Tor forensics involves investigating activities conducted over the Tor network, identifying hidden services, and analyzing artifacts related to anonymized browsing or illicit activities.
Techniques & Tools:
- Preserve Evidence
- Securely collect system images, network traffic captures, and logs from devices suspected of Tor usage.
- Identify Tor Artifacts
- Search for Tor browser installations, usage logs, configuration files (e.g., torrc), and traces of .onion domains in browsing history.
- Analyze Network Traffic
- Examine captured traffic for patterns of Tor usage, such as connections to Tor entry nodes and relay servers.
- Analyze Hidden Services
- Investigate .onion URLs and interactions with dark web sites using tools for intelligence gathering and mapping.
- Perform OS and Memory Forensics
- Extract RAM and analyze for Tor-related processes, URLs, or decryption keys.