Главная
Study mode:
on
1
Introduction
2
What is a Darknet
3
A few notes
4
Other attacks
5
Threat models
6
ITP
7
Directory Server
8
Model Encryption
9
Onion Routing
10
Common Weaknesses
11
Mitigation
12
Common Attacks
13
Overview
14
DNS Leak
15
Solutions
16
HTTP out proxies
17
BitTorrent
18
IRC
19
Doodle Mitigations
20
Denial of Service
21
Total or Severe Blocking
22
Net Split
23
Bridge nodes
24
Mesh storage networks
25
Mesh networks
26
hocbased attacks
27
remote clocks
28
Murdochs research
29
Correlation attack
30
Mitigations
31
Metadata
32
Metadata Examples
33
Metadata Mitigation
34
Local Attacks
35
Browser Bundle
36
Memory Forensics
37
Live USB Drives
38
Civil Attacks
39
Multiple Nodes
Description:
Explore common weaknesses in darknet technologies like Tor and I2P in this comprehensive conference talk. Gain a practical understanding of how encrypted anonymizing networks can be subverted to reveal identities, presented in a manner accessible to security practitioners. Delve into topics including darknet fundamentals, threat models, encryption methods, common attacks, and mitigation strategies. Examine specific vulnerabilities like DNS leaks, HTTP proxies, BitTorrent usage, and metadata analysis. Learn about denial of service techniques, network splitting, correlation attacks, and local forensics approaches. Discover how to better protect darknet implementations and user privacy through various defensive measures and best practices.

Common Darknet Weaknesses

Add to list