DEF CON Forum Site Header Art

Announcement

Collapse
No announcement yet.

Ionut Cernica - Deanonymization of TOR HTTP hidden services

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Ionut Cernica - Deanonymization of TOR HTTP hidden services

    Ionut Cernica - Deanonymization of TOR HTTP hidden services



    Ionut Cernica, PHD Student @Department of Computer Science, Faculty of Automatic Control and Computer Science, University Politehnica of Bucharest

    Presentation Title: Deanonymization of TOR HTTP hidden services
    Length of presentation: 20 minutes
    Demo, Exploit

    Anonymity networks such as Tor are used to protect the identity of people or services. Several deanonymization techniques have been described over time. Some of them attacked the protocol, others exploited various configuration issues. Through this presentation I will focus on deanonymization techniques of the http services of such networks by exploiting configuration issues.

    In the first part of the presentation, I will present deanonymization techniques on TOR which are public, and I will also present the techniques developed by me and the interesting story of how I came to develop them.

    In the last part of my presentation, I will do a demo with the exploitation of http hidden services in TOR and I will present each technique separately. I will also present how one of the techniques can be used successfully not only in the TOR network, but also on the internet in order to obtain information about the server that will help you discover other services.

    SPEAKER BIO
    Ionut Cernica started his security career with the bug bounty program from Facebook. His passion for security led him to get involved in dozens of such programs and he found problems in very large companies such as Google, Microsoft, Yahoo, AT&T, eBay, VMware. He has also been testing web application security for 9 years and has had many projects on the penetration testing side.

    Another stage of his career was to get involved in security contests and participated in more than 100 such contests. He also reached important finals such as Codegate, Trend Micro and Defcon with the PwnThyBytes team. He also won several individual competitions, including the mini CTF from the first edition of Appsec village - Defcon village.

    Now he is doing research in the field of web application security, being also a PhD student at University Polytechnic of Bucharest. Through his research he wants to innovate in the field and to bring a new layer of security to web applications.

    https://twitter.com/CernicaIonut
    https://www.linkedin.com/in/cernica-ionut-ba844745/

    REFERENCES:
    S. Matic, Platon Kotzias, Juan Caballero, CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 2015
    Alex Biryukov; Ivan Pustogarov; Ralf-Philipp Weinmann; et. al. ,Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization, 2013 IEEE Symposium on Security and Privacy
    Marco Simioni, Investigative Techniques for the De-Anonymization of Hidden Services, 2019 21st International Conference on Advanced Communication Technology (ICACT)
    Varun Nair & Jinesh M. Kannimoola, A Tool to Extract Onion Links from Tor Hidden Services and Identify Illegal Activities, Lecture Notes in Networks and Systems book series (LNNS,volume 336), 2022
    Micah/WebBreacher, https://osintcurio.us/2019/03/05/apa...roy-anonymity/, 2019

    []
Working...
X