Sunday, November 17, 2024
HomeInfosec- ResourcesShare Your Files Anonymously Using TOR and Onion Share

Share Your Files Anonymously Using TOR and Onion Share

Published on

There is a bunch of reasons why people may look to share records anonymously, with the principal that rings a bell being the situation of informants or political activists attempting to keep up a strategic distance from abuse.(TOR)

As we know there are various ways which you can share documents on the web. Google Drive, Dropbox, and other cloud storage choices are among the primary inclinations.Yet, these record sharing choices miss the mark with respect to anonymity.

Also Read:  Secrets of Dark Web – How to Access Dark Web Safely

- Advertisement - SIEM as a Service

OnionShare

OnionShare lets you safely and anonymously share records of any size. It works by beginning a web server, making it open as a Tor onion service, and producing an unguessable URL to get to and download the records.

It doesn’t need setting up a server on the web some place or utilizing an outsider filesharing service. You have the record all alone PC and use a Tor onion service to make it incidentally available over the web.

The other client simply needs to use Tor Browser to download the record from you.

OnionShare is a free P2P file sharing service created by technologist Micah Lee that operates without intermediator.

How to use Onion Share

  • You can download OnionShare from its official site. It is accessible for Windows, MacOS, and Linux working frameworks.
  • Before you can share documents, you have to open Tor Browser in Background. This will give the Tor service that OnionShare uses to begin the onion service.
  • Open OnionShare and drag and drop files and folders you wish to share, and hit Start Sharing. It will demonstrate to you a .onion URL, such as (http://asxmi4q6i7pajg2b.onion/egg-cain), and copy it to your clipboard.
 TOR
  • This is the secret URL that can be used to download the document you’re sharing. In the event that you’d like many people to be able to download this record, uncheck the “close automatically” checkbox.
  • Send this URL to the person you’re attempting to send the files to. In the event that the records you’re sending aren’t secret, you can use the ordinary method for sending the URL: messaging it, presenting it on Facebook or Twitter, and so forth. In case you’re attempting to send secret records then it’s essential to send this URL safely.
 TOR
  • The person who is getting the documents not required to bother with OnionShare. All they need is to open the URL you send them in Tor Browser to be able to download the document.

Also read: TOR and VPN Anonymous enough for Dark Web

How it works

  • To begin with, the sender picks files and folders they wish to share to the beneficiary. OnionShare then begins a web server at 127.0.0.1 on a random port.
  • It picks two words from a 6800-long word list called a slug and makes the files accessible for download at http://127.0.0.1:[port]/[slug]/
  • It then makes the web server open as Tor onion service and shows the URL HTTP://[onionservice].onion/[slug] to the sender to share. A last OnionShare URL looks something like http://f5ratndpx7rgvh7i.onion/test-share.
  • The sender is in charge of safely sharing that URL to their preferred beneficiary utilizing a correspondence channel.
  • The beneficiary must use Tor Browser to stack the URL and download the records.
  • When the mutually shared files downloaded, or when the sender closes OnionShare, the Tor onion administration and web servers close down, totally removing the records from the web.

Features of Onion Share

  • A user-friendly drag-and-drop graphical user interface that works on Windows, Mac OS X, and Linux.
  • Ability to share multiple files and folders at once.
  • Support for multiple people downloading files at once.
  • Automatically copies the unguessable URL to your clipboard.
  • Shows you the progress of file transfers.
  • When the file is done transferring, automatically closes OnionShare to reduce the attack surface.
  • Localized into several languages, and supports international Unicode filenames.

Secure

  • Third parties don’t have access to files being shared.
  • Network eavesdroppers can’t spy on files in transit.
  • The anonymity of sender and recipient are protected by Tor.
  • If an attacker enumerates the onion service, the shared files stay safe.

Doesn’t Secure

  • Communicating the OnionShare URL might not be secure.
  • Communicating the OnionShare URL might not be anonymous.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Best SIEM Tools List For SOC Team – 2024

The Best SIEM tools for you will depend on your specific requirements, budget, and...

PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

GBHackers come across a new ChatGPT-powered Penetration testing Tool called "PentestGPT" that helps penetration...

8 Common Hacking Techniques & 3 Ways to Avoid Them All

Hackers come in many forms with sophisticated Hacking Techniques, While there has been a...