Go Premium for a chance to win a PS4. Enter to Win

x

Tor

Tor is free software for enabling anonymous communication. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hello,

I have found myself in serious problems with the police as I have been accused of hacking my ex partners internet - I can categorically say I have not.

I received an Android Manifest from my ex - which I accepted out of ignorance. The next day Spybot and Droidsheep appeared on my system and there was a Google takeout that appeared on my machine from her g-mail account - the same day.

The police are saying that I initiated this and I cannot prove otherwise! They say the have contacted Andreas Koch - the inventor of Droidsheep and he said it could only be downloaded by the owner of the phone/computer - numerous articles I have read on the net say it can be downloaded through many sources without my consent.

Since the Spybot and Droidsheep/W32 download, I have been hacked over 30 times and have even got a Brutus cracker which has appeared and they say I was trying to crack her password - I dont even know where this has come from!

Could you please, if you can, clarify Droidsheep and Spybot can be introduced onto my system, through the acceptance of an Android Manifest accepted request and can it activate programmes such as Brutus!

I would be prepared to pay for an official report. It is me who has had money stolen from my bank - along with the 30 hacks, accused of hacking - which I do not have the technical knowledge to defend. In my opinion, it was the acceptance of the Android Manifest request that has caused all this - but again I do not have the …
0
Free Tool: ZipGrep
LVL 11
Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

I'm seeing something in a SIEM that I can't seem to wrap my head around. I have an internet facing ASA that is configured to deny spoofed IP addresses (I don't manage these devices). Shortly after feeding syslog events from this device into the SIEM, I started seeing "Traffic from Tor Exit Node" and "Deny IP Spoof" events in the SIEM. I bring up both items as I'm not sure if they're related.

Anyway, when I look at "Traffic from Tor Exit Node" events where the source IP is the known Tor exit node (most of them), there is no corresponding destination IP address or destination port. I've crafted a few stories in my head involving nmap scans through Tor but I can't convince myself of anything I've come up with. Anyone have a plausible explanation?

Thanks,
TR
0
Just over two weeks ago, a client of mine had a Cryptowall 3.0 infection, starting from a workstation. It was quickly contained, and we restored from backup, and all is well now. One residual side effect caught me completely off guard, however.

Every Windows workstation on the domain began having the help_decrypt files launch at startup. We found those files in the startup folders on the local C drives of the workstations, as well as in many other folders on C. No files on any of those computers were encrypted, however.

I have never seen nor heard of a crypto variant showing this behavior. Did it find the C$ shares on the network?
0

Tor

Tor is free software for enabling anonymous communication. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays.

Top Experts In
Tor
<
Monthly
>