Forensics in Spanish
Navegación Anónima - Reto para investigadores forenses Nov 24 2006 07:46PM
Jeimy José Cano Martínez (jcano uniandes edu co) (2 replies)
Re: Navegación Anónima - Reto para investigadores forenses Dec 05 2006 07:05PM
Javier Pagès (boletines javierpages com)
Re: Navegación Anónima - Reto para investigadores forenses Dec 02 2006 01:55AM
Raul Siles (raul siles gmail com) (1 replies)
Jeimy,
remito información de un artículo relacionado, en el que se comenta como,
configurando tu propio router Tor, podrías saber quién está navegando a
través de él. De esta forma, un investigador forense, con control de un
nodo, podría conocer la identidad de los navegantes de ese nodo:
http://www.packetstormsecurity.org/0610-advisories/Practical_Onion_Hacki
ng.pdf

¡Anti-anti-forensics! ;-D

Un saludo,
Raúl Siles

On 11/24/06, Jeimy José Cano Martínez <jcano (at) uniandes.edu (dot) co [email concealed]> wrote:
>
>
>
> Estimados profesionales,
>
> Remito reciente artículo donde detallan elementos y herramientas para
> navegar de
> manera anónima. Un reto bien interesante para los investigadores forenses.
>
> http://www.unixreview.com/documents/s=10104/ur0611g/
> (...)
> The Tor network is an intriguing concept: build a bunch of servers around
> the
> Internet to route traffic through so that your connections can't be
> traced. Why
> would you want to do that? Well, for several reasons, like you don't want
> your
> web activity being traced by marketing people or spammers so they can come
> back
> and get you later. The really cool thing about Tor is that it's not a
> hosted
> service; it's a free toolset so that people can set up their own to help
> support the project and share their bandwidth.
> (...)
>
>
> Jeimy J. Cano, Ph.D, CFE
> Universidad de los Andes
> Bogota, D.C
> COLOMBIA
>
> Editor of "Critical Reflections on Information Systems. A systemic
> approach"
> http://www.idea-group.com/books/details.asp?id=507
>
>
> ------------------------------------------------------------------------
--------
> Este correo y su contenido son confidenciales y exclusivos para su
> destinatario. Si usted recibe este mensaje por error o no es el
> destinatario
> del mismo, por favor sírvase eliminarlo y notificarle a su originador. Así
> mismo, todas las ideas y reflexiones expresadas en esta comunicación
> corresponden al originador del correo y NO representa la posición oficial
> de su
> empleador.
>
> ------------------------------------------------------------------------
--------
> This email is intended only for the addressee(s) and contains information
> which
> may be confidential, legally privileged. If you are not intended recipient
> please do not save, forward, disclose or copy the content of this email.
> Please
> delete it completely from your system and notify originator.Finally, all
> ideas expressed in this communication are personal comments and NOT
> represent
> official position of his employer.
>
> ------------------------------------------------------------------------
--------
>
Jeimy,<br>remito información de un artículo relacionado, en el que se comenta como, configurando tu propio router Tor, podrías saber quién está navegando a través de él. De esta forma, un investigador forense, con control de un nodo, podría conocer la identidad de los navegantes de ese nodo:
<br><a href="http://www.packetstormsecurity.org/0610-advisories/Practical_Onion
_Hacking.pdf">http://www.packetstormsecurity.org/0610-advisories/Practic
al_Onion_Hacking.pdf</a><br><br>¡Anti-anti-forensics! ;-D<br><br>Un saludo,
<br>Raúl Siles<br><br><div><span class="gmail_quote">On 11/24/06, <b class="gmail_sendername">Jeimy José Cano Martínez</b> <<a href="mailto:jcano (at) uniandes.edu (dot) co [email concealed]">jcano (at) uniandes.edu (dot) co [email concealed]</a>> wrote:</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<br><br>Estimados profesionales,<br><br>Remito reciente artículo donde detallan elementos y herramientas para navegar de<br>manera anónima. Un reto bien interesante para los investigadores forenses.<br><br><a href="http://www.unixreview.com/documents/s=10104/ur0611g/">
http://www.unixreview.com/documents/s=10104/ur0611g/</a><br>(...)<br>The
Tor network is an intriguing concept: build a bunch of servers around the<br>Internet to route traffic through so that your connections can't be traced. Why
<br>would you want to do that? Well, for several reasons, like you don't want your<br>web activity being traced by marketing people or spammers so they can come back<br>and get you later. The really cool thing about Tor is that it's not a hosted
<br>service; it's a free toolset so that people can set up their own to help<br>support the project and share their bandwidth.<br>(...)<br><br><br>Jeimy J. Cano, Ph.D, CFE<br>Universidad de los Andes<br>Bogota, D.C<br>COLOMBIA
<br><br>Editor of "Critical Reflections on Information Systems. A systemic approach"<br><a href="http://www.idea-group.com/books/details.asp?id=507">http://www.ide
a-group.com/books/details.asp?id=507</a><br><br>
------------------------------------------------------------------------
--------<br>Este correo y su contenido son confidenciales y exclusivos para su<br>destinatario. Si usted recibe este mensaje por error o no es el destinatario
<br>del mismo, por favor sírvase eliminarlo y notificarle a su originador. Así<br>mismo, todas las ideas y reflexiones expresadas en esta comunicación<br>corresponden al originador del correo y NO representa la posición oficial de su
<br>empleador.<br>------------------------------------------------------
--------------------------<br>This email is intended only for the addressee(s) and contains information which<br>may be confidential, legally privileged. If you are not intended recipient
<br>please do not save, forward, disclose or copy the content of this email. Please<br>delete it completely from your system and notify originator.Finally, all<br>ideas expressed in this communication are personal comments and NOT represent
<br>official position of his employer.<br>-----------------------------------------------------------
---------------------<br></blockquote></div><br>

[ reply ]
Re: Navegación Anónima - Reto para investigadores forenses Dec 03 2006 09:42PM
Jeimy José Cano Martínez (jcano uniandes edu co)


 

Privacy Statement
Copyright 2010, SecurityFocus