IDENTIFICATION OF HIDDEN SERVICE ON THE ONION ROUTER NETWORK
The problem of using the TOR system irresponsibly gives a negative impression on TOR from the general public. TOR has a hidden service feature that can disguise a server from a public browser and is often abused by lawbreakers to carry out their actions. The authorities need a simple hidden se...
Saved in:
Main Author: | |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/54351 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | The problem of using the TOR system irresponsibly gives a negative impression on
TOR from the general public. TOR has a hidden service feature that can disguise a
server from a public browser and is often abused by lawbreakers to carry out their
actions. The authorities need a simple hidden service identification method, especially
to speed up the process of identifying lawbreakers and shortening the time of
investigation. This final project discusses the design of a hidden service identification
system based on the threat of the TOR system. The choice of method using weighted
scoring concludes that the tagging attack method is the most optimal choice. The
system was developed using Nmap, Kali-Linux, Proxychains, and the TOR
application and tested on Daniel Winzen's hidden service hosting site, Facebook
social media, and the Duckduckgo search engine. The system that was created could
not recognize the IP address of all test targets but was able to recognize all active
ports and applications running in the hidden service. The system managed to reach the
hidden service and communicate but was unable to identify it without direct access to
the server. Hidden services cannot be identified using the developed system. |
---|