovation Nautel
 

Destaque (15)

Ciso back to the future - network vulnerabilities
Ciso   back to the future - network vulnerabilitiesCiso   back to the future - network vulnerabilities
Ciso back to the future - network vulnerabilities
 
Issa security in a virtual world
Issa   security in a virtual worldIssa   security in a virtual world
Issa security in a virtual world
 
Cyber attacks 101
Cyber attacks 101Cyber attacks 101
Cyber attacks 101
 
Siem & log management
Siem & log managementSiem & log management
Siem & log management
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Top 10 mistakes running a windows network
Top 10 mistakes   running a windows networkTop 10 mistakes   running a windows network
Top 10 mistakes running a windows network
 
Hacker techniques, exploit and incident handling
Hacker techniques, exploit and incident handlingHacker techniques, exploit and incident handling
Hacker techniques, exploit and incident handling
 
Advanced web application hacking and exploitation
Advanced web application hacking and exploitationAdvanced web application hacking and exploitation
Advanced web application hacking and exploitation
 
The darknet
The darknet The darknet
The darknet
 
Early childhood sdu 590721_last
Early childhood sdu 590721_lastEarly childhood sdu 590721_last
Early childhood sdu 590721_last
 
Daknet by moinuddin
Daknet by moinuddinDaknet by moinuddin
Daknet by moinuddin
 
Java secure development part 3
Java secure development   part 3Java secure development   part 3
Java secure development part 3
 
Java secure development part 2
Java secure development   part 2Java secure development   part 2
Java secure development part 2
 
Implementing and auditing security controls part 2
Implementing and auditing security controls   part 2Implementing and auditing security controls   part 2
Implementing and auditing security controls part 2
 
HD Radio Innovation
HD Radio Innovation HD Radio Innovation
HD Radio Innovation
 

Semelhante a Darknet

Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Luminati presentation
Luminati presentationLuminati presentation
Luminati presentationAmir Gershon
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksGeekNightHyderabad
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
Decentralized internet
Decentralized  internet Decentralized  internet
Decentralized internet abhinavkeesari
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)Kaustubh Joshi
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiShah Sheikh
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network torKhaled Mosharraf
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) WebJeroen Baert
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetPriyanka Aash
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Anonymous Security Scanning and Browsing
Anonymous Security Scanning and BrowsingAnonymous Security Scanning and Browsing
Anonymous Security Scanning and BrowsingAbhilash Venkata
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkHASHIR RAZA
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeekNightHyderabad
 

Semelhante a Darknet (20)

Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Luminati presentation
Luminati presentationLuminati presentation
Luminati presentation
 
Dark web
Dark webDark web
Dark web
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networks
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Decentralized internet
Decentralized  internet Decentralized  internet
Decentralized internet
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)
 
VPN
VPNVPN
VPN
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Anonymous Security Scanning and Browsing
Anonymous Security Scanning and BrowsingAnonymous Security Scanning and Browsing
Anonymous Security Scanning and Browsing
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
 

Mais de Rafel Ivgi

Java secure development part 1
Java secure development   part 1Java secure development   part 1
Java secure development part 1Rafel Ivgi
 
Implementing and auditing security controls part 1
Implementing and auditing security controls   part 1Implementing and auditing security controls   part 1
Implementing and auditing security controls part 1Rafel Ivgi
 
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...Rafel Ivgi
 
Firmitas Cyber Solutions - Inforgraphic - ICS & SCADA Vulnerabilities
Firmitas Cyber Solutions - Inforgraphic - ICS & SCADA VulnerabilitiesFirmitas Cyber Solutions - Inforgraphic - ICS & SCADA Vulnerabilities
Firmitas Cyber Solutions - Inforgraphic - ICS & SCADA VulnerabilitiesRafel Ivgi
 
United States O1 Visa Approval
United States O1 Visa ApprovalUnited States O1 Visa Approval
United States O1 Visa ApprovalRafel Ivgi
 
Comptia Security+ CE Certificate
Comptia Security+ CE CertificateComptia Security+ CE Certificate
Comptia Security+ CE CertificateRafel Ivgi
 
ISACA Membership
ISACA MembershipISACA Membership
ISACA MembershipRafel Ivgi
 
Iso 27001 Pecb Ismsla 100193 Rafel Ivgi
Iso 27001 Pecb Ismsla 100193 Rafel IvgiIso 27001 Pecb Ismsla 100193 Rafel Ivgi
Iso 27001 Pecb Ismsla 100193 Rafel IvgiRafel Ivgi
 
Webapplicationsecurity05 2010 100601100553 Phpapp02
Webapplicationsecurity05 2010 100601100553 Phpapp02Webapplicationsecurity05 2010 100601100553 Phpapp02
Webapplicationsecurity05 2010 100601100553 Phpapp02Rafel Ivgi
 

Mais de Rafel Ivgi (13)

Java secure development part 1
Java secure development   part 1Java secure development   part 1
Java secure development part 1
 
Implementing and auditing security controls part 1
Implementing and auditing security controls   part 1Implementing and auditing security controls   part 1
Implementing and auditing security controls part 1
 
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...
 
Firmitas Cyber Solutions - Inforgraphic - ICS & SCADA Vulnerabilities
Firmitas Cyber Solutions - Inforgraphic - ICS & SCADA VulnerabilitiesFirmitas Cyber Solutions - Inforgraphic - ICS & SCADA Vulnerabilities
Firmitas Cyber Solutions - Inforgraphic - ICS & SCADA Vulnerabilities
 
United States O1 Visa Approval
United States O1 Visa ApprovalUnited States O1 Visa Approval
United States O1 Visa Approval
 
Comptia Security+ CE Certificate
Comptia Security+ CE CertificateComptia Security+ CE Certificate
Comptia Security+ CE Certificate
 
ISACA Membership
ISACA MembershipISACA Membership
ISACA Membership
 
CISSP
CISSPCISSP
CISSP
 
CISM
CISMCISM
CISM
 
LPIC-1
LPIC-1LPIC-1
LPIC-1
 
CRISC
CRISCCRISC
CRISC
 
Iso 27001 Pecb Ismsla 100193 Rafel Ivgi
Iso 27001 Pecb Ismsla 100193 Rafel IvgiIso 27001 Pecb Ismsla 100193 Rafel Ivgi
Iso 27001 Pecb Ismsla 100193 Rafel Ivgi
 
Webapplicationsecurity05 2010 100601100553 Phpapp02
Webapplicationsecurity05 2010 100601100553 Phpapp02Webapplicationsecurity05 2010 100601100553 Phpapp02
Webapplicationsecurity05 2010 100601100553 Phpapp02
 

Último

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 

Último (20)

Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 

Darknet

  • 2. • Enterprise/Government Data Leakage • Proxy vs. Tor and Socksifiers vs. VPN (and why not L2VPN…) • Full 2 Way Anonymity • 1 Way Reverse Anonymity • Maximum Anonymity Hosting • Wiki Leaks! • Open Wi-Fi to Dark node  • ChoosingYour Exit Locations • Combining Darknets With Bit Torrent • Combining Darknets With Other Darknets (Tor, I2P, Freenet) Agenda
  • 3. The Evolvement of P2P File Sharing Law Suite Napster Kazaa Emule DC BitTorrent
  • 6. P2P Always Existed – But now it’s going Anonymous and Decentralized
  • 7. P2P Also goes Encrypted – “Crypto Anarchy”
  • 8. • Every day data is stolen from enterprises • Enterprises spend hundreds of thousands of dollars per year on DLP (Data Leakage Prevention) products • The classical DLP Bypass involves usage of encryption (Compression + Password, PGP) Enterprise/Government Data Leakage
  • 9. • Most advanced bypass techniques are network bridging and VPN dial-out • Darknets, especially Tor provide the same functionality as a VPN • Software exists to create a full VPN through/via/over Tor Enterprise/Government Data Leakage
  • 10. • Using an HTTP proxy, the provider can do a full two-way Man-In-The-Middle attack and see all traffic, even SSL • The alternative is using a Socks proxy, where the provider can Man-In-The-Middle only non- encrypted connections (HTTP, but NOT HTTPS) • Tor provides a local HTTP Proxy and a local Socks Proxy, eventually using someone’s station. He can MITM any one (not knowing who you are) only on un-encrypted connections Proxy vs.Tor
  • 11. • A Socksifier can force an application that doesn’t support a proxy, to use a proxy, forcing it on the app. • Socksifier’s are good and safe, but DOES NOT force proxy usage on ALL traffic types • Using Tor (Socks Proxy) and a Socksifier doesn’t provide full anonymity Socksifiers vs.VPN (and why not L2VPN…)
  • 12. • There are many cheapVPN service providers on the internet. • If you use someone’sVPN service, he becomes your ISP. • In most cases the VPN provides you Layer 2 access and an IP via DHCP. • This means they completely control your internet traffic and can perform all possible attacks on your machine. • Other users in the VPN can also attack your with very dangerous local network attack techniques AnonymousVPN vs.Tor –Why is it not so attractive?
  • 13. • A VPN can be configured to be your main/all traffic gateway. • In this case, all traffic of all types is sent through the VPN • If you have a “Tor VPN” or a “Tor Gateway/Home Router” then you are ALMOST 100% anonymous. Socksifiers vs.VPN (and why not L2VPN…)
  • 14. • Using Tor, you visit a server that you don’t know its IP address and owner • The server doesn’t know your IP address, country and identity • This is a platform for full secure 2 way trading, information exchange and anonymity Full 2Way Anonymity
  • 15. • It is also possible that only the web server will be in the Darknet (Tor network) • Any normal user can access the anonymous, Darknet server from the Internet, seamlessly, without being a part of the Darknet • Example: Tor2Web 1Way Reverse Anonymity
  • 16. Tor2Web - 1Way ReverseAnonymity
  • 17. • From the Internet to an anonymous Tor Hosting Service Provider. • There are FREE Tor hosting providers and paid providers. • Paying is still anonymous, Bitcoin and Liberty Reserve accepted. Maximum Anonymity Hosting
  • 19. • Used to be a just a regular website • Websites can be taken down by governments • Now Darknets and distributed anonymous portals (i.e. Osiris) provide: • Perfect anonymous • Decentralized • Un-censored WikiLeaks platform Wiki Leaks!
  • 20. Wiki Leaks – The Tor Branch!
  • 22. • No Official Exit to the Internet • Exit to the Internet can be custom made by users • Set of common sites: FreeNet – A Dark DarkNet
  • 23. FreeNet – A Dark DarkNet
  • 24. FreeNet – A Dark DarkNet
  • 25. LINKAGEDDON – FreeNet Website Index
  • 26. • Any machine on any encrypted/open/cracked Wi-Fi in the world can become a classical Tor exit node • An old machine or a good Wi-Fi antenna, helps the Darknets grow • Some even create an exit node a boat in non- territorial water and on drones Open Wi-Fi to Darknode 
  • 28.
  • 29. Extreme Security – Custom MadeTor Browser InsideThe JAVAVM
  • 30. TOR- Manually Choosing an Exit Node
  • 31. TOR- ARM GUI Add-on (originally created to help Iranians visit the “western” Internet)
  • 32. SelekTOR – Simple Exit Node Selector
  • 33. SelekTOR – Simple Exit Node Selector
  • 34. Telecomix Cipher System – ATor and I2P Darknet Enabled Linux Operating System
  • 35. “Tor”jan Horse  - ATrojan horse which only reports back to the Darknet. Let’s call it “Dark-Flame”
  • 36. Features • Debian-based Linux for stability and performance, with the Gnome desktop environment. • Direct i2p Darknet access for secure communications inside the i2p-network. • Direct Tor onion routing for secure internet access. • Upgraded Firefox browser with NoScript,Torbutton and Privoxy proxy settings. • http://system.telecomix.org/ Telecomix – Out of the box HIGH anonymity for normal people
  • 37. • Open-Transactions allows users to issue and manipulate digital assets. • Any issuer can sign and distribute new currency contracts in order to create new digital asset types. • Users can operate “cash-only” (without accounts) for maximum anonymity, using untraceable digital cash. • Users can transfer digital assets securely and provably, with receipts signed by all parties. OpenTransactions –Your Untraceable Money Manager
  • 42. • Osiris has many features that make it a unique product at present; it is the result of a union between peer-to- peer (P2P) technology and web portals. • It allows anyone to create a web portal for free, without depending on anyone or needing special technical knowledge. • Allows you to create content anonymously, allowing you to contribute to freedom of expression and speech. Osiris (Serverless Portal System)
  • 43. Perfect Dark – P2P Files & Chat Darknet
  • 44. • Current Features • Encrypted Chat • Encrypted Group chat • Automated Key Exchange • Encrypted FileTransfer • Browsing other users shared files • Sending files • Presence (Online, Away, Busy, DND, Sleeping) Waste - P2P Files & Chat Darknet
  • 45. WASTE
  • 46. OnionCat – Create a REAL SECURE ANONYMOUS VPN overTor and I2P – Superslow…
  • 47. • Where there is encryption – there is privacy • Where there is encryption and several machines – there is privacy and anonymity • When there is privacy and anonymity – there is a full freedom of speech and a full freedom for thieves  Conclusion
  • 48. • Jonathan Lampert – Israel Operations Manager jonathan@defensia.co.il 0545461091 • Meron Sellem (CTO) meron@defensia.co.il 0543003505 Contact Us