Changes between Version 86 and Version 87 of AnonymityModule


Ignore:
Timestamp:
Jul 6, 2011 2:41:45 PM (13 years ago)
Author:
jhudson
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • AnonymityModule

    v86 v87  
    66This has been created to be a classroom exercise to explain and demonstrate a few different techniques in active anonymity, and intercepting and making sense of web traffic.
    77Throughout this exercise you will:
    8  * Learn about various forms of anonymity and be able to decide which is best to use according to personal and logistical constraints
     8 * Learn about various forms of anonymity and tools that can be used
    99 * Use DETER to do the following:
    1010   * Set up a web server in Linux
     
    1212   * Capture web traffic using tcpdump
    1313   * Analyze that traffic using wireshark
     14 * Use the knowledge gained to determine the strengths and weaknesses of these different tools
    1415
    1516Anonymity is important because it allows two users to communicate without fear of someone eavesdropping or figuring out their location.  When two systems communicate directly, it makes it easy for someone to figure out who is talking to who and what they are saying.  This is important because it can keep large companies and organizations from collecting your information. Anonymity tools can help them communicate more securely. There are a couple of types of tools that can be used for this.     
    1617
    1718
    18 == Proxy ==
     19=== Proxy ===
    1920
    2021One method is a proxy server which works by acting as a mediator between you and the user you are communicating with.  Proxies are used to hide web traffic from the service the user is attempting to connect to.  All the data you send and all the data you receive go through it.  By connection through a proxy the user is able to camouflage his actual identity so that the service only sees the address of the proxy.  The drawback to this is that the proxy is able to see both the user and the service, so it knows the identity of both parties. This is the easiest method of anonymity but it is also the weakest.   
    2122
    2223
    23 == Onion Routing & Tor ==
     24=== Onion Routing & Tor ===
    2425The next best method is a program called Tor.  Tor takes the proxy idea and expands it using the idea of onion routing.  Onion routing is an anonymity tool which uses multiple routers to hide web traffic from the sender to the server. The web data is encrypted using layers, with each layer being removed at the subsequent routers. This means that each router can only see two parts of the traffic, the preceding node and the next node. Therefore a compromised node would not lead to the identity of either person being revealed.
    2526