How Tor works
Everything is very simple here, first your data goes to the input (security or guard) node, then they go to the intermediate node, and then to the output node. Has anyone wondered why Tor's logo is an onion? Because in order to get to us, you must first remove all layers of encryption. The idea itself originated in 1995 with the support of the US Navy. Then a department of the US Department of Defense joined the development. The Tor network was designed to be treated with as little trust as possible by encryption.The client encrypts the data so that only the exit node can decrypt it. This data is then encrypted again so that only the intermediate node can decrypt it. And then this data is encrypted again so that only the sentinel node can decrypt it.
- The entry (or security or sentinel) node is the place where your data enters the Tor network. Moreover, not the closest node is selected, but the most reliable one, so don't be surprised if the ping is at the level of a couple of hundred milliseconds - this is all for your safety.
- Intermediate node - created specifically so that using the output node it was impossible to track the input: the most that can be tracked is just the intermediate node. The node itself usually represents a virtual server, so server operators see only encrypted traffic and nothing else.
- The exit node is the point from where your data is sent to the desired address. Again, the most reliable server is selected.
How the framework works
The main purpose of TorKill is to break or crack an onion site. I recommend using this tool with onionscan , there is already an article on the forum, from one good person. There are a few easy options to demolish a site. The first is to put it, then in the address bar we will see its real ip. The second is to find an insecure ssh fingerprint and use Shodan or Censys. The tool can do it all, including creating a trap site.
You must reply before you can see the hidden data contained here.