Changes between Version 115 and Version 116 of AnonymityModule
- Timestamp:
- Jul 7, 2011 4:07:28 PM (13 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
AnonymityModule
v115 v116 39 39 For this exercise, we are going to set up a network with 11 different nodes. 2 nodes will be client nodes, Alice and Bob, which will be making HTTP requests from 2 other nodes, Server1 and Server2, which will be running Apache2. There will be a proxy node running tinyproxy, 4 nodes running the Tor program, and 2 routers. Once we set up the network, we will set up tinyproxy on the proxy node and Apache2 on the 2 Server nodes. Then we will have Alice make HTTP requests of the Server1 node directly, through the proxy, and through the Tor network, while we sniff the requests. The "Wide Area" should be treated as a cloud of an unknown number of computers and routers, representing a large network where we are just highlighting the nodes used for Tor. We will then analyze this data using Wireshark to determine who is communicating and what they are saying. 40 40 41 == Step 1 Setting Up the Network == 41 == Step 1 Editing your NS file == 42 43 44 == Step 2 Setting Up the Network == 45 42 46 Swap in the Experiment using [attachment:anonymous.ns this NS file] 43 47 [[Image(wan.php3)]] [[Image(networksetup.png)]] … … 85 89 This will run a script which installs and sets up [https://banu.com/tinyproxy/ tinyproxy] on the node. Tinyproxy is a free program and is designed to be small and easy to operate. The proxy is now set up! We'll get to using it in a little while. 86 90 87 == Step 2Generating and Listening to Network Traffic ==91 == Step 3 Generating and Listening to Network Traffic == 88 92 We are now ready to begin learning! [[BR]] 89 93 The topics to be covered are … … 98 102 99 103 === Direct Client-to-Server Traffic === 100 Then type the command `sudo tcpdump -i eth0 -s 0 -x -w /tmp/direct.pcap` This will begin listening to the traffic that comes through this node and that specific ethernet link, eth0 in the example, write the data out to the file direct.pcap in the tmp diretory. For more help with `tcpdump` type in the command `man tcpdump` At this time, the person connected to Alice will enter the command `wget --no-proxy http://server1/cgi-bin/ip.cgi` This saves a local copy of the web page set up on the server, and by doing so generates HTTP traffic to examine. We were able to listen in on this traffic thanks to the `tcpdump` command. Then the users connected to Server1 will enter the command `cp /tmp/direct.pcap .` This will copy the file with the sniffed data into the users directory. We'll analyze what this data looks like and can tell us at a later time. However if you want to analyze this data now before we sniff more, proceed to Step 3on this page.104 Then type the command `sudo tcpdump -i eth0 -s 0 -x -w /tmp/direct.pcap` This will begin listening to the traffic that comes through this node and that specific ethernet link, eth0 in the example, write the data out to the file direct.pcap in the tmp diretory. For more help with `tcpdump` type in the command `man tcpdump` At this time, the person connected to Alice will enter the command `wget --no-proxy http://server1/cgi-bin/ip.cgi` This saves a local copy of the web page set up on the server, and by doing so generates HTTP traffic to examine. We were able to listen in on this traffic thanks to the `tcpdump` command. Then the users connected to Server1 will enter the command `cp /tmp/direct.pcap .` This will copy the file with the sniffed data into the users directory. We'll analyze what this data looks like and can tell us at a later time. However if you want to analyze this data now before we sniff more, proceed to Step 4 on this page. 101 105 [[BR]]To reiterate, the commands are: 102 106 * `sudo tcpdump -i eth0 -s 0 -x -w /tmp/direct.pcap` from the server … … 120 124 121 125 122 == Step 3Analyzing the Traffic Data ==126 == Step 4 Analyzing the Traffic Data == 123 127 So now we have collected HTTP network traffic data from 3 different connections: direct, through a proxy, and through the Tor network. Now, it's time to analyze that data. We will do this using [http://www.wireshark.org/ Wireshark]. Wireshark is a network packet analyzer, it takes captured packets (or captures its own) and then analyzes and displays the data in the packets. Displaying the information allows the Wireshark user to ensure that no harmful communication is being used against the system or to even spy on a system. To access this data we need to use the SSH Secure File Transfer Client 124 128