IDENTIFICATION OF HIDDEN SERVICE ON THE ONION ROUTER NETWORK

The problem of using the TOR system irresponsibly gives a negative impression on TOR from the general public. TOR has a hidden service feature that can disguise a server from a public browser and is often abused by lawbreakers to carry out their actions. The authorities need a simple hidden se...

Full description

Saved in:
Bibliographic Details
Main Author: Wiku Yudistira, Fadhil
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/54351
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
Description
Summary:The problem of using the TOR system irresponsibly gives a negative impression on TOR from the general public. TOR has a hidden service feature that can disguise a server from a public browser and is often abused by lawbreakers to carry out their actions. The authorities need a simple hidden service identification method, especially to speed up the process of identifying lawbreakers and shortening the time of investigation. This final project discusses the design of a hidden service identification system based on the threat of the TOR system. The choice of method using weighted scoring concludes that the tagging attack method is the most optimal choice. The system was developed using Nmap, Kali-Linux, Proxychains, and the TOR application and tested on Daniel Winzen's hidden service hosting site, Facebook social media, and the Duckduckgo search engine. The system that was created could not recognize the IP address of all test targets but was able to recognize all active ports and applications running in the hidden service. The system managed to reach the hidden service and communicate but was unable to identify it without direct access to the server. Hidden services cannot be identified using the developed system.