Rauhauser, TOR and the Hacker Attack

In this PDF on “Persona Management” written and published by Neal Rauhauser in 2008, he talks about TOR…

IP Address Concealment

The most basic means of IP address concealment is to install The Onion Router (TOR) and the bundle of tools that come with it. This system is slow and it counts on endpoints that are often blocked by sites we wish to visit. A commercial VPN provider is often a better solution, so long as the vendor is chosen with care and attention is paid to the host country of the endpoint. This can be run in the virtual container or on the host OS itself.

 

The hackers attacking LeeStranahan.com were using TOR:

    Top 10 requesting IP Addresses based on count:
                COUNT:     1426 / 10.44%  IP:  37.130.227.133  HOST: torland1-this.is.a.tor.exit.server.torland.is
                COUNT:      590 / 04.32%  IP:     31.172.30.3  HOST:tor20.anonymizer.ccc.de
                COUNT:      556 / 04.07%  IP:     31.172.30.1  HOST:tor18.anonymizer.ccc.de
                COUNT:      524 / 03.84%  IP:     31.172.30.4  HOST:tor21.anonymizer.ccc.de
                COUNT:      387 / 02.83%  IP:     31.172.30.2  HOST:tor19.anonymizer.ccc.de
                COUNT:      261 / 01.91%  IP:      94.23.0.46  HOST:
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s