[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

Tor

Tor is free software for enabling anonymous communication. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays.

Share tech news, updates, or what's on your mind.

Sign up to Post

Our users are MFA'd but Azure reports: "Sign-ins from IP addresses that are anonymous, such as Tor IP addresses."

How is that possible?

I have 3 different users reporting this for location = Chelsea, NY, USA

YIKES!!!
0
Bootstrap 4: Exploring New Features
LVL 12
Bootstrap 4: Exploring New Features

Learn how to use and navigate the new features included in Bootstrap 4, the most popular HTML, CSS, and JavaScript framework for developing responsive, mobile-first websites.

We have been receiving alerts that a domain controller and other hosts have been communicating on port 9001 and 9030.  From a security perspective this is a concern as these are not standard ports and have been tied to tor relay ports.

The question is whether there are any known or valid services or benign reasons that would use ports 9001 or 9030 in a windows environment be it a DC or server 2008/2012/2016?
0
SADD: Scalable Anonymous Disposable Desktops or simply put SADD.IO, is a free web-based product that allows users to anonymously control self-disposing, Tor routed desktops through their web browser.

Users do not have to enter any personal information about themselves to use this service. Nor do users have to download any external programs. SADD.IO is accessible from your phone, laptop, iPad, you name it.
       How does it work?
When a user navigates to the SADD.IO website and clicks the “Try for Free” or “Use Premium” button, a Virtual Machine (VM) or desktop is generated and routed through Tor. The user is then able to control this desktop as if it were their own computer. At the end of the user session the Virtual Machine is forensically destroyed.
0
I am a heavy Twitter user and now I am hearing that the Indian government is hiring data experts and buying a surveillance/spy software to find people's whereabouts like in China. Because they don't like the dissent. There are many activists out there (myself included) who would like to be secured to the hilt against this new government spying software too.

What should I do beside running TOR.
Can they trace my phone number?

Any answer would be appreciated.

Vic
1
Good afternoon All

I am looking for community help to get me started on a Dell PowerConnect X4012 (2switch stack) configuration for 3 Dell XC servers with Nutanix on them.  I also have a TOR switch stack of 2 x Dell 3024 switches.  I have found in the past best practice documents for configuring Dell kit for VMware but I can't find anything conclusive for the above.

What vlans am I going to require for Nutanix AHV HCI?  

Any help gratefully received.

Thanks
0
When i try to search using the Tor Browser opening screen, I receive a "Secure Connection Failed" error no matter what I try in the address bar
This is using the latest 7.5
Any solutions, ideas?
1
I am a Cyber Security major. I'm fascinated by dark net sites and I wanted to start learning Tor so I decided to start a tor hidden service. I have two questions
1. When I connect to the Tor Hidden Service in the Tor browser it displays my server's IP Address after the page loads. Why is this happening and how do I stop it?
2. How do I configure the server so that someone connecting to the server's IP Address won't be served web pages? I was thinking about using a firewall but I thought that may block the Tor Hidden service.

Also recommendations on what to read to learn Tor and get better would be helpful.

Thanks
0
Hello,

I have found myself in serious problems with the police as I have been accused of hacking my ex partners internet - I can categorically say I have not.

I received an Android Manifest from my ex - which I accepted out of ignorance. The next day Spybot and Droidsheep appeared on my system and there was a Google takeout that appeared on my machine from her g-mail account - the same day.

The police are saying that I initiated this and I cannot prove otherwise! They say the have contacted Andreas Koch - the inventor of Droidsheep and he said it could only be downloaded by the owner of the phone/computer - numerous articles I have read on the net say it can be downloaded through many sources without my consent.

Since the Spybot and Droidsheep/W32 download, I have been hacked over 30 times and have even got a Brutus cracker which has appeared and they say I was trying to crack her password - I dont even know where this has come from!

Could you please, if you can, clarify Droidsheep and Spybot can be introduced onto my system, through the acceptance of an Android Manifest accepted request and can it activate programmes such as Brutus!

I would be prepared to pay for an official report. It is me who has had money stolen from my bank - along with the 30 hacks, accused of hacking - which I do not have the technical knowledge to defend. In my opinion, it was the acceptance of the Android Manifest request that has caused all this - but again I do not have the …
0
I am looking for a very good web designer and knowledgeable SEO guy to help me in setting up a successful e-commerce business, please contact me at incool8@vistomail.com
Thank you
0
LVL 21

Administrative Comment

by:Andrew Leniart
Hi Orazio,

Welcome to Experts Exchange.

What you have done is made a "Post" here, which is more for the purpose of sharing your thoughts amongst the Experts Exchange community.  

To reach out to our expert's for help, you will be better off to "Ask a Question" so that more experts are able to see that you need help. Click the Big blue button near the top of your screen.

Ask a Question

The following link also explains more about asking for help at Experts Exchange..
http://support.experts-exchange.com/customer/portal/articles/336330

Hope that's helpful.

Regards,
Andrew
EE Topic Advisor
0
LVL 8

Expert Comment

by:Craig Kehler
We also offer Careers and Gigs products to assist with hiring for full-time or contract work. You will find these options under Products in the header.
2
i want use this command on my Python script :

 killall tor  && service tor start 

Open in new window

  How can i do it on Python ?
0
OWASP: Forgery and Phishing
LVL 12
OWASP: Forgery and Phishing

Learn the techniques to avoid forgery and phishing attacks and the types of attacks an application or network may face.

Is there a way that I can reset the admin password for this because someone changed it and did not document it so we cant login in..
What can I do tor reset this?
0
We are trying to create an office 365 conne tor for our applications and printers, im using the below article from Microsoft as a refference, and the requirement of that connector that a public ip should be available, so my question should i have a public ip for each app or printer i will configure or it will be one for all? also that IP will be added to the firewall or directly on the server, how i will added?

https://support.office.com/en-us/article/How-to-set-up-a-multifunction-device-or-application-to-send-email-using-Office-365-69f58e99-c550-4274-ad18-c805d654b4c4


Thanks.
0
Dear All,

What is the meaning of Anonymizing Traffic in a SIEM. Does it mean some users are using Tor related applications?

Thanks,
T
0
Whats Tor browser and will it cause any indues on my Mac ~ El Capitan?

Where can I get it and what should I know before using it?

Thanks
0
Read an article regarding recommendation on using Tor and found in that Windows is not recommended for Tor.  Within the article it is recommended to use Whonix not Windows.

Pixhttp://www.hongkiat.com/blog/do-donts-tor-network/

In the article it says "That is why you shouldn’t be browsing websites through Tor on Windows systems".

If we install Whonix in one of our Windows 10 Hyper-v VM, and run Tor from there, not from Windows, will it still not the best choice?
(We understand since it's still under the W10 then it's the same recommendation of the article but we wanted EE insight)
0
I'm seeing something in a SIEM that I can't seem to wrap my head around. I have an internet facing ASA that is configured to deny spoofed IP addresses (I don't manage these devices). Shortly after feeding syslog events from this device into the SIEM, I started seeing "Traffic from Tor Exit Node" and "Deny IP Spoof" events in the SIEM. I bring up both items as I'm not sure if they're related.

Anyway, when I look at "Traffic from Tor Exit Node" events where the source IP is the known Tor exit node (most of them), there is no corresponding destination IP address or destination port. I've crafted a few stories in my head involving nmap scans through Tor but I can't convince myself of anything I've come up with. Anyone have a plausible explanation?

Thanks,
TR
0
some one has been hacking my mail id i want to find out . please send me solution as to how to identify sender through email headers.
0
Just over two weeks ago, a client of mine had a Cryptowall 3.0 infection, starting from a workstation. It was quickly contained, and we restored from backup, and all is well now. One residual side effect caught me completely off guard, however.

Every Windows workstation on the domain began having the help_decrypt files launch at startup. We found those files in the startup folders on the local C drives of the workstations, as well as in many other folders on C. No files on any of those computers were encrypted, however.

I have never seen nor heard of a crypto variant showing this behavior. Did it find the C$ shares on the network?
0

Tor

Tor is free software for enabling anonymous communication. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays.

Top Experts In
Tor
<
Monthly
>