Notifications
Clear all

tor forensics

4 Posts
2 Users
0 Reactions
521 Views
(@sebastianorossi)
Trusted Member
Joined: 14 years ago
Posts: 85
Topic starter  

I use Tor forensics, inside my customer network. I want to protect my information.
Wich are and where are artifact made by tor? I use the tor browser, in a USB drive.
thanks


   
Quote
Passmark
(@passmark)
Reputable Member
Joined: 14 years ago
Posts: 376
 

The amount of data left depends on how Tor was used.

If you run it from a live CD, then almost no trace will be left. You might be able to identify that the machine was rebooted, but not much else unless there is external logging of the network activity via a gateway of some sort.

If you have installed it (and then uninstalled it) in Windows then a large number of records are left in the registry and in the file system.


   
ReplyQuote
(@sebastianorossi)
Trusted Member
Joined: 14 years ago
Posts: 85
Topic starter  

thanks, i will study the link.
Actually, if you download tor browser from EFF, you must only unzip it. You can put it on a USB drive. Which are the artifacts? And if someone is sniffing the network traffic, what can see?
thanks


   
ReplyQuote
Passmark
(@passmark)
Reputable Member
Joined: 14 years ago
Posts: 376
 

I think Tor uses TLS (so it will be encrypted traffic) on IP ports 9001 and 9030.


   
ReplyQuote
Share: