SlideShare uma empresa Scribd logo
1 de 48
Demystifying A Secure Channel
By Viral Parmar
Who AM I
Viral Parmar
ComExpo Cyber Security Foundation
Cyber Security Researcher
Mozilla Reps, Mozilla Foundation
Given 500+ session all over the world
Solved 200+case of cyber crime and aware more then
6 lakh people about privacy and security
Always remember: Know hAckiNG, but no HaCKing.
@viralparmarhack
Steganography
What is Steganography
 Steganography is a technique of hiding a secret message within a an ordinary
message and extracting it at the destination to maintain confidentiality of data
 Utilizing a graphics image as a cover is the most popular method to conceal the
data files
Create Secret file using NTFS Stream
 Send Secret messages
 Send viruses
Tool
Stream Armor –to detect ntfs stream
Application of Steganography
 Privacy (Secret)
 Digital control System
 Copy prevention (Copyrights)
 Unauthorized duplication
 Metadata hiding
 Covert Communication
Classification of Steganography
 Technical Steganography
Hides a message using scientific methods
 Linguistic Steganography
Hides a message in carrier, chose medium to communicate
Technical Steganography
 Use physical or chemical means to hide the existence of message.
 Tools, device, methods.
 Invisible ink
 Microdots
 Computer based – text, picture, video
Linguistic Steganography
 Hiding a message in carrier
 It is categorized into semagrams and open codes
Types of Semagrams
 Visual semagrams
Every day physical object is used to convey the message
 Text semagrams
Sudden change in the handwriting, fonts, size.
Types of Open Codes
 Jargon code
It is language which can b understand by group of people
 Covered Ciphers
Message is hidden openly in the carrier medium so that anyone who
know the secret can recover it .
o Null ciphers
Encryption - Plain text is mixed with large amount of non cipher text
o Grille ciphers
A grille is created by cutting holes in paper
Place grille on paper and can retrieve the plain text
How Steganography works ?
Types of Steganography
Image steganography
Quickstego
 Steganalysis
Change in size, file format, last modified timestamp
Statistical analysis
 Document Steganography
wbStego
 Steganalysis
Alteration to the text position
Text patterns
Language used
Blank space
 Video Steganography
Our secret
 Steganalysis
Based on Motion vector
Statistical analysis
Time stamp
Odd distortion
Some unrelated gestures in video
 Audio Steganography
o Using LSB and Frequency which are non-audible to human
o Echo data hiding
o Spread spectrum method
o MP3Stegz
o Stegostick
 Folder Steganography
Quick crypto
 Mail steganography
http://www.spammimic.com/
Internet
What is Tor ?
TOR User
Hidden Services
• Location-hidden services allow a server to offer a TCP service without revealing its IP address.
• Tor accommodates receiver anonymity by allowing location hidden services
• Design goals for location hidden services
• Access Control: filtering incoming requests
• Robustness: maintain a long-term pseudonymous identity
• Smear-resistance: against socially disapproved acts
• Application transparency
• Allows to access onion websites and deep web.
How TOR works?
Tor Node 1 Tor Node 2 Tor Node 3
Tor Node 6Tor Node 5Tor Node 4
Tor Node 7 Tor Node 8 Tor Node 9
Unencrypted link
Encrypted link
SERVER
WORKING OF TOR: 1
Tor Node 1 Tor Node 2 Tor Node 3
Tor Node 6Tor Node 5Tor Node 4
Tor Node 8 Tor Node 9Tor Node 7
SERVER
Unencrypted link
Encrypted linkWORKING OF TOR: 2
Tor Node 1 Tor Node 2 Tor Node 3
Tor Node 6Tor Node 5Tor Node 4
Tor Node 8 Tor Node 9Tor Node 7
SERVER
Unencrypted link
Encrypted linkWORKING OF TOR: 3
Let’s Explore the Deep Web
How to access Deep Web?
• Step 1 : https://www.torproject.org/download/download
• Step 2 : Download Software according to your System OS
• Step 3 : After installation, Open Tor Browser
• Step 4 : You will get option of “Configure” and “Connect” , so select
“Connect: and proceed To Explore Tor
• Tor can't solve all anonymity problems. It focuses only on protecting the transport of
data.
• You need to use protocol-specific support software if you don't want the sites you
visit to see your identifying information.
• To protect your anonymity, be smart. Don't provide your name or other revealing
information in web forms.
• Be aware that, like all anonymizing networks that are fast enough for web browsing,
Tor does not provide protection against end-to-end timing attacks: If your attacker
can watch the traffic coming out of your computer, and also the traffic arriving at
your chosen destination, he can use statistical analysis to discover that they are part
of the same circuit.
Really Tor?
TOR: Limitations
• DNS Leakage : the client reveals the destination to the DNS server
during DNS resolution.
• End-to-end timing correlation: An attacker watching patterns of
traffic at the initiator and the responder will be able to confirm
the correspondence with high probability.
• Eavesdropping by exit nodes: Tor does not encrypt the traffic
between an exit node and the target server. Therefore a malicious
exit node can observe traffic , identify user request and can send
the wrong response.
• Tor is slow: Traffic is bouncing through ORs and even on
volunteers' computers in various parts of the world. This may
cause some bottleneck and network latency.
Case Study : Silk Road
Case Studies : Silk Road
• Famous drug acquisition site - Ross Ulbricht (Dread Pirate Roberts)
• To market his site [The Silk Road] he would post around in clear net
forums (reddit, HF.net etc.)
• The FBI claims the former physics and engineering student even publicly
alluded to his alleged criminal enterprise on his LinkedIn profile
• He put his links on his G+ account and regularly posted that he was using
Ubuntu on the actual Hostes
• He would go as far as the neighbourhood Starbucks or library, which was
just around the corner from his house, to logon to and administrate his
Silk Road onion
Case Studies – Harvard Bomb Threat
• On December 16th a bomb threat was made to Harvard’s student newspaper and
some official by Eldo Kim
• He used guerrilamail.com email service via tor to send the threat.
• Kim took several steps to hide his identity but in the end it was the wifi that got
him
• All TOR nodes are publicly know except bridges
Case Studies – Harvard Bomb Threat
• The reasons under the sun to do something like this his was that he
wanted to get out of a final exam
• He connected to TOR through his student account
• Because of this fact and the fact that he was the only one connected
to TOR at the time the email was sent it was easy for them to
correlate that he may have sent the threat.
• As if that wasn't enough, Eldo puts the final nail in his own coffin by
actually admitting that he was the one who made the bomb threat.
Case Studies : Freedom hosting
In July 2013 the FBI
Compromised freedom
hosting by inserting
malicious JavaScript that
used Firefox exploit bug
CVE-2013-1690 because
they were using an
outdated version 17 ESR,
of tor browser.
Case Studies : Freedom hosting
• Freedom Hosting was known for hosting child pornography. This is enough to make
you a mark for all sorts.
• Freedom had already been under attack from Anonymous during Op Darknet because
of the child porn.
• Freedom Hosting did not update their version of the TOR browser.
• The FBI used a payload called Magneto that gave them Freedom's IP address, MAC
address, and Windows host name with the unique serial number that ties a user to a
site visit (Cookie malware!!)
• Magneto phoned home to servers in Virginia using the host ‘s public ip
http://ghowen.me/fbi-tor-malware-analysis
• An irish man eric eoin marques alleged operator of freedom hosting.
• Marques was said to have dived for his laptop to shut it down when police raided him.
Case Studies : LulzSec
• Hector Xavier Monsegur (Sabu) was already being watched by the FBI.
However, his mistake was that he became careless
• Slipping up, he connected to IRC without tor, when he normally would.
This allowed the FBI to get his home IP address.
• Jeremy Hammond ( sup_g ), when speaking with Hector on IRC spoke
carelessly of places he had previously been arrested and other groups
that he was involved with. The FBI used this information to narrow their
suspect pool and allowed them to obtain a court order to monitor his
internet traffic.
• Once again correlation proves to be a bitch say this because although
the FBI did not exploit tor to bust Jeremy, they were, however, able to
correlate the times 'sup_g' spoke with 'Sabu' on IRC with when Jeremy
was at home using his computer.
Case Study : playpen
• Playpen a child porn website launched on august 2014 in TOR
• It had 215000 member 117000 posts 11000 visitors week
• In February 2015 FBI run the website till 4 march and send NIT
network investigation technique (hacking tool) using that they
traced back to 1300 users
Avoid use of Dangerous Website
Tor Developer Created Malware for FBI To Hack
Tor Users
It Was a Insider’s Job
Secure Communication
Any Questions
Contact Me
in.linkedin.com/in/viralparmarhacker
viralparmarhacker@protonmail.com
facebook.com/viralparmarhacker
twitter.com/viralparmarhack
Stay Connected
Stay Safe
+91 8980808222
#LogOutNow

Mais conteúdo relacionado

Mais procurados

Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersBrent Muir
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 
Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TORanjalika sinha
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network torKhaled Mosharraf
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?hackdemocracy
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat IntelligenceMarlabs
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Torantitree
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion routerAshly Liza
 

Mais procurados (19)

Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Online Privacy: How to Protect Your Activity and Communications
Online Privacy: How to Protect Your Activity and CommunicationsOnline Privacy: How to Protect Your Activity and Communications
Online Privacy: How to Protect Your Activity and Communications
 
Tor browser
Tor browserTor browser
Tor browser
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Dark web
Dark webDark web
Dark web
 
Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TOR
 
Tor Network
Tor NetworkTor Network
Tor Network
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 
TOR: The Onion Router
TOR: The Onion RouterTOR: The Onion Router
TOR: The Onion Router
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion router
 
Dark web
Dark webDark web
Dark web
 

Semelhante a Demystifying Secure Channel

Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crimejung921
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigationMehedi Hasan
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknetDvir Barel
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosisP-e-t-a-r
 

Semelhante a Demystifying Secure Channel (20)

Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Anonymizers
AnonymizersAnonymizers
Anonymizers
 
Dark Web
Dark WebDark Web
Dark Web
 
Dw communication
Dw communicationDw communication
Dw communication
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Dark Net
Dark NetDark Net
Dark Net
 
Tor Tracer
Tor TracerTor Tracer
Tor Tracer
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
hacking
hackinghacking
hacking
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crime
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Darknet
DarknetDarknet
Darknet
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknet
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosis
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Tor Browser
Tor BrowserTor Browser
Tor Browser
 

Mais de Viral Parmar

We are Building Dystopia using AI & ML
We are Building Dystopia using AI & MLWe are Building Dystopia using AI & ML
We are Building Dystopia using AI & MLViral Parmar
 
The malware effects
The malware effectsThe malware effects
The malware effectsViral Parmar
 
Why Privacy matters?
Why Privacy matters? Why Privacy matters?
Why Privacy matters? Viral Parmar
 
JWT Authentication with Django at PyTennessee 2019
JWT Authentication with Django at PyTennessee 2019JWT Authentication with Django at PyTennessee 2019
JWT Authentication with Django at PyTennessee 2019Viral Parmar
 
JS authentication with auth0
JS authentication with auth0JS authentication with auth0
JS authentication with auth0Viral Parmar
 
Extreme Web Exploitation
Extreme Web ExploitationExtreme Web Exploitation
Extreme Web ExploitationViral Parmar
 
Facebook Breach - A wake up call
Facebook Breach - A wake up callFacebook Breach - A wake up call
Facebook Breach - A wake up callViral Parmar
 
Who is spying on you ?
Who is spying on you ?Who is spying on you ?
Who is spying on you ?Viral Parmar
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the webViral Parmar
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical HackingViral Parmar
 

Mais de Viral Parmar (14)

We are Building Dystopia using AI & ML
We are Building Dystopia using AI & MLWe are Building Dystopia using AI & ML
We are Building Dystopia using AI & ML
 
The malware effects
The malware effectsThe malware effects
The malware effects
 
Why Privacy matters?
Why Privacy matters? Why Privacy matters?
Why Privacy matters?
 
JWT Authentication with Django at PyTennessee 2019
JWT Authentication with Django at PyTennessee 2019JWT Authentication with Django at PyTennessee 2019
JWT Authentication with Django at PyTennessee 2019
 
WebVR
WebVRWebVR
WebVR
 
Rust Hack
Rust HackRust Hack
Rust Hack
 
JS authentication with auth0
JS authentication with auth0JS authentication with auth0
JS authentication with auth0
 
XSS
XSSXSS
XSS
 
Extreme Web Exploitation
Extreme Web ExploitationExtreme Web Exploitation
Extreme Web Exploitation
 
Facebook Breach - A wake up call
Facebook Breach - A wake up callFacebook Breach - A wake up call
Facebook Breach - A wake up call
 
Who is spying on you ?
Who is spying on you ?Who is spying on you ?
Who is spying on you ?
 
Cyber Disorder
Cyber DisorderCyber Disorder
Cyber Disorder
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the web
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
 

Último

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Último (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Demystifying Secure Channel

  • 1. Demystifying A Secure Channel By Viral Parmar
  • 2. Who AM I Viral Parmar ComExpo Cyber Security Foundation Cyber Security Researcher Mozilla Reps, Mozilla Foundation Given 500+ session all over the world Solved 200+case of cyber crime and aware more then 6 lakh people about privacy and security Always remember: Know hAckiNG, but no HaCKing. @viralparmarhack
  • 4. What is Steganography  Steganography is a technique of hiding a secret message within a an ordinary message and extracting it at the destination to maintain confidentiality of data  Utilizing a graphics image as a cover is the most popular method to conceal the data files
  • 5. Create Secret file using NTFS Stream  Send Secret messages  Send viruses Tool Stream Armor –to detect ntfs stream
  • 6. Application of Steganography  Privacy (Secret)  Digital control System  Copy prevention (Copyrights)  Unauthorized duplication  Metadata hiding  Covert Communication
  • 7. Classification of Steganography  Technical Steganography Hides a message using scientific methods  Linguistic Steganography Hides a message in carrier, chose medium to communicate
  • 8. Technical Steganography  Use physical or chemical means to hide the existence of message.  Tools, device, methods.  Invisible ink  Microdots  Computer based – text, picture, video
  • 9. Linguistic Steganography  Hiding a message in carrier  It is categorized into semagrams and open codes Types of Semagrams  Visual semagrams Every day physical object is used to convey the message  Text semagrams Sudden change in the handwriting, fonts, size.
  • 10. Types of Open Codes  Jargon code It is language which can b understand by group of people  Covered Ciphers Message is hidden openly in the carrier medium so that anyone who know the secret can recover it . o Null ciphers Encryption - Plain text is mixed with large amount of non cipher text o Grille ciphers A grille is created by cutting holes in paper Place grille on paper and can retrieve the plain text
  • 12. Types of Steganography Image steganography Quickstego  Steganalysis Change in size, file format, last modified timestamp Statistical analysis
  • 13.  Document Steganography wbStego  Steganalysis Alteration to the text position Text patterns Language used Blank space
  • 14.  Video Steganography Our secret  Steganalysis Based on Motion vector Statistical analysis Time stamp Odd distortion Some unrelated gestures in video
  • 15.  Audio Steganography o Using LSB and Frequency which are non-audible to human o Echo data hiding o Spread spectrum method o MP3Stegz o Stegostick
  • 16.  Folder Steganography Quick crypto  Mail steganography http://www.spammimic.com/
  • 17.
  • 21. Hidden Services • Location-hidden services allow a server to offer a TCP service without revealing its IP address. • Tor accommodates receiver anonymity by allowing location hidden services • Design goals for location hidden services • Access Control: filtering incoming requests • Robustness: maintain a long-term pseudonymous identity • Smear-resistance: against socially disapproved acts • Application transparency • Allows to access onion websites and deep web.
  • 23. Tor Node 1 Tor Node 2 Tor Node 3 Tor Node 6Tor Node 5Tor Node 4 Tor Node 7 Tor Node 8 Tor Node 9 Unencrypted link Encrypted link SERVER WORKING OF TOR: 1
  • 24. Tor Node 1 Tor Node 2 Tor Node 3 Tor Node 6Tor Node 5Tor Node 4 Tor Node 8 Tor Node 9Tor Node 7 SERVER Unencrypted link Encrypted linkWORKING OF TOR: 2
  • 25. Tor Node 1 Tor Node 2 Tor Node 3 Tor Node 6Tor Node 5Tor Node 4 Tor Node 8 Tor Node 9Tor Node 7 SERVER Unencrypted link Encrypted linkWORKING OF TOR: 3
  • 27. How to access Deep Web? • Step 1 : https://www.torproject.org/download/download • Step 2 : Download Software according to your System OS • Step 3 : After installation, Open Tor Browser • Step 4 : You will get option of “Configure” and “Connect” , so select “Connect: and proceed To Explore Tor
  • 28.
  • 29. • Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. • You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. • To protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. • Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit. Really Tor?
  • 30. TOR: Limitations • DNS Leakage : the client reveals the destination to the DNS server during DNS resolution. • End-to-end timing correlation: An attacker watching patterns of traffic at the initiator and the responder will be able to confirm the correspondence with high probability. • Eavesdropping by exit nodes: Tor does not encrypt the traffic between an exit node and the target server. Therefore a malicious exit node can observe traffic , identify user request and can send the wrong response. • Tor is slow: Traffic is bouncing through ORs and even on volunteers' computers in various parts of the world. This may cause some bottleneck and network latency.
  • 31. Case Study : Silk Road
  • 32. Case Studies : Silk Road • Famous drug acquisition site - Ross Ulbricht (Dread Pirate Roberts) • To market his site [The Silk Road] he would post around in clear net forums (reddit, HF.net etc.) • The FBI claims the former physics and engineering student even publicly alluded to his alleged criminal enterprise on his LinkedIn profile • He put his links on his G+ account and regularly posted that he was using Ubuntu on the actual Hostes • He would go as far as the neighbourhood Starbucks or library, which was just around the corner from his house, to logon to and administrate his Silk Road onion
  • 33. Case Studies – Harvard Bomb Threat • On December 16th a bomb threat was made to Harvard’s student newspaper and some official by Eldo Kim • He used guerrilamail.com email service via tor to send the threat. • Kim took several steps to hide his identity but in the end it was the wifi that got him • All TOR nodes are publicly know except bridges
  • 34. Case Studies – Harvard Bomb Threat • The reasons under the sun to do something like this his was that he wanted to get out of a final exam • He connected to TOR through his student account • Because of this fact and the fact that he was the only one connected to TOR at the time the email was sent it was easy for them to correlate that he may have sent the threat. • As if that wasn't enough, Eldo puts the final nail in his own coffin by actually admitting that he was the one who made the bomb threat.
  • 35. Case Studies : Freedom hosting In July 2013 the FBI Compromised freedom hosting by inserting malicious JavaScript that used Firefox exploit bug CVE-2013-1690 because they were using an outdated version 17 ESR, of tor browser.
  • 36. Case Studies : Freedom hosting • Freedom Hosting was known for hosting child pornography. This is enough to make you a mark for all sorts. • Freedom had already been under attack from Anonymous during Op Darknet because of the child porn. • Freedom Hosting did not update their version of the TOR browser. • The FBI used a payload called Magneto that gave them Freedom's IP address, MAC address, and Windows host name with the unique serial number that ties a user to a site visit (Cookie malware!!) • Magneto phoned home to servers in Virginia using the host ‘s public ip http://ghowen.me/fbi-tor-malware-analysis • An irish man eric eoin marques alleged operator of freedom hosting. • Marques was said to have dived for his laptop to shut it down when police raided him.
  • 37. Case Studies : LulzSec • Hector Xavier Monsegur (Sabu) was already being watched by the FBI. However, his mistake was that he became careless • Slipping up, he connected to IRC without tor, when he normally would. This allowed the FBI to get his home IP address. • Jeremy Hammond ( sup_g ), when speaking with Hector on IRC spoke carelessly of places he had previously been arrested and other groups that he was involved with. The FBI used this information to narrow their suspect pool and allowed them to obtain a court order to monitor his internet traffic. • Once again correlation proves to be a bitch say this because although the FBI did not exploit tor to bust Jeremy, they were, however, able to correlate the times 'sup_g' spoke with 'Sabu' on IRC with when Jeremy was at home using his computer.
  • 38. Case Study : playpen • Playpen a child porn website launched on august 2014 in TOR • It had 215000 member 117000 posts 11000 visitors week • In February 2015 FBI run the website till 4 march and send NIT network investigation technique (hacking tool) using that they traced back to 1300 users
  • 39. Avoid use of Dangerous Website
  • 40. Tor Developer Created Malware for FBI To Hack Tor Users
  • 41. It Was a Insider’s Job
  • 42.
  • 43.
  • 44.