In this section, we will be exploring two important tools that are utilized by attackers to maintain their anonymity on a network: Tor and Privoxy.
Tor (www.torproject.org) is an open source implementation of third-generation onion routing that provides free access to an anonymous proxy network. Onion routing enables online anonymity by encrypting user traffic and then transmitting it through a series of onion routers. A layer of encryption is removed by each router to obtain routing information, and the message is then transmitted to the next node. This has been likened to the process of gradually peeling an onion, hence the name. It protects against traffic analysis attacks by guarding the source and ...