Changes between Version 82 and Version 83 of AnonymityModule


Ignore:
Timestamp:
Jul 6, 2011 2:29:47 PM (13 years ago)
Author:
jhudson
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • AnonymityModule

    v82 v83  
    22= An Exercise in Anonymity =
    33
    4 == Background ==
     4== Introduction ==
    55
    66This has been created to be a classroom exercise to explain and demonstrate a few different techniques in active anonymity, and intercepting and making sense of web traffic.
    77Throughout this exercise you will:
     8 * Learn about various forms of anonymity and be able to decide which is best to use according to personal and logistical constraints
    89 * Set up a web server in Linux
    910 * Set up a proxy server
    1011 * Capture web traffic using tcpdump
    11  * Analyze that traffic using wireshark
    12  * Learn about various forms of anonymity and be able to decide which is best to use according to personal and logistical constraints
     12 * Analyze that traffic using wireshark
     13
     14Anonymity is important because it allows two users to communicate without fear of someone eavesdropping or figuring out their location.  When two systems communicate directly, it makes it easy for someone to figure out who is talking to who and what they are saying.  This is important because it can keep large companies and organizations from collecting your information. Anonymity tools can help them communicate more securely. There are a couple of types of tools that can be used for this.  One is a proxy server which works by acting as a mediator between you and the user you are communicating with.  All the data you send and all the data you receive go through it.  This is the easiest method of anonymity but it is also the weakest.  The next best method is a program called Tor.  Tor takes the proxy idea and expands it.  It runs all your data through 3 or more relay systems before it sends it to the destination. 
    1315
    1416