Questions tagged [torrent]

The BitTorrent protocol constitutes a decentralised file-sharing network.

59 questions
57
votes
3 answers

Is receiving fake torrent data possible?

While downloading a file via a torrent, what will happen if some of the peers send me fake chunks? Also, can any of the peers send me a whole fake file? For example, if I download a .torrent file which should download a file with hash sum A, and a…
user156092
25
votes
2 answers

What are the TCP/UDP ports used by torrent applications?

I want to block torrent traffic on my network because it is utilizing too much bandwidth and disrupted my network traffic. What port range should I use and what protocol TCP or UDP?
hodl
  • 351
  • 1
  • 3
  • 5
24
votes
2 answers

Is Torrent safe for sharing legitimate files (file verification)? Does it use SHA1 or SHA256?

Let's assume that a legitimate torrent file has been safely and successfully downloaded over HTTPS and perhaps even OpenPGP verification was used to verify the integrity of the torrent file. How good are torrent clients against attackers who want to…
user539484
  • 343
  • 3
  • 6
18
votes
1 answer

How can this executable have an .AVI extension?

Disclaimer: I opened the following torrent file just because someone reported it as a movie containing a virus, which seemed very strange. I do not support piracy. So, upon opening a .torrent file downloaded from internet, I get the following…
user2639
15
votes
1 answer

Download an OS image via torrent

If you take the Ubuntu alternative download page for example, there, you have the possibility to download the OS also via torrent. Being a peer to peer where files are stored on anyone's machine got me wondering on just how safe would that be…
fduff
  • 725
  • 1
  • 8
  • 17
14
votes
2 answers

How does the Copyright Alert System work? Who has implemented it?

Some ISPs are participating in a Copyright Alert System that notifies content authors of violations of their copyright. I'm concerned how this oversight relates to my private traffic, and what laws and permissions allow this type of monitoring. Can…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
13
votes
1 answer

Torrent "bad seed" attack by Sony, how does it work?

Sony recently saw a large amount of data stolen. In order to prevent the stolen data from being spread using torrents, they are doing what was called a bad seed attack. What is this attack? Is this a known attack or some term they coined for what is…
Daniel
  • 627
  • 5
  • 16
10
votes
3 answers

Can a hacked torrent client be used to prevent others from torrenting?

Many pirated game/movie torrents these days have seed boxes which are basically dedicated servers for seeding. I was wondering if leech boxes can be set up by the publishers to delay the torrenting of games. The speed of download of torrent is…
Souradeep Nanda
  • 227
  • 2
  • 9
9
votes
2 answers

How does torrent poisoning work?

Can someone explain how torrent poisoning attacks work? I am looking for some tutorials on how to do it. What are the countermeasures that someone can use to defend themselves against it?
Heidi
  • 113
  • 2
  • 6
9
votes
8 answers

How to block some websites and torrent usage in a small office?

In my office there are approaximately 25 systems are connected through network and all having internet accessibility.but some people are missusing this facilities like downloading films from torrent websites and accessing facebook during the work…
shibinlal
  • 297
  • 2
  • 3
  • 5
8
votes
1 answer

Reconstructing bittorrent data from PCAP

I am doing a CTF flag for my school project with a PCAP flag based on this CTF write-up: eindbazen.net - Plaid CTF 2012 - Torrent I setup a local torrent file containing an .mp3 (the audio is my flag's key) that is shared between two laptops. I…
Captain Slow
  • 83
  • 1
  • 3
7
votes
7 answers

How to effectively block torrents on my network?

As per the network policy, we have to block all torrent traffic from the network. To do this, I used to block all ports above 1024 on my firewall/proxy devices. But due to this, many other applications that use non-standard ports are not able to…
Adi
  • 97
  • 1
  • 1
  • 2
6
votes
1 answer

The Peer-To-Peer Web

Good Morning Guys, I'm currently looking into the Project Maelstorm (BitTorrent Peer-To-Peer Web Browser Project), and a question popped up in mind. When on a P2P network, users share the file which originated from a single source, once the first…
Fabricio20
  • 203
  • 2
  • 7
5
votes
2 answers

Hardening/Security considerations for torrent clients

I am running Synology's DSM torrent client on a NAS. As I have to (?) open and forward one UDP port for DHT and another one (UDP/TCP) for data transmission I am exposing myself to threats originating from the internet. If I don't, I circumvent the…
5
votes
1 answer

Special characters in filename leads to starting virus executable

So I've just downloaded torrent with one file in it - the formal name of file should be "123.avi.exe" (which is typical for viruses and trojans). Now, interesting thing is that name is encoded in UTF16-LE as following…
Alek Depler
  • 163
  • 5
1
2 3 4