conf.directory

DEF CON 30 - Ionut Cernica - Deanonymization of TOR HTTP Hidden Services

About this talk

Anonymity networks such as Tor are used to protect the identity of people or services. Several deanonymization techniques have been described over time. Some of them attacked the protocol, others exploited various configuration issues. Through this presentation I will focus on deanonymization techniques of the http services of such networks by exploiting configuration issues. In the first part of the presentation, I will present deanonymization techniques on TOR which are public, and I will also present the techniques developed by me and the interesting story of how I came to develop them. In the last part of my presentation, I will do a demo with the exploitation of http hidden services in TOR and I will present each technique separately. I will also present how one of the techniques can be used successfully not only in the TOR network, but also on the internet in order to obtain information about the server that will help you discover other services.

Stay Updated

Get notified about new features and conference additions.

DEF CON 30 - Ionut Cernica - Deanonymization of TOR HTTP Hidden Services by Ionut Cernica | conf.directory | conf.directory