EssayGhost Assignment代写,Essay代写,网课代修,Quiz代考

EssayGhost-Essay代写,作业代写,网课代修代上,cs代写代考

一站式网课代修,论文代写

高质量的Assignment代写、Paper代写、Report代写服务

EG1hao
网课代修代上,cs代写代考
Python代写
您的位置: 主页 > 编程案例 > Python代写 >
代做Python:网络安全Anonymity代写 Assignment 5: Anonymity - Python代做
发布时间:2021-07-25 15:33:05浏览次数:
(5) Use mitmproxy to record a ow for a site you re visiting (i.e., lter for just the tra c for the site itself, not third parties). Save the dump as `dump_1.  Now do the same for a third party advertiser  oranalytics company on a  Create a text dump of the third party ow as well, and save it as`dump_2. Now search the text for something you nd interesting, and record it in `auditing. You will submit these les for this section: your tor con guration le, `tor_getinfo.py, and `geo. 1 Or a similar service. These instructions don t assume anything about the VPS provider other than that it allows you to run a Linux instance.2 Thanks to Maximilian Golla at RUB for sharing the questions in sections 3.2 and 3.3 below, which I have modi ed for ourpurposes.2.1 Onion ProxyIn this exercise we learn to interact with the onion proxy (OP) running on your client, and get information  from it.(10)Open the control port of the Tor daemon using the Tor con guration 3    Then, write a python script  called   tor_getinfo.py   that  uses  Stem  to  get  information  about  your  Tor  connections.4      You must include detailed comments in this script explaining what each signi cant part is doing.List the nodes used, with the IP-address and the ngerprint for each open Tor connection. Use the GeoIP Database5   to  nd the locations of your Tor nodes.  Record this in the `geo   le, comma separated, with one line per node.2.2 Specifying parts of the circuitTor allows to de ne the entry and exit nodes by modifying the con g le torrc. It is your task to use the following entry and exit nodes, which are identi ed by  ngerprints.6Guard nodes:D529E870E7CCFCDA2CFEE9D317A8DC6E85497FDAC38286764201C7F0CDCC928ED59F2180F067C49DExit nodes:E4D1F25DFBE484208866BA4A1A958B73127CB0ADE6FAC9A7F33EE66F03C55C119770B2D45D3C576BAnswer the following questions in a le called `tor_node_selection. (10) List the nodes used, with the IP-address and the ngerprint for each open Tor connection anduse the GeoIP Database7   to  nd the location of your no(5) How does a strict selection of the Tor exit and entry nodes in uence the anonymity of the connec- tion?(5)Is it possible to exclude nodes? When should this be done?2.3 Tor BridgesBridges are Tor relays that are not listed in the main Tor directory. Since there is no complete public list of them, even if your ISP (Internet Service Provider) is ltering connections to all the known Tor relays, they probably would not be able to block all the bridges. If you suspect your access to the Tor network is being blocked, you may want to use the bridge feature of Tor. It is your task to establish a connection to the Tor network via a bridge.83 The documentation can be found at https://www.torproject.org/docs/tor-manual.html.en.(10) Get a bridge that you can use to connect to the Tor network and give its IP,  port and  ngerprint.  How did you get these pieces of information? What are other methods to get a bridge (be sure to list themall)?4 Stem documentation is at https://stem.torproject.org/.5 Found at https://www.maxmind.com/en/geoip-demo6 See footnote 3 above for the documentation.7 See the link in footnote 5.8 See https://www.torproject.org/docs/bridges.html.en(5) In which situations is the application of bridges useful? Does the method to get a bridge that you chose before work in suchsituations?2.4 Set up a Tor hidden serviceYour next task is to set up a hidden service on the Tor network.(20) Using  your  VPS,  install  tor,  and  set  up  a  hidden  service  using  the  tor  documen9        On your local computer, use the tor browser to visit your site (the address is found in $HOME/hid- den_service/hostname). This site will need to remain available until you have received a grade for this assignment (not more than one week from the submission deadline). Turn in the onion address for your working hidden service in a le called  hidden_service_address .Please answer the following questions about hidden services:(5)How is the service hidden, e., why can users not reveal the location of the service (in the network) and still use it?(5) Is there a way to still reveal information about the operators or the location of a hidden service? Monitorthe connections to your hidden service (e.g., by watching the access log le).(5) Can you distinguish between di erent users? Would this be di erent if your service was not a hidden service (and still accessed viaTor)?9 See https://www.torproject.org/docs/tor-hidden-service.html.en最先出自Essayghost python代写   it代写合作:315代写

所有的编程代写范围:essayghost为美国、加拿大、英国、澳洲的留学生提供C语言代写、代写C语言、C语言代做、代做C语言、数据库代写、代写数据库、数据库代做、代做数据库、Web作业代写、代写Web作业、Web作业代做、代做Web作业、Java代写、代写Java、Java代做、代做Java、Python代写、代写Python、Python代做、代做Python、C/C++代写、代写C/C++、C/C++代做、代做C/C++、数据结构代写、代写数据结构、数据结构代做、代做数据结构等留学生编程作业代写服务。