SlideShare ist ein Scribd-Unternehmen logo
1 von 18
THE DEEP WEB
That part of the Internet people don’t really know
about..
By Melissa Pereira and Fahad Nasir
WHAT IS IT?
 The deep, the dark web, the hidden web,
etc.
 Makes up for most of the information on the
Internet
 Not indexed
 Can’t be found using normal search engines
 Not part of Surface Web
 Contains up to 7500 terabytes of information
 400 to 550 times the information of the surface web
 No domain names, thus making sites hard to find
 Example of a URL on the deep web
(SdddEEDOHIIDdddgmomiunw.onion)
WHAT AWESOME STUFF CAN I FIND?
 Just about anything
 Drug purchase, hit man for hire, weaponry,
pornography (don’t look for it, it’s the illegal
kind)
 Information regarding corporations
 Company secrets
 Hacking sites (eZines)
 Whistleblowing sites (e.g wikileaks)
 Bitcoin is the general form of currency to be
anonymous
THE HIDDEN WIKI
 The hidden wiki
 Categorized listing of stuff you can find on
the deep web
 Helps to navigate through the deep web
WHO’S ON IT?
 Hackers
 Criminals
 Whistle blowers
 Probably you in the next couple of days….
HOW CAN IT BE USEFUL?
 Opens a HUGE well of information!
 What else do you need?
 Reconnaissance stage
THE INTERESTING PART…
HOW CAN I ACCESS IT?
 Using special browsers
 Tor! (The Onion Router), Free net, Jon Do
TOR!
 Uses a browser based on FireFox
 Tor obfuscates
 Uses Nodes
 *torrenting, using Javascript/flash could
compromise your identity
BE CAREFUL!
 Be anonymous
 Don’t click on random links
 No illegal shit
 Don’t trust anyone
THIS COULD HAPPEN….
Just use common sense! :D
That’s all folks!

Weitere ähnliche Inhalte

Was ist angesagt?

The Deep Web
The Deep WebThe Deep Web
The Deep Web
martinp
 
The dark web
The dark webThe dark web
The dark web
Bella M
 

Was ist angesagt? (20)

Deep web
Deep webDeep web
Deep web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Deep web
Deep webDeep web
Deep web
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Darknet
DarknetDarknet
Darknet
 
Dark wed
Dark wedDark wed
Dark wed
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Deep web
Deep webDeep web
Deep web
 
The dark web
The dark webThe dark web
The dark web
 
The dark web
The dark webThe dark web
The dark web
 
Deep web
Deep webDeep web
Deep web
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
 

Ähnlich wie The Deep Web

What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
helzerpatrina
 
Darknet: The Other Side
Darknet: The Other SideDarknet: The Other Side
Darknet: The Other Side
jbraindc
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
Areeb Khan
 

Ähnlich wie The Deep Web (20)

What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
 
Scuba diving into The Deep Dark Web
Scuba diving into The Deep Dark WebScuba diving into The Deep Dark Web
Scuba diving into The Deep Dark Web
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Deep Web
Deep WebDeep Web
Deep Web
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
 
Darkweb
DarkwebDarkweb
Darkweb
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Darknet: The Other Side
Darknet: The Other SideDarknet: The Other Side
Darknet: The Other Side
 
Deep and dark web
Deep and dark webDeep and dark web
Deep and dark web
 
Dark web
Dark webDark web
Dark web
 
Dark web
Dark webDark web
Dark web
 
Perils of ignoring dark web monitoring services by Trojan Hunt India.
Perils of ignoring dark web monitoring services by Trojan Hunt India.Perils of ignoring dark web monitoring services by Trojan Hunt India.
Perils of ignoring dark web monitoring services by Trojan Hunt India.
 
Dark Web
Dark WebDark Web
Dark Web
 
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Misuse of Internet.ppt
Misuse of Internet.pptMisuse of Internet.ppt
Misuse of Internet.ppt
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

The Deep Web

  • 1. THE DEEP WEB That part of the Internet people don’t really know about.. By Melissa Pereira and Fahad Nasir
  • 2. WHAT IS IT?  The deep, the dark web, the hidden web, etc.  Makes up for most of the information on the Internet  Not indexed  Can’t be found using normal search engines  Not part of Surface Web
  • 3.  Contains up to 7500 terabytes of information  400 to 550 times the information of the surface web  No domain names, thus making sites hard to find  Example of a URL on the deep web (SdddEEDOHIIDdddgmomiunw.onion)
  • 4. WHAT AWESOME STUFF CAN I FIND?  Just about anything  Drug purchase, hit man for hire, weaponry, pornography (don’t look for it, it’s the illegal kind)  Information regarding corporations  Company secrets  Hacking sites (eZines)  Whistleblowing sites (e.g wikileaks)  Bitcoin is the general form of currency to be anonymous
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. THE HIDDEN WIKI  The hidden wiki  Categorized listing of stuff you can find on the deep web  Helps to navigate through the deep web
  • 10.
  • 11. WHO’S ON IT?  Hackers  Criminals  Whistle blowers  Probably you in the next couple of days….
  • 12. HOW CAN IT BE USEFUL?  Opens a HUGE well of information!  What else do you need?  Reconnaissance stage
  • 13. THE INTERESTING PART… HOW CAN I ACCESS IT?  Using special browsers  Tor! (The Onion Router), Free net, Jon Do
  • 14. TOR!  Uses a browser based on FireFox  Tor obfuscates  Uses Nodes  *torrenting, using Javascript/flash could compromise your identity
  • 15.
  • 16. BE CAREFUL!  Be anonymous  Don’t click on random links  No illegal shit  Don’t trust anyone
  • 18. Just use common sense! :D That’s all folks!