Today is May 16, 2022
Join Now! | Home | Sign in | FAQ | Help
Zord's Underground Archive by Zord
 
December 2016
3Mea Culpa........
4Terror At Dawn.......
8What Poverty And Suffering Does.........
10How TOR Can Be Cracked......
11What Kind Of Political Animal Am I?
15SOTT News *Is* Russian Propaganda Much Of The Time.....
20Putin As Avatar.........
21Faith Healer That Enlarges Mens Penises......
29Random Thoughts For Years End......


April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016

How TOR Can Be Cracked......
December 10, 2016

The TOR browser with its encryption systems and random servers is a really excellent way to be private on the Net. Unfortunately, it is not foolproof, which is why I

have not bothered with it. TOR can be cracked in two ways: One way is to set up a bunch of your own TOR nodes or "bot-nets", using TOR's Network encryption system in

your computer; along with using the TOR browser. Then you have a link to the systems that link to and from all of your bot-nets. You at that point can use a sniffer and

do "Address Resolution Protocol Poisoning" (aka ARP Poisoning) to set up fake "hubs" connecting all of the TOR machines coming to and from your nodes or "bot-nets." This

is a purely structural interposition based on Net architecture, no need to de-encrypt anything.... Even if the actual machine IDs, MAC numbers, or IP addresses are

encrypted, there are still ways to set up fake hubs and link to them, as long as the systems linked to your bot-nets are sending and receiving traffic. Then you can

intercept all of the encrypted data, and then use "rainbow tables" to crack the encryption. Rainbow tables do not work on all encryption algorithms, so go to wikipedia

to read about how rainbow tables work.


The other way is to link all of your fake nodes together and create websites on some of them with controversial content. This will draw visitors to your bot-net/websites

based on whatever parameters of interest you created your fake sites to be about.... Then you can use a meta-data analyzer to target systems hitting your websites; and

then identify the systems and find out at what other TOR nodes they happen to spike at frequently to find redundant patterns and lock onto the systems that are

displaying the redundancy, that at one time linked to your fake TOR nodes/websites. Once you have locked onto the systems, you can use a sniffer like above to dump the

encrypted data, and then use rainbow tables to crack the encryption, and figure out who all these people behind TOR really are. Also the directories on the Dark Web

even though they are encrypted, sometimes have weak web-crawlers that can leak information about systems in unencrypted form, and tag users. The FBI set up fake

child pornography sites and used these techniques to catch sickos who thought that TOR would protect them..... TOR is better than nothing, but even novice hackers can

crack TOR because the exploits do not require knowledge of any programming languages...... So if you use TOR, do not assume that you are safe, because you are not...

 
Login to select
your favorite journals

PrevTopNext
 
 


© Website Copyright 2016 by My-Journal.com
© Journal Content Copyright 2016 by the Author
 
Terms of Service Agreement
 
Privacy Policy