Date post: | 14-Jan-2015 |
Category: |
Technology |
Upload: | jose-quinones |
View: | 354 times |
Download: | 1 times |
Obsidis Consortia, Inc.Privacy on the Internet
“This presentation is dedicated to the NSA”
José L. Quiñones-Borrero, BSMCP, MCSA, MCT, CEH, CEI, GCIH, GPEN, RHCSA
What is OC, Inc?
• Obsidis Consortia, Inc. [OC, Inc.] is a non-profit organization that promotes security awareness in the community and supports professional development of security professionals, students and enthusiasts in Puerto Rico.
• OC, Inc. has develop and is supporting initiatives like the Init6 Security User Group, Professional Training & Workshops, Network and Security Systems Simulation Scenarios (Capture the Flag), Security BSides Puerto Rico Conference and a Community Outreach Program.
How the Internet works?
The NSA scandal has revealed …• They can and will capture all traffic possible• All encrypted traffic is considered suspicious
and is retained indefinitely• They trace up to 3 hops/connections (people)
to and from the target.• This is not something new, don’t be naive.• The Patriot Act was extended until Dec 2017
…here come the technologies• Encryption– SSL/TLS/IPSec– PGP/GPG– AES/RSA/DES
• Tunneling– SSH– Tor– VPN
(The Onion Router)• "Onion Routing" refers to the layers of the encryption used. • The original data, including its destination, are encrypted and
re-encrypted multiple times, and sent through a virtual circuit comprising successive, randomly selected Tor relays.
• Each relay decrypts a "layer" of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the last layer of encryption and sends the original data, without revealing or even knowing its sender, to the destination.
• This method reduces the chance of the original data being understood in transit and, and conceals the routing of it
How does Tor works?
How Tor protects you from snooping
Cautions with Tor• Traffic on exit nodes can be captured/sniffed• Incompatible applications can bypass Tor and
reveal your location/personal information• “User” fingerprinting may be possible– User agent, OS, plugins, etc…– Client side scripting can collect valuable information
• Exit nodes should not (NEVER) be trusted
VPN• Protocols– PPTP (weakest)– L2TP/Ipsec– SSL
• Private VPN service– VPN service you pay for to protect your information– VPN providers are bound by its country’s laws
• OpenVPN
How a private VPN works
SSH Goodness• Remote
– ssh –R remote_port
• Static (redirect a local connection to a remote ip:port)– ssh –L local_port:remote_ip:remote_port user@host
• ssh –L 10000:10.10.10.10:80 user@host
• Dynamic (socks5)– ssh –D local_port user@host
• ssh –D 10000 user@host
• Other options• -f (sent to backgrond• -N (prevent execution on remote server• -o (send proxy command)
04/10/2023
Proxychains• Forces TCP applications that don’t support proxies
to go thru them• Uses proxies in config file:– /etc/proxychains.conf– socks4, socks5, http
• Simple to use– proxychains firefox http://mozilla.com– proxychains nmap -sT -p 80 1.2.3.4
04/10/2023
Metadata• With whom do you communicate?– Telephone, Email, Text/SMS, chat
• What is you pattern of communication?– frequency, periods of time, volume, time line
• Where do you go and go goes the same “place”?– “places” you visit
Immersion at MIThttps://immersion.media.mit.edu/
• Immersion presents users with a number of different perspectives of their email data.
• It provides a tool for self-reflection at a time where the zeitgeist is one of self-promotion.
• It provides an artistic representation that exists only in the presence of the visitor.
• It helps explore privacy by showing users data that they have already shared with others.
• Finally, it presents users wanting to be more strategic with their professional interactions, with a map to plan more effectively who they connect with.
My Work
My Hobbie
My Person
Always be: Paranoid!
Please visit us to keep in touch …www.ObsidisConsortia.org
www.BSidesPR.org
https://www.youtube.com/channel/UCtpOw0dKOIVJu7JZqHx4oQghttps://plus.google.com/u/0/communities/102771209982001396923
https://facebook.com/obsidisconsortiahttps://twitter.com/BSidesPR
Affiliates:www.TalktoanIT.comwww.codefidelio.org
www.darkoperator.com
More Info• Tor
– https://www.torproject.org/docs/documentation.html.en– https://www.youtube.com/watch?v=LAcGiLL4OZU– https://www.eff.org/pages/tor-and-https– http://www.aldeid.com/wiki/Tor/Usage/Nmap-scan-through-tor
• SSH– https://chamibuddhika.wordpress.com/2012/03/21/ssh-tunnelling-explained/– http://technologyordie.com/ssh-tunneling-and-proxying– https://www.youtube.com/watch?v=TEuus9-nXNY
• VPNs– http://openvpn.net/index.php/open-source/documentation/howto.html– http://www.linuxforu.com/2012/01/ipsec-vpn-penetration-testing-backtrack-too
ls/
Open Discussion …
Q & A