Posts Tagged ‘Tor’

Symantec CorpSymantec reported the detection of an attack on a popular hosting “Freedom Hosting”, which provides anonymous hosting service through a network of Tor. On the page of the service have been detected malicious scripts that allow attackers to intercept user data network Tor. As a result, questioned the anonymity of the hosting center – in fact with the help of malicious programs can track the user’s location.

August 4 at the sites hosted on hosting Freedom Hosting, allows access through a network of Tor, were found malicious scripts. Discovered scripts use the vulnerability, found in the browser Firefox, which has already been fixed in Firefox 22 and Firefox 17.0.7 ESR (Extended Support Release). Most likely, this vulnerability has been chosen because it set to work with a network of Tor Browser Bundle (TBB) is based on the Firefox ESR 17. Symantec products are defined these scripts as Trojan.Malscript! Html. (more…)

Amnesic Incognito Live System

Amnesic Incognito Live System

Release of Linux Tails0.18, theAmnesic Incognito Live System (Live CD, Live USB)

Presented release of a specialized Linux-distribution Tails (The Amnesic Incognito Live System) 0.18, based on the Debian package base and designed to provide anonymous access to the network.

Distribution formed as Live-system enabling of the box to ensure the maximum level of security and anonymity. When booting from USB-drive mode is supported for saving user data between runs distribution. The size of the boot iso-image (torrent) 861 MB. (more…)

Tor logoTor – a system that allows anonymous establish a network connection that is protected from eavesdropping

A set of tools for a wide range of users who want to make the web a safer and more reliable. Tor provides the foundation for a range of applications to exchange information over public networks without compromising with privacy.

Using Tor can help anonymize the use of a web browser, instant messaging, IRC, SSH, and other applications that use TCP.

Tor works on the principle of choosing a random path, which greatly reduces the probability of interception and analysis of user traffic. Tor also provides a platform on which developers can build applications with built-in privacy features. (more…)


Security Bypass in Tor

Vulnerability: Security Bypass in Tor

Danger: Low
Number of vulnerabilities: 1
Vector operation: Remote

Impact: Security Bypass
Exploit: PoC code

Affected products: Tor Browser Bundle for Windows 2.x

Affected versions: Tor 2.2.39-5, possibly other versions


Which can be exploited by malicious people to disclose sensitive data on the target system. (more…)