nametoolong / oregano

Man-in-the-middle against Tor bridges
GNU General Public License v3.0
25 stars 4 forks source link

MITM #2

Closed ghost closed 5 years ago

ghost commented 5 years ago

If the victim and I are in the same wlan,this tool use arp spoof to work. And break the victim's tor connection. Correct?

nametoolong commented 5 years ago

Not exactly. This tool does not include the ARP spoofing tool (roll your own using scapy) and cannot break Tor connections completely. This tool only allows you to tamper a bridge connection and do something sneaky such as the "one cell is enough" attack. Normal Tor connections validate peer identity with keys in the consensus and thus is almost impossible to break.

ghost commented 5 years ago

How about Sybil attack?

nametoolong commented 5 years ago

It is relatively difficult to mount a Sybil attack on the Tor network: it takes a considerable amount of time for a new relay to become a guard relay. Therefore, it wouldn't be worth the hassle to implement Sybil attack functionality in this tiny tool. See The lifecycle of a new relay for details. This tool is not particularly useful under most scenarios. Only when your target is connecting with vanilla bridges can it be useful, and it can only strip the outermost layer of onionskin, so it wouldn't put you to an advantageous position to deanonymize the victim, but rather help with Tor research.

ghost commented 5 years ago

Thanks for your responds.