SlideShare ist ein Scribd-Unternehmen logo
1 von 13
1
2
• SURFACE WEB
• WEBPAGES THAT ARE INDEXED BY A SEARCH
ENGINE
• DEEP WEB
• WEBPAGES THAT ARE NOT INDEXED BY A
SEARCH ENGINE
• DARK WEB
• A SUBSET OF THE DEEP WEB (NON-INDEXABLE)
THAT
NEEDS EXTRA SOFTWARE TO ACCESS ITS CONTENTS
2
SURFACE WEB
• WEBSITES DISPLAYED BY
SEARCH
ENGINES
• FACEBOOK
• YOUTUBE
• INSTAGRAM
• WIKIPEDIA
• CAN BE ACCESSED BY GOOGLE’S
WEB CRAWLER
• CAN BE FOUND THROUGH THE
DOMAIN NAME SYSTEM (DNS)
3
DEEP
WEB
• NON-INDEXABLE WEBSITES
• FORUMS WHERE CONTENT IS
BLOCKED BY A LOGIN
SCREEN
• CONTAINS A ROBOT.TXT FILE
THAT STOPS SEARCH ENGINES
FROM CRAWLING IT
• ALGORITHM THAT STOPS
INCOMING REQUESTS AFTER
A CERTAIN AMOUNT OF
VISITS
4
DARK
WEB
• A SUBSET OF THE DEEP WEB
• ONLY ACCESSIBLE BY SOFTWARE SUCH AS TOR
• CONTAINS LEGAL AND ILLEGAL MATERIAL
• LEGAL (32%)
• FORUMS
• IRC SERVERS
• RADIO SERVICES
• ILLEGAL (68%)
• BLACK MARKET
• SELLING DRUGS, CHILD PORNOGRAPHY,
ASSASSINATION SERVICES
• MALWARE SERVERS
• WEAPONS
5
DARK WEB ANONYMITY
SYSTEMS
• TOR BROWSER (ANONYMITY NETWORK)
• CLIENT-SERVER
• ORBOT
• HORNET (HIGH SPEED ONION ROUTING)
• I2P (INVISIBLE INTERNET PROTOCOL)
• PEER TO PEER
• ACTS LIKE A NETWORK LAYER
• BUILDS ADDITIONAL LAYER WITHIN
TCP/IP
• FREENET
• MIX BETWEEN TOR AND I2P 6
• SOFTWARE USED TO PROTECT
USERS BY MAKING
COMMUNICATIONS HARD TO TRACE
• BOUNCES COMMUNICATIONS TO
DIFFERENT NODES LOCATED ALL AROUND
THE WORLD
• USES ENCRYPTION IN THE
APPLICATION LAYER
• HIDES LOCATION THROUGH MANY
NETWORK RELAYS
• HIDDEN WEBSITES USE THE ".ONION"
SUFFIX
7
FREEN
ET
• MIX BETWEEN PEER TO PEER AND
CLIENT- SEVER
• DE-CENTRALIZED SERVERS & DATA
• USES PEERS TO HOST NODES WHICH
STORE OTHER USER'S ENCRYPTED
DATA
• NO WAY TO TELL IF DATA IS LEGAL OR
ILLEGAL
• DE-CENTRALIZED DATA MAKES IT
HARDER TO HACK INTO
8
• The original "Silk Road" website was
located on Tor Servers
• Some think Tor has been
compromised
• A new website "Silk Road Reloaded"
appeared on a different dark web
network called I2P
• I2P uses a peer-to-peer approach where
"Essentially all peers participate in
routing for others"
• Supports various online currencies other
than Bitcoin such as Anoncoin,
Darkcoin, Dogecoin and can convert
currencies for users for a small fee
SOCIETAL IMPLICATIONS OF THE DARK
WEB
• THE DARK WEB CAN BE SEEN AS BOTH GOOD AND BAD.
• INFORMATION CAN BE EXCHANGED WITHOUT HAVING A GOVERNMENT REPRESENTATIVE
FINDING OUT.
• ALLOWS ACCESS TO REGION BLOCKED INFORMATION.
• HOWEVER, IT IS A PLATFORM FOR ILLEGAL ACTIVITY.
• ALLOWS THE PURCHASE OR SALE OF DRUGS, WEAPONS, AND HITMAN SERVICES.
10
SECURITY PRECAUTIONS WHEN
VISITING
THE DARK WEB
• DON'T TRUST ANYONE
• COVER YOUR WEBCAM WITH TAPE
• DON'T DOWNLOAD ANYTHING
• DISABLE JAVASCRIPT ON YOUR BROWSER
• CHECK THAT YOUR VIRTUAL PRIVATE
NETWORK
(VPN) IS WORKING
• USE PROXIES
• ANONYMOUS OPERATING SYSTEMS
• TAILS
• WHONIX
• JONDO
• INTERNET CAFE 11
DIFFICULTIES IN REMOVAL OF THE DARK
WEB
• IDENTITIES OF THE SITE OWNERS ARE PRESERVED WITH SOFTWARE.
• INVESTIGATING A SINGLE MARKET IS EXPENSIVE AND TIME
CONSUMING.
• TRACING PAYMENT IS DIFFICULT.
12
Thank
You

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
James Bollen
 

Was ist angesagt? (20)

The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark web
Dark webDark web
Dark web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Dark wed
Dark wedDark wed
Dark wed
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Deep web
Deep webDeep web
Deep web
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
Deep web
Deep webDeep web
Deep web
 

Ähnlich wie Dark Web Presentation.pptx

2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
Fabio Pietrosanti
 

Ähnlich wie Dark Web Presentation.pptx (20)

Team4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webTeam4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Overview of Deep web
Overview of Deep webOverview of Deep web
Overview of Deep web
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
Dark web (1)
Dark web (1)Dark web (1)
Dark web (1)
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
Darknet
DarknetDarknet
Darknet
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Dark net
Dark netDark net
Dark net
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Darknet
DarknetDarknet
Darknet
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesTor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 

Dark Web Presentation.pptx

  • 1. 1
  • 2. 2 • SURFACE WEB • WEBPAGES THAT ARE INDEXED BY A SEARCH ENGINE • DEEP WEB • WEBPAGES THAT ARE NOT INDEXED BY A SEARCH ENGINE • DARK WEB • A SUBSET OF THE DEEP WEB (NON-INDEXABLE) THAT NEEDS EXTRA SOFTWARE TO ACCESS ITS CONTENTS 2
  • 3. SURFACE WEB • WEBSITES DISPLAYED BY SEARCH ENGINES • FACEBOOK • YOUTUBE • INSTAGRAM • WIKIPEDIA • CAN BE ACCESSED BY GOOGLE’S WEB CRAWLER • CAN BE FOUND THROUGH THE DOMAIN NAME SYSTEM (DNS) 3
  • 4. DEEP WEB • NON-INDEXABLE WEBSITES • FORUMS WHERE CONTENT IS BLOCKED BY A LOGIN SCREEN • CONTAINS A ROBOT.TXT FILE THAT STOPS SEARCH ENGINES FROM CRAWLING IT • ALGORITHM THAT STOPS INCOMING REQUESTS AFTER A CERTAIN AMOUNT OF VISITS 4
  • 5. DARK WEB • A SUBSET OF THE DEEP WEB • ONLY ACCESSIBLE BY SOFTWARE SUCH AS TOR • CONTAINS LEGAL AND ILLEGAL MATERIAL • LEGAL (32%) • FORUMS • IRC SERVERS • RADIO SERVICES • ILLEGAL (68%) • BLACK MARKET • SELLING DRUGS, CHILD PORNOGRAPHY, ASSASSINATION SERVICES • MALWARE SERVERS • WEAPONS 5
  • 6. DARK WEB ANONYMITY SYSTEMS • TOR BROWSER (ANONYMITY NETWORK) • CLIENT-SERVER • ORBOT • HORNET (HIGH SPEED ONION ROUTING) • I2P (INVISIBLE INTERNET PROTOCOL) • PEER TO PEER • ACTS LIKE A NETWORK LAYER • BUILDS ADDITIONAL LAYER WITHIN TCP/IP • FREENET • MIX BETWEEN TOR AND I2P 6
  • 7. • SOFTWARE USED TO PROTECT USERS BY MAKING COMMUNICATIONS HARD TO TRACE • BOUNCES COMMUNICATIONS TO DIFFERENT NODES LOCATED ALL AROUND THE WORLD • USES ENCRYPTION IN THE APPLICATION LAYER • HIDES LOCATION THROUGH MANY NETWORK RELAYS • HIDDEN WEBSITES USE THE ".ONION" SUFFIX 7
  • 8. FREEN ET • MIX BETWEEN PEER TO PEER AND CLIENT- SEVER • DE-CENTRALIZED SERVERS & DATA • USES PEERS TO HOST NODES WHICH STORE OTHER USER'S ENCRYPTED DATA • NO WAY TO TELL IF DATA IS LEGAL OR ILLEGAL • DE-CENTRALIZED DATA MAKES IT HARDER TO HACK INTO 8
  • 9. • The original "Silk Road" website was located on Tor Servers • Some think Tor has been compromised • A new website "Silk Road Reloaded" appeared on a different dark web network called I2P • I2P uses a peer-to-peer approach where "Essentially all peers participate in routing for others" • Supports various online currencies other than Bitcoin such as Anoncoin, Darkcoin, Dogecoin and can convert currencies for users for a small fee
  • 10. SOCIETAL IMPLICATIONS OF THE DARK WEB • THE DARK WEB CAN BE SEEN AS BOTH GOOD AND BAD. • INFORMATION CAN BE EXCHANGED WITHOUT HAVING A GOVERNMENT REPRESENTATIVE FINDING OUT. • ALLOWS ACCESS TO REGION BLOCKED INFORMATION. • HOWEVER, IT IS A PLATFORM FOR ILLEGAL ACTIVITY. • ALLOWS THE PURCHASE OR SALE OF DRUGS, WEAPONS, AND HITMAN SERVICES. 10
  • 11. SECURITY PRECAUTIONS WHEN VISITING THE DARK WEB • DON'T TRUST ANYONE • COVER YOUR WEBCAM WITH TAPE • DON'T DOWNLOAD ANYTHING • DISABLE JAVASCRIPT ON YOUR BROWSER • CHECK THAT YOUR VIRTUAL PRIVATE NETWORK (VPN) IS WORKING • USE PROXIES • ANONYMOUS OPERATING SYSTEMS • TAILS • WHONIX • JONDO • INTERNET CAFE 11
  • 12. DIFFICULTIES IN REMOVAL OF THE DARK WEB • IDENTITIES OF THE SITE OWNERS ARE PRESERVED WITH SOFTWARE. • INVESTIGATING A SINGLE MARKET IS EXPENSIVE AND TIME CONSUMING. • TRACING PAYMENT IS DIFFICULT. 12