SlideShare a Scribd company logo
http://Irongeek.com
Adrian Crenshaw
http://Irongeek.com
I run Irongeek.com
I have an interest in InfoSec
education
I  don’t  know  everything  - I’m  just  a  
geek with time on my hands
Sr. Information Security Consultant
at TrustedSec
Co-Founder of Derbycon
http://www.derbycon.com
Twitter: @Irongeek_ADC
http://Irongeek.com
I will be taking two perspectives
People trying to stay anonymous
People trying to de-anonymize users
I’m  not  really  a  privacy  guy
IANAL
Be careful where you surf, contraband awaits
http://Irongeek.com
http://Irongeek.com
Darknets
There are many definitions, but mine is
“anonymizing  private  network  ”
Use of encryption and proxies (some times other
peers) to obfuscate who is communicating to whom
Sometimes referred to as Cipherspace
(love that term)
http://Irongeek.com
The Onion Router
http://Irongeek.com
Who?
First the US Naval Research Laboratory, then the EFF and now the Tor Project
(501c3 non-profit).
http://www.torproject.org/
Why?
“Tor  is  free  software  and  an  open  network  that  helps  you  defend  against  a  form  
of network surveillance that threatens personal freedom and privacy,
confidential business activities and relationships, and state security known as
traffic  analysis.”  ~  As  defined  by  their  site
What?
Access normal Internet sites anonymously, and Tor hidden services.
How?
Locally run SOCKS proxy that connects to the Tor network.
http://Irongeek.com
Layered encryption
Bi-directional tunnels
Has directory servers
Mostly focused on out proxying to the Internet
More info at https://www.torproject.org
Internet Server
Directory Server
http://Irongeek.com
http://Irongeek.com
Image from http://www.torproject.org/hidden-services.html.en
http://Irongeek.com
Image from http://www.torproject.org/hidden-services.html.en
http://Irongeek.com
Image from http://www.torproject.org/hidden-services.html.en
http://Irongeek.com
Image from http://www.torproject.org/hidden-services.html.en
http://Irongeek.com
Image from http://www.torproject.org/hidden-services.html.en
http://Irongeek.com
Image from http://www.torproject.org/hidden-services.html.en
http://Irongeek.com
Client
Just a user
Relays
These relay traffic, and can act as exit points
Bridges
Relays not advertised in the directory servers, so harder to block
Guard Nodes
Used to mitigate some traffic analysis attacks
Introduction Points
Helpers in making connections to hidden services
Rendezvous Point
Used for relaying/establishing connections to hidden services
http://Irongeek.com
http://Irongeek.com
Tails: The Amnesic Incognito Live System
https://tails.boum.org/
Tor2Web Proxy
http://tor2web.org
Tor Hidden Wiki:
http://kpvz7ki2v5agwt35.onion
Scallion (make host names)
https://github.com/lachesis/scallion
Onion Cat
http://www.cypherpunk.at/onioncat/
Reddit Onions
http://www.reddit.com/r/onions
http://Irongeek.com
Pros
If you can tunnel it through a SOCKS proxy, you can make
just about any protocol work.
Three levels of proxying, each node not knowing the one
before last, makes things very anonymous.
Cons
Slow
Do you trust your exit node?
Semi-fixed Infrastructure:
Sept 25th 2009, Great Firewall of China blocks 80% of Tor
relays listed in the Directory, but all hail bridges!!!
https://blog.torproject.org/blog/tor-partially-blocked-china
http://yro.slashdot.org/story/09/10/15/1910229/China-Strangles-Tor-Ahead-of-National-Day
Fairly easy to tell someone is using it from the server side
http://www.irongeek.com/i.php?page=security/detect-tor-exit-node-in-php
http://Irongeek.com
(Keep in mind, this is just the defaults)
Local
9050/tcp Tor SOCKS proxy
9051/tcp Tor control port
(9150 and 9151 on Tor Browser Bundle)
Remote
443/tcp and 80/tcp mostly
Servers may also listen on port 9001/tcp, and directory
information on 9030.
More details
http://www.irongeek.com/i.php?page=security/detect-tor-
exit-node-in-php
http://www.room362.com/tor-the-yin-or-the-yang
http://Irongeek.com
http://geti2p.net
http://Irongeek.com
Crypto Currency
Proof of work
Bitcoin Addresses & Private Keys
Block Chain (ledger)
Tumblers (laundering)
Way more info by Bob Weiss
http://www.irongeek.com/i.php?page=videos/bsidesde2013/2-6-
hacking-benjamins-bob-weiss-pwcrack-into-to-bitcoin
http://Irongeek.com
On  Dec.  16th  2013  a  bomb  threat  was  made  to  Harvard’s  student  news  
paper and some officials.
The person used https://www.guerrillamail.com to send
email after connecting over Tor
Guerrilla Mail puts an X-Originating-IP header on that
marked who sent the message, in this case a Tor exit point
To: "irongeek@irongeek.com" <irongeek@irongeek.com>
From: <e9jnqrz+oo4j3w@guerrillamail.com>
Subject: Hey baby!
X-Originating-IP: [74.128.28.74]
Content-Type: text/plain; charset="utf-8"
shrapnel bombs placed in:
science center
sever hall
emerson hall
thayer hall
2/4.
guess correctly.
be quick for they will go off soon
http://Irongeek.com
All Tor nodes are publicly known (except bridges):
http://torstatus.blutmagie.de
Easy to correlate who was attached to Harvard network
and using Tor at the same time the email was sent (unless
you use a bridge).
Eldo Kim was connected to the Tor network around that
time.
Suspect Eldo Kim wanted to get out of a final and admitted
he made the bomb threat when interviewed.
More Details:
http://arstechnica.com/security/2013/12/use-of-tor-helped-fbi-finger-
bomb-hoax-suspect/
http://www.scribd.com/doc/192371742/Kim-El-Do-Harvard
http://Irongeek.com
Lessons Learned:
Don’t  be  the  only  person  using  Tor on a
monitored network at a given time
Use a bridge?
Don’t  admit  anything
Correlation attacks are a bitch
http://Irongeek.com
5MB
8MB
Client
Client
Client
Client
http://Irongeek.com
Client
Client
ClientI could just
watch the
timings.
Pulse the
data flows
myself.
Or even just
change the load
on the path.
DoS outside
host to affect
traffic.
http://Irongeek.com
DNS
Query
Monitored DNS Server
If  I  don’t  use  the  
proxy for DNS, I
may send the
query to a DNS
server.  It  won’t  
see my traffic
to/from the
destination, but
may now know
I’m  visiting  
someplace.com/
.onion/.i2p
http://Irongeek.com
Hector Xavier Monsegur (Sabu) normally
used Tor for connecting to IRC but was
caught not using it once and FBI found
his home IP. After being caught, he
started to collaborate.
Hector spoke with Jeremy Hammond
(sup_g) on IRC, and Jeremy casually let
slip where he had been arrested before
and groups he was involved with.
This narrowed the suspect pool, so the
FBI got a court order to monitor his
Internet access.
http://Irongeek.com
Hammond used Tor, and while the crypto
was never busted, FBI correlated times
sup_g was talking to Subu on IRC with
when Hammond was at home using his
computer.
More Details:
http://arstechnica.com/tech-
policy/2012/03/stakeout-how-the-fbi-
tracked-and-busted-a-chicago-anon/
http://Irongeek.com
Lessons Learned:
Use Tor consistently
Don’t  give  personal  information
Correlation attacks are still a bitch!
http://Irongeek.com
Freedom Hosting hosted, amongst other things,
many child porn related hidden service websites.
Freedom Hosting had previously come under attack
by Anonymous during Op Darknet because of it
hosting CP.
In July of 2013, the FBI compromised Freedom
Hosting, and inserted malicious Java Script that
used Firefox bug CVE-2013-1690 in version 17 ESR.
The Tor Browser Bundle is based on Firefox, and the
newest version was already patched, but not
everyone updates in a timely fashion.
http://Irongeek.com
The  payload  was  “Magneto”,  which  phoned  home  
to  servers  in  Virginia  using  the  host’s  public  IP.
http://ghowen.me/fbi-tor-malware-analysis
It  also  reported  back  the  computer’s:
MAC address
Windows host name
unique serial number to tie a user to a site
May be same as EgotisticalGiraffe.
See also:
Magic Lantern
FOXACID
Computer and Internet Protocol Address Verifier (CIPAV)
Thanks to Joe Cicero for "Privacy In a Surveillance
State, Evading Detection" (P.I.S.S.E.D.) talk.
I am the best Giraffe
EVAR!!! Bow to my
Giraffey goodness!
http://Irongeek.com
An Irish man, Eric Eoin Marques, is alleged to be
the operator of Freedom Hosting. The servers
hosting Freedom Hosting were tied to him because
of payment records.
Marques was said to have dived for his laptop to
shut it down when police raided him.
More Details:
http://www.wired.com/threatlevel/2013/09/freedo
m-hosting-fbi/
http://Irongeek.com
Lessons Learned:
Don't host Captain Picard or
Julian Bashir
Patch, patch, patch
Follow the money
Leave encrypted laptops in a powered
down state when not in use!
http://Irongeek.com
Let’s  see  if  the  
hidden server
app is
vulnerable to an
exploit (buffer
overflow/web
app shell
exec/etc).
Send a payload
that contacts an
IP I monitor.
Exploit &
Payload
http://Irongeek.com
Someone  going  by  the  handle  “Dread  Pirate
Roberts”  was  the  operator  of  the  SilkRoad, which
allows sellers and buyers to exchange less than
legal goods and services.
http://silkroadvb5piz3r.onion
With about $1.2 Billion in exchanges on SilkRoad,
FBI wanted to know who was behind it.
They started to look for the earliest references to
the SilkRoad on the public Internet.
From court documents:
“As of September 23, 2013, there were nearly 13,000 listings for
controlled substances on the website, listed under the categories
"Cannabis," "Dissociatives," "Ecstasy," "Intoxicants," "Opioids,"
"Precursors," "Prescription," "Psychedelics," and "Stimulants," among
others. “
“There  were 159 listings on the site under the category "Services." Most
concerned computer-hacking services: for example, one listing was by a
vendor offering to hack into Facebook, Twitter, and other social
networking accounts of the customer's choosing, so that "You can Read,
Write, Upload, Delete, View All Personal Info"; another listing offered
tutorials on "22 different methods" for hacking ATM machines. Other
listings offered services that were likewise criminal in nature. For
example, one listing was for a "HUGE Blackmarket Contact List,"
described as a list of "connects" for "services" such as "Anonymous Bank
Accounts," "Counterfeit Bills (CAD/GBP/EUR/USD) ," "Firearms
+Ammunition," "Stolen Info (CC [credit card], Paypal) ," and "Hitmen
(10+ countries)." “
“Sellers may not list forgeries of any privately issued documents such as
diplomas/certifications, tickets or receipts. Also, listings for counterfeit
currency are still not allowed in the money section.”
http://Irongeek.com
The  earliest  they  could  find  was  from  “altoid”  on the Shroomery.org forums on 01/27/11.
http://www.shroomery.org/forums/showflat.php/Number/13860995
http://Irongeek.com
BitCoinTalk.org Post
“Quote from: altoid on January 29, 2011, 07:44:51 PM
What an awesome thread! You guys have a ton of great ideas. Has anyone
seen Silk Road yet? It's kind of like an anonymous amazon.com. I don't think
they have heroin on there, but they are selling other stuff. They basically use
bitcoin and tor to broker anonymous transactions. It's at
http://tydgccykixpbu6uz.onion. Those not familiar with Tor can go to
silkroad420.wordpress.com for instructions on how to access the .onion site.
Let me know what you guys
think”https://bitcointalk.org/index.php?topic=175.msg42479#msg42479
http://Irongeek.com
An  account  named  “altoid”  also  made  a post on Bitcointalk.org about looking
for an  “IT  pro in the bitcoin community”  and  asked  interested  parties  to  contact  
“rossulbricht at gmail dot com”  (10/11/11).
https://bitcointalk.org/index.php?topic=47811.0
http://Irongeek.com
Ulbricht’s  Google+  profile  show  an  interest    in  the  “Mises Institute”    a  “world  
center of the Austrian School of economics.”
Dread  Pirate  Roberts’  signature  on  the  Silk  Road  forums  had  a  link  to  the  Mises
Institute. Austrian Economic theory was also stated by Dread Pirate Roberts to
be  influential  to  the  the  Silk  Road’s  philosophy.
http://Irongeek.com
"Ross Ulbricht.”  account  also  posted  on  StackOverflow asking for help with PHP code to
connect  to  a  Tor  hidden  service.  The  username  was  quickly  changed  to  “frosty”  
(03/16/12).
http://stackoverflow.com/questions/15445285/how-can-i-connect-to-a-tor-hidden-
service-using-curl-in-php
Guess who is now a suspect for being “Dread  Pirate  Roberts”?  Ross  William Ulbricht.
http://Irongeek.com
Someone was connecting to a server that hosts the Silk Road from an Internet
café near where Ross lived in San Francisco. Private messages on Silk Road
make it seem Dread Pirate Roberts lived in the Pacific time zone.
IP of a Silk Road server was attached to via a VPN server that was connected to
by an IP belonging to an Internet cafe on Laguna Street in San Francisco from
which Ulbricht had also connected to his Gmail account with (both on June 3,
2013).
PM to Dread Pirate Roberts from a user said the site was leaking "some sort of
external IP address" belonging to the VPN.
FBI starts taking down SilkRoad servers,  though  I’m  are  not  sure  how  they  were  
found. Could have been money trail to aliases, or as Nicholas Weaver
conjectured, they hacked SilkRoad and made it contact an outsides server
without  using  Tor  so  it  revealed  it’s  real  IP.  Once  located,  FBI  was  able  to  get  a  
copy of one of the servers.
http://Irongeek.com
On 07/10/13 US Customs intercepted 9 IDs with different names, but all having a picture of
Ulbricht. Homeland Security interviewed Ulbricht, but he denied having ordered them.
Smart:  “ULBRICHT  generally refused to answer any questions pertaining to the purchase of
this or other counterfeit identity documents.”
Stupid:  “However, ULBRICHT volunteered that "hypothetically" anyone could go onto a
website named "Silk Road" on "Tor" and purchase any drugs or fake identity documents the
person wanted. “
Roommates  knew  him  as  “Josh”.  PMs  show  DPR  was  interested  in  getting  fake  IDs.
http://Irongeek.com
Server used SSH and a public key that ended in frosty@frosty. Server also had some of
the same code posted on StackOverflow.
Eventually, on 10/01/2013 the FBI Landed on him in a Library right after he entered the
password for his laptop. More evidence was found on his laptop.
More info (Big thanks to Nate Anderson for the original article and Agent Christopher
Tarbell for court docs):
http://arstechnica.com/tech-policy/2013/10/how-the-feds-took-down-the-dread-
pirate-roberts/
https://www.cs.columbia.edu/~smb/UlbrichtCriminalComplaint.pdf
http://Irongeek.com
Lessons Learned:
Keep online identities separate
Keep different usernames
From different locations
Have a consistent story
Don’t  talk  about  interests
Don’t  volunteer information!
http://Irongeek.com
Maybe?
http://Irongeek.com
Talk on Darknets in general
http://www.irongeek.com/i.php?page=videos/aide-winter-
2011#Cipherspace/Darknets:_anonymizing_private_networks
I2P FAQ
http://www.i2p2.de/faq.html
Tor FAQ
https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ
Tor Manual
https://www.torproject.org/docs/tor-manual.html.en
I2P Index to Technical Documentation
http://www.i2p2.de/how
http://Irongeek.com
Intro to Darknets: Tor and I2P Workshop
http://www.irongeek.com/i.php?page=videos/intro-to-tor-i2p-darknets
My Tor/I2P Notes
http://www.irongeek.com/i.php?page=security/i2p-tor-workshop-notes
Cipherspaces/Darknets An Overview Of Attack Strategies
http://www.irongeek.com/i.php?page=videos/cipherspaces-darknets-an-overview-of-attack-strategies
Anonymous proxy to the normal web
http://www.irongeek.com/i.php?page=videos/tor-1
Hidden services
Normally websites, but can be just about any TCP
connection
http://www.irongeek.com/i.php?page=videos/tor-hidden-services
http://Irongeek.com
Derbycon
Sept 24th-28th, 2014
http://www.derbycon.com
Others
http://www.louisvilleinfosec.com
http://skydogcon.com
http://hack3rcon.org
http://outerz0ne.org
http://phreaknic.info
http://notacon.org
PhotoCreditstoKC(devauto)
DerbyconArtCreditstoDigiP
http://Irongeek.com
42
Twitter: @Irongeek_ADC

More Related Content

PDF
Defcon 22-metacortex-grifter-darkside-of-the-internet
PDF
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
PDF
Defcon 22-david-wyde-client-side-http-cookie-security
PPTX
Ransomware - what is it, how to protect against it
PPTX
Sandbox detection: leak, abuse, test - Hacktivity 2015
PDF
Defcon 22-jesus-molina-learn-how-to-control-every-room
PDF
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
PPTX
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
Defcon 22-metacortex-grifter-darkside-of-the-internet
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Defcon 22-david-wyde-client-side-http-cookie-security
Ransomware - what is it, how to protect against it
Sandbox detection: leak, abuse, test - Hacktivity 2015
Defcon 22-jesus-molina-learn-how-to-control-every-room
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -

What's hot (20)

PDF
(130216) #fitalk potentially malicious ur ls
PDF
Internal Pentest: from z3r0 to h3r0
ODP
Cracking Into Embedded Devices - HACK.LU 2K8
PDF
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
PDF
TeelTech - Advancing Mobile Device Forensics (online version)
PDF
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
PPTX
Improvement in Rogue Access Points - SensePost Defcon 22
PDF
How to hack a telecom and stay alive
PPT
[ENG] IPv6 shipworm + My little Windows domain pwnie
PPTX
The Background Noise of the Internet
PPT
Attacking Automatic Wireless Network Selection
PPTX
I See You
PDF
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
PPTX
Outlook and Exchange for the bad guys
PDF
Red Team Tactics for Cracking the GSuite Perimeter
PPTX
How to hide your browser 0-day @ Disobey
PDF
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
PDF
BlueHat v18 || The matrix has you - protecting linux using deception
PPTX
Offensive Python for Pentesting
PDF
Automated Malware Analysis and Cyber Security Intelligence
(130216) #fitalk potentially malicious ur ls
Internal Pentest: from z3r0 to h3r0
Cracking Into Embedded Devices - HACK.LU 2K8
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
TeelTech - Advancing Mobile Device Forensics (online version)
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
Improvement in Rogue Access Points - SensePost Defcon 22
How to hack a telecom and stay alive
[ENG] IPv6 shipworm + My little Windows domain pwnie
The Background Noise of the Internet
Attacking Automatic Wireless Network Selection
I See You
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Outlook and Exchange for the bad guys
Red Team Tactics for Cracking the GSuite Perimeter
How to hide your browser 0-day @ Disobey
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
BlueHat v18 || The matrix has you - protecting linux using deception
Offensive Python for Pentesting
Automated Malware Analysis and Cyber Security Intelligence
Ad

Similar to Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop (20)

PPTX
Illuminating the dark web
PPTX
Demystifying Secure Channel
PPTX
Tor network seminar by 13504
PPTX
Tor Project and The Darknet
PPTX
The Dark Web : Hidden Services
PPT
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
PDF
PDF
Anonymity in the Web based on Routing Protocols
PPTX
Acpe 2014 Internet Anonymity Using Tor
PPTX
Introduction to anonymity network tor
PDF
Anonymity Network TOR
PPTX
Анонимность Tor: миф и реальность
PPTX
Dark Web.pptx
PDF
Darknet
PPTX
Onion routing and tor: Fundamentals and Anonymity
PDF
Tor talk-prosa-screen
PPTX
Dark Side of the Net Lecture 4 TOR
PPTX
Dark Web
PDF
The Dark web - Why the hidden part of the web is even more dangerous?
Illuminating the dark web
Demystifying Secure Channel
Tor network seminar by 13504
Tor Project and The Darknet
The Dark Web : Hidden Services
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Anonymity in the Web based on Routing Protocols
Acpe 2014 Internet Anonymity Using Tor
Introduction to anonymity network tor
Anonymity Network TOR
Анонимность Tor: миф и реальность
Dark Web.pptx
Darknet
Onion routing and tor: Fundamentals and Anonymity
Tor talk-prosa-screen
Dark Side of the Net Lecture 4 TOR
Dark Web
The Dark web - Why the hidden part of the web is even more dangerous?
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
The various Industrial Revolutions .pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Modernising the Digital Integration Hub
PDF
STKI Israel Market Study 2025 version august
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPT
What is a Computer? Input Devices /output devices
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
Zenith AI: Advanced Artificial Intelligence
Module 1.ppt Iot fundamentals and Architecture
Programs and apps: productivity, graphics, security and other tools
WOOl fibre morphology and structure.pdf for textiles
Web App vs Mobile App What Should You Build First.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
The various Industrial Revolutions .pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
1 - Historical Antecedents, Social Consideration.pdf
O2C Customer Invoices to Receipt V15A.pptx
Hybrid model detection and classification of lung cancer
Assigned Numbers - 2025 - Bluetooth® Document
A contest of sentiment analysis: k-nearest neighbor versus neural network
Modernising the Digital Integration Hub
STKI Israel Market Study 2025 version august
Developing a website for English-speaking practice to English as a foreign la...
What is a Computer? Input Devices /output devices
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop

  • 2. http://Irongeek.com I run Irongeek.com I have an interest in InfoSec education I  don’t  know  everything  - I’m  just  a   geek with time on my hands Sr. Information Security Consultant at TrustedSec Co-Founder of Derbycon http://www.derbycon.com Twitter: @Irongeek_ADC
  • 3. http://Irongeek.com I will be taking two perspectives People trying to stay anonymous People trying to de-anonymize users I’m  not  really  a  privacy  guy IANAL Be careful where you surf, contraband awaits
  • 5. http://Irongeek.com Darknets There are many definitions, but mine is “anonymizing  private  network  ” Use of encryption and proxies (some times other peers) to obfuscate who is communicating to whom Sometimes referred to as Cipherspace (love that term)
  • 7. http://Irongeek.com Who? First the US Naval Research Laboratory, then the EFF and now the Tor Project (501c3 non-profit). http://www.torproject.org/ Why? “Tor  is  free  software  and  an  open  network  that  helps  you  defend  against  a  form   of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic  analysis.”  ~  As  defined  by  their  site What? Access normal Internet sites anonymously, and Tor hidden services. How? Locally run SOCKS proxy that connects to the Tor network.
  • 8. http://Irongeek.com Layered encryption Bi-directional tunnels Has directory servers Mostly focused on out proxying to the Internet More info at https://www.torproject.org Internet Server Directory Server
  • 16. http://Irongeek.com Client Just a user Relays These relay traffic, and can act as exit points Bridges Relays not advertised in the directory servers, so harder to block Guard Nodes Used to mitigate some traffic analysis attacks Introduction Points Helpers in making connections to hidden services Rendezvous Point Used for relaying/establishing connections to hidden services
  • 18. http://Irongeek.com Tails: The Amnesic Incognito Live System https://tails.boum.org/ Tor2Web Proxy http://tor2web.org Tor Hidden Wiki: http://kpvz7ki2v5agwt35.onion Scallion (make host names) https://github.com/lachesis/scallion Onion Cat http://www.cypherpunk.at/onioncat/ Reddit Onions http://www.reddit.com/r/onions
  • 19. http://Irongeek.com Pros If you can tunnel it through a SOCKS proxy, you can make just about any protocol work. Three levels of proxying, each node not knowing the one before last, makes things very anonymous. Cons Slow Do you trust your exit node? Semi-fixed Infrastructure: Sept 25th 2009, Great Firewall of China blocks 80% of Tor relays listed in the Directory, but all hail bridges!!! https://blog.torproject.org/blog/tor-partially-blocked-china http://yro.slashdot.org/story/09/10/15/1910229/China-Strangles-Tor-Ahead-of-National-Day Fairly easy to tell someone is using it from the server side http://www.irongeek.com/i.php?page=security/detect-tor-exit-node-in-php
  • 20. http://Irongeek.com (Keep in mind, this is just the defaults) Local 9050/tcp Tor SOCKS proxy 9051/tcp Tor control port (9150 and 9151 on Tor Browser Bundle) Remote 443/tcp and 80/tcp mostly Servers may also listen on port 9001/tcp, and directory information on 9030. More details http://www.irongeek.com/i.php?page=security/detect-tor- exit-node-in-php http://www.room362.com/tor-the-yin-or-the-yang
  • 22. http://Irongeek.com Crypto Currency Proof of work Bitcoin Addresses & Private Keys Block Chain (ledger) Tumblers (laundering) Way more info by Bob Weiss http://www.irongeek.com/i.php?page=videos/bsidesde2013/2-6- hacking-benjamins-bob-weiss-pwcrack-into-to-bitcoin
  • 23. http://Irongeek.com On  Dec.  16th  2013  a  bomb  threat  was  made  to  Harvard’s  student  news   paper and some officials. The person used https://www.guerrillamail.com to send email after connecting over Tor Guerrilla Mail puts an X-Originating-IP header on that marked who sent the message, in this case a Tor exit point To: "irongeek@irongeek.com" <irongeek@irongeek.com> From: <e9jnqrz+oo4j3w@guerrillamail.com> Subject: Hey baby! X-Originating-IP: [74.128.28.74] Content-Type: text/plain; charset="utf-8" shrapnel bombs placed in: science center sever hall emerson hall thayer hall 2/4. guess correctly. be quick for they will go off soon
  • 24. http://Irongeek.com All Tor nodes are publicly known (except bridges): http://torstatus.blutmagie.de Easy to correlate who was attached to Harvard network and using Tor at the same time the email was sent (unless you use a bridge). Eldo Kim was connected to the Tor network around that time. Suspect Eldo Kim wanted to get out of a final and admitted he made the bomb threat when interviewed. More Details: http://arstechnica.com/security/2013/12/use-of-tor-helped-fbi-finger- bomb-hoax-suspect/ http://www.scribd.com/doc/192371742/Kim-El-Do-Harvard
  • 25. http://Irongeek.com Lessons Learned: Don’t  be  the  only  person  using  Tor on a monitored network at a given time Use a bridge? Don’t  admit  anything Correlation attacks are a bitch
  • 27. http://Irongeek.com Client Client ClientI could just watch the timings. Pulse the data flows myself. Or even just change the load on the path. DoS outside host to affect traffic.
  • 28. http://Irongeek.com DNS Query Monitored DNS Server If  I  don’t  use  the   proxy for DNS, I may send the query to a DNS server.  It  won’t   see my traffic to/from the destination, but may now know I’m  visiting   someplace.com/ .onion/.i2p
  • 29. http://Irongeek.com Hector Xavier Monsegur (Sabu) normally used Tor for connecting to IRC but was caught not using it once and FBI found his home IP. After being caught, he started to collaborate. Hector spoke with Jeremy Hammond (sup_g) on IRC, and Jeremy casually let slip where he had been arrested before and groups he was involved with. This narrowed the suspect pool, so the FBI got a court order to monitor his Internet access.
  • 30. http://Irongeek.com Hammond used Tor, and while the crypto was never busted, FBI correlated times sup_g was talking to Subu on IRC with when Hammond was at home using his computer. More Details: http://arstechnica.com/tech- policy/2012/03/stakeout-how-the-fbi- tracked-and-busted-a-chicago-anon/
  • 31. http://Irongeek.com Lessons Learned: Use Tor consistently Don’t  give  personal  information Correlation attacks are still a bitch!
  • 32. http://Irongeek.com Freedom Hosting hosted, amongst other things, many child porn related hidden service websites. Freedom Hosting had previously come under attack by Anonymous during Op Darknet because of it hosting CP. In July of 2013, the FBI compromised Freedom Hosting, and inserted malicious Java Script that used Firefox bug CVE-2013-1690 in version 17 ESR. The Tor Browser Bundle is based on Firefox, and the newest version was already patched, but not everyone updates in a timely fashion.
  • 33. http://Irongeek.com The  payload  was  “Magneto”,  which  phoned  home   to  servers  in  Virginia  using  the  host’s  public  IP. http://ghowen.me/fbi-tor-malware-analysis It  also  reported  back  the  computer’s: MAC address Windows host name unique serial number to tie a user to a site May be same as EgotisticalGiraffe. See also: Magic Lantern FOXACID Computer and Internet Protocol Address Verifier (CIPAV) Thanks to Joe Cicero for "Privacy In a Surveillance State, Evading Detection" (P.I.S.S.E.D.) talk. I am the best Giraffe EVAR!!! Bow to my Giraffey goodness!
  • 34. http://Irongeek.com An Irish man, Eric Eoin Marques, is alleged to be the operator of Freedom Hosting. The servers hosting Freedom Hosting were tied to him because of payment records. Marques was said to have dived for his laptop to shut it down when police raided him. More Details: http://www.wired.com/threatlevel/2013/09/freedo m-hosting-fbi/
  • 35. http://Irongeek.com Lessons Learned: Don't host Captain Picard or Julian Bashir Patch, patch, patch Follow the money Leave encrypted laptops in a powered down state when not in use!
  • 36. http://Irongeek.com Let’s  see  if  the   hidden server app is vulnerable to an exploit (buffer overflow/web app shell exec/etc). Send a payload that contacts an IP I monitor. Exploit & Payload
  • 37. http://Irongeek.com Someone  going  by  the  handle  “Dread  Pirate Roberts”  was  the  operator  of  the  SilkRoad, which allows sellers and buyers to exchange less than legal goods and services. http://silkroadvb5piz3r.onion With about $1.2 Billion in exchanges on SilkRoad, FBI wanted to know who was behind it. They started to look for the earliest references to the SilkRoad on the public Internet. From court documents: “As of September 23, 2013, there were nearly 13,000 listings for controlled substances on the website, listed under the categories "Cannabis," "Dissociatives," "Ecstasy," "Intoxicants," "Opioids," "Precursors," "Prescription," "Psychedelics," and "Stimulants," among others. “ “There  were 159 listings on the site under the category "Services." Most concerned computer-hacking services: for example, one listing was by a vendor offering to hack into Facebook, Twitter, and other social networking accounts of the customer's choosing, so that "You can Read, Write, Upload, Delete, View All Personal Info"; another listing offered tutorials on "22 different methods" for hacking ATM machines. Other listings offered services that were likewise criminal in nature. For example, one listing was for a "HUGE Blackmarket Contact List," described as a list of "connects" for "services" such as "Anonymous Bank Accounts," "Counterfeit Bills (CAD/GBP/EUR/USD) ," "Firearms +Ammunition," "Stolen Info (CC [credit card], Paypal) ," and "Hitmen (10+ countries)." “ “Sellers may not list forgeries of any privately issued documents such as diplomas/certifications, tickets or receipts. Also, listings for counterfeit currency are still not allowed in the money section.”
  • 38. http://Irongeek.com The  earliest  they  could  find  was  from  “altoid”  on the Shroomery.org forums on 01/27/11. http://www.shroomery.org/forums/showflat.php/Number/13860995
  • 39. http://Irongeek.com BitCoinTalk.org Post “Quote from: altoid on January 29, 2011, 07:44:51 PM What an awesome thread! You guys have a ton of great ideas. Has anyone seen Silk Road yet? It's kind of like an anonymous amazon.com. I don't think they have heroin on there, but they are selling other stuff. They basically use bitcoin and tor to broker anonymous transactions. It's at http://tydgccykixpbu6uz.onion. Those not familiar with Tor can go to silkroad420.wordpress.com for instructions on how to access the .onion site. Let me know what you guys think”https://bitcointalk.org/index.php?topic=175.msg42479#msg42479
  • 40. http://Irongeek.com An  account  named  “altoid”  also  made  a post on Bitcointalk.org about looking for an  “IT  pro in the bitcoin community”  and  asked  interested  parties  to  contact   “rossulbricht at gmail dot com”  (10/11/11). https://bitcointalk.org/index.php?topic=47811.0
  • 41. http://Irongeek.com Ulbricht’s  Google+  profile  show  an  interest    in  the  “Mises Institute”    a  “world   center of the Austrian School of economics.” Dread  Pirate  Roberts’  signature  on  the  Silk  Road  forums  had  a  link  to  the  Mises Institute. Austrian Economic theory was also stated by Dread Pirate Roberts to be  influential  to  the  the  Silk  Road’s  philosophy.
  • 42. http://Irongeek.com "Ross Ulbricht.”  account  also  posted  on  StackOverflow asking for help with PHP code to connect  to  a  Tor  hidden  service.  The  username  was  quickly  changed  to  “frosty”   (03/16/12). http://stackoverflow.com/questions/15445285/how-can-i-connect-to-a-tor-hidden- service-using-curl-in-php Guess who is now a suspect for being “Dread  Pirate  Roberts”?  Ross  William Ulbricht.
  • 43. http://Irongeek.com Someone was connecting to a server that hosts the Silk Road from an Internet café near where Ross lived in San Francisco. Private messages on Silk Road make it seem Dread Pirate Roberts lived in the Pacific time zone. IP of a Silk Road server was attached to via a VPN server that was connected to by an IP belonging to an Internet cafe on Laguna Street in San Francisco from which Ulbricht had also connected to his Gmail account with (both on June 3, 2013). PM to Dread Pirate Roberts from a user said the site was leaking "some sort of external IP address" belonging to the VPN. FBI starts taking down SilkRoad servers,  though  I’m  are  not  sure  how  they  were   found. Could have been money trail to aliases, or as Nicholas Weaver conjectured, they hacked SilkRoad and made it contact an outsides server without  using  Tor  so  it  revealed  it’s  real  IP.  Once  located,  FBI  was  able  to  get  a   copy of one of the servers.
  • 44. http://Irongeek.com On 07/10/13 US Customs intercepted 9 IDs with different names, but all having a picture of Ulbricht. Homeland Security interviewed Ulbricht, but he denied having ordered them. Smart:  “ULBRICHT  generally refused to answer any questions pertaining to the purchase of this or other counterfeit identity documents.” Stupid:  “However, ULBRICHT volunteered that "hypothetically" anyone could go onto a website named "Silk Road" on "Tor" and purchase any drugs or fake identity documents the person wanted. “ Roommates  knew  him  as  “Josh”.  PMs  show  DPR  was  interested  in  getting  fake  IDs.
  • 45. http://Irongeek.com Server used SSH and a public key that ended in frosty@frosty. Server also had some of the same code posted on StackOverflow. Eventually, on 10/01/2013 the FBI Landed on him in a Library right after he entered the password for his laptop. More evidence was found on his laptop. More info (Big thanks to Nate Anderson for the original article and Agent Christopher Tarbell for court docs): http://arstechnica.com/tech-policy/2013/10/how-the-feds-took-down-the-dread- pirate-roberts/ https://www.cs.columbia.edu/~smb/UlbrichtCriminalComplaint.pdf
  • 46. http://Irongeek.com Lessons Learned: Keep online identities separate Keep different usernames From different locations Have a consistent story Don’t  talk  about  interests Don’t  volunteer information!
  • 48. http://Irongeek.com Talk on Darknets in general http://www.irongeek.com/i.php?page=videos/aide-winter- 2011#Cipherspace/Darknets:_anonymizing_private_networks I2P FAQ http://www.i2p2.de/faq.html Tor FAQ https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ Tor Manual https://www.torproject.org/docs/tor-manual.html.en I2P Index to Technical Documentation http://www.i2p2.de/how
  • 49. http://Irongeek.com Intro to Darknets: Tor and I2P Workshop http://www.irongeek.com/i.php?page=videos/intro-to-tor-i2p-darknets My Tor/I2P Notes http://www.irongeek.com/i.php?page=security/i2p-tor-workshop-notes Cipherspaces/Darknets An Overview Of Attack Strategies http://www.irongeek.com/i.php?page=videos/cipherspaces-darknets-an-overview-of-attack-strategies Anonymous proxy to the normal web http://www.irongeek.com/i.php?page=videos/tor-1 Hidden services Normally websites, but can be just about any TCP connection http://www.irongeek.com/i.php?page=videos/tor-hidden-services