Presentation on Darkweb/Darknet/DeepWeb.
Basic Knowledge and and Brief Presentation on the Hidden world of darknet.
Idea on How the search engine works.
What is Torr and How it vWorks.
Market of hiddenweb, bitcoin, and how it is used for illegal puchase of drugsd and child pornography.
2. CONTENTS
• Introduction: What is Darknet?
• Search Engine.
• Contents found on Darknet.
• Advantages of Darknet.
• Accessing the Darknet.
• How it works?
• Currency of Darknet.
• Top Threats of Darknet.
• Share of Darknet Contents
• Conclusion.
A Presentation on Darknet
3. What Is DarkNet ?
• Darknet also known as Deep Net / Hidden Web, is
an overlay of networks that can be accessed
through specific softwares, configurations or
Authorization.
• It is all the information that cannot be indexed
using general web search engines.
4. Search Engines
• Programs that search documents for specified
keywords or phrases and returns a list of
documents where the keywords are found.
• Examples are
5. In Simple words it can be said that, All pages that
are indexed by a search engine are the visible
web or the surface web, and what’s left of it or
which it can’t access is the Hidden Web,
DeepWeb or the Darknet.
6. Some experts estimate that as much as 96% of
the entire internet is invisible web content.
7. Content Found On The Darknet
• Webpages with no links on them, called
disconnected pages.
• Password protected webpages.
• Webpages generated from databases.
• Dynamically generated webpages.
• Real-time content.
• Webpages with non-html text, or any coding
that the program of a regular search engines
cannot understand.
8.
9. Advantages Of Dark NeT
• Specialized content focus – large amounts of information focused
on an exact subject
• Contains information that might not be available on the visible
web
• Allows a user to find a precise answer to a specific question
• Allows a user to find webpages from a specific date or time.
• Provides Full Version Softwares
• Availability of Pro versions of Android and iOS Apps on Markets
like Blackmart
• Can aquire Banned Books and Applications
• Access to Documentaries Movies and Propaganda videos Banned
by Governments , even Youtube and Facebook is accessed in
Countries where they are banned eg: Pakistan, Iran Gambia ,China
etc.
10. Accessing the Darknet
Darknet Content can be accessed only through special
anonymizing software called TOR.
TOR Stands for The Onion Routing, it protects the user from
being traced, as the name suggests it has layers of bouncing
Addresses like layers of onion, so no one can either track the
user or can know easily what the user viewed, browsed or
even Purchased.
The Darknet is a Big Market for illegal goods, it can be
referred to as Chorbazar of Internet, and its market is so big
that Amazon and Alibaba Together will appear a Dwarf if
compared.
12. Currency of the Deep Web
Bitcoins an electronic cash system using peer-to-peer
networking, digital signatures and cryptographic proof to enable
irreversible payments between parties without relying on trust.
Payments are issued and transferred by the Bitcoin network.
Participants begin using Bitcoin by first acquiring a Bitcoin wallet and
one or more Bitcoin addresses. Bitcoin addresses are used for receiving
Bitcoins, similar to how e-mail addresses are used for receiving e-mail.
In April 2014, 1 BTC traded at around $4.80 (288 INR). Taking into
account the total number of Bitcoins in circulation, the market
capitalization of the Bitcoin network stands at over 40 million USD (2400
INR)
13. Top Threats posesSed by DarkNet
Threat #1: Free entry for any cybercriminal
Anyone can choose to enter the darknet markets as a
cybercriminal. There is no bar and this has been made
largely possible with the expanding malware toolsets
now available for the newbie.
Threat #2: Drugs are available in plenty
It is estimated that over 50 percent of the darknet
markets that function using Tor offer narcotics for sale.
These are easily accessible and are sure to incite
interest among the ones that are ready to enter the
world of drugs and cybercrime.
Threat #3: No legislature in place for use of hidden
14. Threat #4: Cybercrime-Child Pornography
Though it is a fact that the financially and politiccally
motivated often are involved in blackmailing,their
actions are more challenging and they are harder to
control. And since there is no boundation or limitation
and certainly its impossible to impose censorship on
contents on web, hence the major source of
childpornography on the darkweb is the one of the
biggest problem that government all over the six
Continents are concerned about.
Threat #5: Seamless terrorism and
cybercrime
The spread of cybercrime is inevitable and is, of course,
hastened by the facilities provided by hidden services.
The year 2015 saw the globalization of crime. With
16. Conclusion
•Darknet is Mostly used for illegal activities, like
Purchasing of Drugs, Arms, Selling of confidential
Credential of hacked emails and other personal data.
•It is Heaven of Hackers one must always be very careful
while accessing the DarkNet, it is an ocean of Data with
tons of Phishers in it.
•Always be sure to have an authentic Netprotector while
browsing Darknet.
•If used safely and with the right intention it is an universe
of Knowledge, waiting to be explored.