Ionut Cernica - Deanonymization of TOR HTTP hidden services
Ionut Cernica, PHD Student @Department of Computer Science, Faculty of Automatic Control and Computer Science, University Politehnica of Bucharest
Presentation Title: Deanonymization of TOR HTTP hidden services
Length of presentation: 20 minutes
Demo, Exploit
Anonymity networks such as Tor are used to protect the identity of people or services. Several deanonymization techniques have been described over time. Some of them attacked the protocol, others exploited various configuration issues. Through this presentation I will focus on deanonymization techniques of the http services of such networks by exploiting configuration issues.
In the first part of the presentation, I will present deanonymization techniques on TOR which are public, and I will also present the techniques developed by me and the interesting story of how I came to develop them.
In the last part of my presentation, I will do a demo with the exploitation of http hidden services in TOR and I will present each technique separately. I will also present how one of the techniques can be used successfully not only in the TOR network, but also on the internet in order to obtain information about the server that will help you discover other services.
SPEAKER BIO
Ionut Cernica started his security career with the bug bounty program from Facebook. His passion for security led him to get involved in dozens of such programs and he found problems in very large companies such as Google, Microsoft, Yahoo, AT&T, eBay, VMware. He has also been testing web application security for 9 years and has had many projects on the penetration testing side.
Another stage of his career was to get involved in security contests and participated in more than 100 such contests. He also reached important finals such as Codegate, Trend Micro and Defcon with the PwnThyBytes team. He also won several individual competitions, including the mini CTF from the first edition of Appsec village - Defcon village.
Now he is doing research in the field of web application security, being also a PhD student at University Polytechnic of Bucharest. Through his research he wants to innovate in the field and to bring a new layer of security to web applications.
https://twitter.com/CernicaIonut
https://www.linkedin.com/in/cernica-ionut-ba844745/
REFERENCES:
S. Matic, Platon Kotzias, Juan Caballero, CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 2015
Alex Biryukov; Ivan Pustogarov; Ralf-Philipp Weinmann; et. al. ,Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization, 2013 IEEE Symposium on Security and Privacy
Marco Simioni, Investigative Techniques for the De-Anonymization of Hidden Services, 2019 21st International Conference on Advanced Communication Technology (ICACT)
Varun Nair & Jinesh M. Kannimoola, A Tool to Extract Onion Links from Tor Hidden Services and Identify Illegal Activities, Lecture Notes in Networks and Systems book series (LNNS,volume 336), 2022
Micah/WebBreacher, https://osintcurio.us/2019/03/05/apa...roy-anonymity/, 2019
[]
Ionut Cernica, PHD Student @Department of Computer Science, Faculty of Automatic Control and Computer Science, University Politehnica of Bucharest
Presentation Title: Deanonymization of TOR HTTP hidden services
Length of presentation: 20 minutes
Demo, Exploit
Anonymity networks such as Tor are used to protect the identity of people or services. Several deanonymization techniques have been described over time. Some of them attacked the protocol, others exploited various configuration issues. Through this presentation I will focus on deanonymization techniques of the http services of such networks by exploiting configuration issues.
In the first part of the presentation, I will present deanonymization techniques on TOR which are public, and I will also present the techniques developed by me and the interesting story of how I came to develop them.
In the last part of my presentation, I will do a demo with the exploitation of http hidden services in TOR and I will present each technique separately. I will also present how one of the techniques can be used successfully not only in the TOR network, but also on the internet in order to obtain information about the server that will help you discover other services.
SPEAKER BIO
Ionut Cernica started his security career with the bug bounty program from Facebook. His passion for security led him to get involved in dozens of such programs and he found problems in very large companies such as Google, Microsoft, Yahoo, AT&T, eBay, VMware. He has also been testing web application security for 9 years and has had many projects on the penetration testing side.
Another stage of his career was to get involved in security contests and participated in more than 100 such contests. He also reached important finals such as Codegate, Trend Micro and Defcon with the PwnThyBytes team. He also won several individual competitions, including the mini CTF from the first edition of Appsec village - Defcon village.
Now he is doing research in the field of web application security, being also a PhD student at University Polytechnic of Bucharest. Through his research he wants to innovate in the field and to bring a new layer of security to web applications.
https://twitter.com/CernicaIonut
https://www.linkedin.com/in/cernica-ionut-ba844745/
REFERENCES:
S. Matic, Platon Kotzias, Juan Caballero, CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 2015
Alex Biryukov; Ivan Pustogarov; Ralf-Philipp Weinmann; et. al. ,Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization, 2013 IEEE Symposium on Security and Privacy
Marco Simioni, Investigative Techniques for the De-Anonymization of Hidden Services, 2019 21st International Conference on Advanced Communication Technology (ICACT)
Varun Nair & Jinesh M. Kannimoola, A Tool to Extract Onion Links from Tor Hidden Services and Identify Illegal Activities, Lecture Notes in Networks and Systems book series (LNNS,volume 336), 2022
Micah/WebBreacher, https://osintcurio.us/2019/03/05/apa...roy-anonymity/, 2019
[]