Deanonymization - TOR Hidden Services
This article is taken from this DefCon talk:: https://www.youtube.com/watch?v=v45_tkKCJ54
Common Approaches
Hidden Service
HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:80 mhphb7utr2eqmul5mgggk5apf6dyjlldgujfvxohjiqu5pd2b7scg6qd.onionKnown Deanonymization Techniques

1. http://*.onion/server-status

2. Key Certificate

3. Search for onion address
4. GZIP Compression
5. favicon.ico matching

6. Hacking the Server
7. Downgrading the HTTP Protocol
How to Find?
Why this behavior?
The Leak


8. HTTP/1.0 400 Bad Request - Long Header

9. HTTP/1.0 403 Forbidden

10. Server Redirects
Trigger the Redirect

Trigger the Redirect and Leak the IP

11. Other Techniques - ETag
Example of ETag

12. Other Techniques - Same Network Technique
REFERENCES
Last updated