viernes, 7 de octubre de 2016
Link a la página del Exploit Pack, se puede bajar en forma gratuita.
DNS traffic is highly relevant for correlation attacks be-
cause it often traverses completely different paths and au-
tonomous systems (ASes) than the subsequent corresponding
TCP connections. An attacker that can observe occasional
DNS requests may still be able to link both ends of the
communication, even if the attacker cannot observe TCP
traffic between the exit of the anonymity network and the
server. Figure 1 illustrates how an adversary may monitor the
connection between a user and the guard relay, and between
the exit relay and its DNS resolvers or servers. This territory—
to-date, completely unexplored—is the focus of this work.