Full Disclosure mailing list archives
Re: Tor anonymizing network Compromised by French researchers
From: Travis Biehn <tbiehn () gmail com>
Date: Tue, 8 Nov 2011 12:45:35 -0500
I think these details released are in line with our understanding of the attack: a) Enumerate network (by trying routes, or reading the broadcast list.) b) Scan the nodes c) Hack the vulnerable ones, installing malware, and/or add your own malicious nodes d) DOS the un-comprimized nodes, forcing network traffic to the attacker controlled nodes The only things that seem like they could be of value are the malicious node used to support traffic correlation and the alluded to TCP-Reset attack (which is probably just a syn flood). The rest is hype, you are safe to use Tor as usual. If you are worried about using Tor, grab a list of exit nodes and try to hack them yourself. -Travis On Tue, Nov 8, 2011 at 10:47 AM, not here <zpamh0l3 () gmail com> wrote:
That's a followUp! TOR Attack isn't hype, and on 10th of november, mayhem will be released don't troll, you fool. http://cvo-lab.blogspot.com/2011/11/tor-attack-technical-details.html ------------------------------------------------------------------------------------------------- "Rumors of Tor's compromise are greatly exaggerated" https://blog.torproject.org/blog/rumors-tors-compromise-are-greatly-exaggerated [[ Mohit Kumar ]] @ [[ 24/10/2011 16:31 ]]--------------------------------------------------French researchers from ESIEA <http://www.esiea.fr/c/en/Web.Esiea.Public.cuke?>, a French engineering school, have found and exploited some serious vulnerabilities in the TOR network. They performed an inventory of the network, finding 6,000machines, many of whose IPs are accessible publicly and directly withthe system’s source code. They demonstrated that it is possible to take control of the network and read all the messages that circulate.But there are also hidden nodes, the Tor Bridges, which are provided bythe system that in some cases. Researchers have developed a script that, once again, to identify them. They found 181. "/We now have a complete picture of the topography ofTor/," said Eric Filiol. Read More at "The Hacker News" --http://thehackernews.com/2011/10/tor-anonymizing-network-compromised-by.html-- *Regards,* *Owner,* *The Hacker News <http://www.thehackernews.com/>* *Truth is the most Powerful weapon against Injustice.* _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
-- Twitter <https://twitter.com/tbiehn> | LinkedIn<http://www.linkedin.com/in/travisbiehn>| GitHub <http://github.com/tbiehn> | TravisBiehn.com<http://www.travisbiehn.com>
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: Tor anonymizing network Compromised by French researchers not here (Nov 08)
- Re: Tor anonymizing network Compromised by French researchers Travis Biehn (Nov 08)
- Re: Tor anonymizing network Compromised by French researchers Neusbeer (Nov 08)
- Re: Tor anonymizing network Compromised by French researchers Jeffrey Walton (Nov 17)