+ All Categories
Home > Technology > Privacy on the Internet - Init6 InfoSec August Meeting

Privacy on the Internet - Init6 InfoSec August Meeting

Date post: 14-Jan-2015
Category:
Upload: jose-quinones
View: 354 times
Download: 1 times
Share this document with a friend
Description:
Presented by: Jose Quinones Learn about technologies that may help you maintain your privacy on the Internet.
Popular Tags:
22
Obsidis Consortia, Inc. Privacy on the Internet “This presentation is dedicated to the NSA” José L. Quiñones-Borrero, BS
Transcript
Page 1: Privacy on the Internet - Init6 InfoSec August Meeting

Obsidis Consortia, Inc.Privacy on the Internet

“This presentation is dedicated to the NSA”

José L. Quiñones-Borrero, BSMCP, MCSA, MCT, CEH, CEI, GCIH, GPEN, RHCSA

Page 2: Privacy on the Internet - Init6 InfoSec August Meeting

What is OC, Inc?

• Obsidis Consortia, Inc. [OC, Inc.] is a non-profit organization that promotes security awareness in the community and supports professional development of security professionals, students and enthusiasts in Puerto Rico.

• OC, Inc. has develop and is supporting initiatives like the Init6 Security User Group, Professional Training & Workshops, Network and Security Systems Simulation Scenarios (Capture the Flag), Security BSides Puerto Rico Conference and a Community Outreach Program.

Page 3: Privacy on the Internet - Init6 InfoSec August Meeting

How the Internet works?

Page 4: Privacy on the Internet - Init6 InfoSec August Meeting

The NSA scandal has revealed …• They can and will capture all traffic possible• All encrypted traffic is considered suspicious

and is retained indefinitely• They trace up to 3 hops/connections (people)

to and from the target.• This is not something new, don’t be naive.• The Patriot Act was extended until Dec 2017

Page 5: Privacy on the Internet - Init6 InfoSec August Meeting

…here come the technologies• Encryption– SSL/TLS/IPSec– PGP/GPG– AES/RSA/DES

• Tunneling– SSH– Tor– VPN

Page 6: Privacy on the Internet - Init6 InfoSec August Meeting

(The Onion Router)• "Onion Routing" refers to the layers of the encryption used. • The original data, including its destination, are encrypted and

re-encrypted multiple times, and sent through a virtual circuit comprising successive, randomly selected Tor relays.

• Each relay decrypts a "layer" of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the last layer of encryption and sends the original data, without revealing or even knowing its sender, to the destination.

• This method reduces the chance of the original data being understood in transit and, and conceals the routing of it

Page 7: Privacy on the Internet - Init6 InfoSec August Meeting

How does Tor works?

Page 8: Privacy on the Internet - Init6 InfoSec August Meeting

How Tor protects you from snooping

Page 9: Privacy on the Internet - Init6 InfoSec August Meeting

Cautions with Tor• Traffic on exit nodes can be captured/sniffed• Incompatible applications can bypass Tor and

reveal your location/personal information• “User” fingerprinting may be possible– User agent, OS, plugins, etc…– Client side scripting can collect valuable information

• Exit nodes should not (NEVER) be trusted

Page 10: Privacy on the Internet - Init6 InfoSec August Meeting

VPN• Protocols– PPTP (weakest)– L2TP/Ipsec– SSL

• Private VPN service– VPN service you pay for to protect your information– VPN providers are bound by its country’s laws

• OpenVPN

Page 11: Privacy on the Internet - Init6 InfoSec August Meeting

How a private VPN works

Page 12: Privacy on the Internet - Init6 InfoSec August Meeting

SSH Goodness• Remote

– ssh –R remote_port

• Static (redirect a local connection to a remote ip:port)– ssh –L local_port:remote_ip:remote_port user@host

• ssh –L 10000:10.10.10.10:80 user@host

• Dynamic (socks5)– ssh –D local_port user@host

• ssh –D 10000 user@host

• Other options• -f (sent to backgrond• -N (prevent execution on remote server• -o (send proxy command)

04/10/2023

Page 13: Privacy on the Internet - Init6 InfoSec August Meeting

Proxychains• Forces TCP applications that don’t support proxies

to go thru them• Uses proxies in config file:– /etc/proxychains.conf– socks4, socks5, http

• Simple to use– proxychains firefox http://mozilla.com– proxychains nmap -sT -p 80 1.2.3.4

04/10/2023

Page 14: Privacy on the Internet - Init6 InfoSec August Meeting

Metadata• With whom do you communicate?– Telephone, Email, Text/SMS, chat

• What is you pattern of communication?– frequency, periods of time, volume, time line

• Where do you go and go goes the same “place”?– “places” you visit

Page 15: Privacy on the Internet - Init6 InfoSec August Meeting

Immersion at MIThttps://immersion.media.mit.edu/

• Immersion presents users with a number of different perspectives of their email data.

• It provides a tool for self-reflection at a time where the zeitgeist is one of self-promotion.

• It provides an artistic representation that exists only in the presence of the visitor.

• It helps explore privacy by showing users data that they have already shared with others.

• Finally, it presents users wanting to be more strategic with their professional interactions, with a map to plan more effectively who they connect with.

Page 16: Privacy on the Internet - Init6 InfoSec August Meeting

My Work

Page 17: Privacy on the Internet - Init6 InfoSec August Meeting

My Hobbie

Page 18: Privacy on the Internet - Init6 InfoSec August Meeting

My Person

Page 19: Privacy on the Internet - Init6 InfoSec August Meeting

Always be: Paranoid!

Page 21: Privacy on the Internet - Init6 InfoSec August Meeting

More Info• Tor

– https://www.torproject.org/docs/documentation.html.en– https://www.youtube.com/watch?v=LAcGiLL4OZU– https://www.eff.org/pages/tor-and-https– http://www.aldeid.com/wiki/Tor/Usage/Nmap-scan-through-tor

• SSH– https://chamibuddhika.wordpress.com/2012/03/21/ssh-tunnelling-explained/– http://technologyordie.com/ssh-tunneling-and-proxying– https://www.youtube.com/watch?v=TEuus9-nXNY

• VPNs– http://openvpn.net/index.php/open-source/documentation/howto.html– http://www.linuxforu.com/2012/01/ipsec-vpn-penetration-testing-backtrack-too

ls/

Page 22: Privacy on the Internet - Init6 InfoSec August Meeting

Open Discussion …

Q & A


Recommended