Anonymous Security Scanning and Browsing
-
Upload
abhilash-venkata -
Category
Internet
-
view
441 -
download
2
Transcript of Anonymous Security Scanning and Browsing
![Page 1: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/1.jpg)
Anonymous Scan
Topics to be Covered• Why to be Anonymous – Scans and Browsing• What is TOR• Socks Proxy , DNS Leaks• Using TOR – Browser Level , Terminal (config)• Proxy chains ( config)• Using Nmap, nikto, burp with Tor
![Page 2: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/2.jpg)
Why to be Anonymous
• Privacy reasons – Citizens • Business need to keep Trade Secrets, Network
security • Govt – for its security• Military, Law enforcement orgs needs
anonymity to get their job done • Anonymity isn't cryptography, steganography
Operating Systems and Applications leak your info
![Page 3: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/3.jpg)
Info. Getting leaked via
• Browser Plug-in, Cookies, Extensions, • Shockwave/Flash, Java, QuickTime and even
![Page 4: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/4.jpg)
TOR “The onion router”
• online anonymity software and network• open source, freely available• active research environment
Estimated 3,00,000 daily Tor users
![Page 5: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/5.jpg)
Works on Relay Principle
Each node knows only the previous hop and the next hop. No node in the path can discover the full path
![Page 6: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/6.jpg)
• TOR uses Onion Routing • Onion Routing technique for anonymous
communication over a network. • Messages are encapsulated in layers of
encryption.
![Page 7: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/7.jpg)
Socks Proxy
• It’s a Protocol / Socks – Socket Secure• A SOCKS server is a general
purpose proxy server that establishes a TCP connection to another server on behalf of a client
![Page 8: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/8.jpg)
TOR Browser Level
• Download TOR• Run
![Page 9: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/9.jpg)
Steps to Install1. Install TORsudo apt-get install tor2. Install proxychainssudo apt-get install proxychains3. Open /etc/proxychains.conf & add
[ProxyList] # add proxy here ... # meanwile # defaults set to "tor" socks4 127.0.0.1 9050
![Page 10: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/10.jpg)
Start and Test TOR
1. sudo service tor start (llly, stop and restart)2. sudo tor status (to check the status)3. sudo proxychains firefox www.ipchicken.com
![Page 11: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/11.jpg)
![Page 12: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/12.jpg)
![Page 13: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/13.jpg)
![Page 14: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/14.jpg)
DNS Leaks
• traffic leaks outside of the secure connection to the network
• Under certain conditions, • OS will continue to use its default DNS servers
instead of the anonymous DNS servers • Results in DNS Leaks
![Page 15: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/15.jpg)
Nmap, nikto
• sudo proxychains nmap -sT –PN < IP address>• sudo nikto proxychains <host>• For all command line scans…..
![Page 16: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/16.jpg)
Scan on abc.com
![Page 17: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/17.jpg)
IP belongs china’s ISP
![Page 18: Anonymous Security Scanning and Browsing](https://reader034.fdocuments.net/reader034/viewer/2022042722/58ae93151a28abdf068b60c1/html5/thumbnails/18.jpg)
Burp suite
• Install TOR• Go to <OPTIONS> • Set SOCKS as 127.0.0.1 9050• NOTE : – Proxy settings in foxy proxy and burp suite will
same as 127.0.0.1 8080