Illuminating the dark web

Jisc
JiscJisc
1
Illuminating the Dark Web
Simon Bryden
Consulting Systems Engineer, EMEA
2
Introduction to the dark web
The Onion Router and Hidden Services
Dark Web Takedowns
Protecting yourself from the dark web
Illuminating the Dark Web
3
“The iceberg”
Surface Web
Deep Web
Dark Web
4
Protected by authentication layer
or paywall
Not linked from any other pages Not referenced by search engines
Deep Web characteristics
5
Anonymous Special access software Associated with illegal activities
Dark Web characteristics
6
Illegal content Illegal marketplaces Cybercrime services Cryptocurrency services
What can be found on the Dark Web?
7
8
9
10
Journalism Legal markets Social Media Repressed minorities
Legal dark web services
11
The Onion Router
12
• Based on technology developed by the US Naval Research Laboratory in 1990s
• Designed to protect US intelligence communications online
• Tor project launched in 2002, first public release in 2004
• The Tor Project Inc. launched in 2006 as a non-profit organisation
What is Tor?
13
Tor can provide two levels of anonymity:
Anonymous access to surface web services
• The Tor network provides an anonymous access through the Tor network.
• The Tor network “exit node” connects to the surface web server
Anonymous access to hidden services
• The Tor network provides complete end-to-end anonymity
• Hides the identity of both client and server
How muchAnonymity does Tor Provide?
14
15
16
How Anonymous?
“Alice is using the Tor service”
Tor relay nodes are publicly known
“Someone is connecting to Bob
from the Tor network”
“We can see this traffic”
17
How Anonymous?
“Alice is using a VPN service”
HTTPS
VPN Provider
“Someone is connecting to Bob
from the Tor network”
18
Tor Browser
19
Volunteers.
Often universities and other institutions
Most people host Relay or Guard (Entry) nodes
Nodes cannot become guards unless they are stable, and have at least 2Mbytes/s bandwidth
Running an Exit node opens up the potential of receiving abuse complaints
Exit nodes are often blocked by providers or website owners
Who Owns the Tor Nodes?
20
Where are the relays?
Germany
UK
Netherlands
USA
France
21
Tor Hidden Services
22
• Hidden services provide anonymity for the server
• Servers are identified by an onion address such as 4nrvt5xpejyo27zf.onion
• These are not resolved by DNS, rather by the Tor network itself
• Most importantly:
• There is no link between server name and server address
Tor Hidden Services
23
Tor Hidden Service Operation
RP
24
Browsing Hidden Sites
Dark Web Take-Down
26
• It’s more than just Tor!
• Payment methods
• Delivery of goods
• All other system tools and applications must be anonymized
• Ancillary communications (forgotten passwords, tech support)
• Web services platforms (Wordpress, Joomla etc. are full of vulnerabilities)
Perfect anonymity is Difficult
27
In 2013, the FBI managed to infiltrate “Freedom Hosting”,
a hosting operation serving child pornography sites
It inserted an exploit kit which targeted a vulnerability in Firefox 17
(used in Tor browser)
This resulted in the download of a file which would report back the identity of the user
Resulted in the arrests of the owner, and many of the consumers
The Silk Road marketplace was reportedly identified through
a non-anonymized captcha
Freedom Hosting
Silk Road
28
Child sex abuse marketplace
More than 8 terabytes of data
Used bitcoin – 7,300 recorded transactions from
more than 1 million user addresses
UK National Crime Agency used BitCoin
transaction analysis to identify users
Arrests of 337 users made in 38 countries
23 abused children identified and rescued
Abusers found, not by using offensive hacking, but by simply tracing bitcoin transactions
Welcome To Video
29
Dark Web Markets
Silk Road
Data leaked via
CAPTCHA
US DEA and FBI
June 2013
Silk Road 2.0
Bitcoin
Vulnerability
FBI & Europol
Nov 2014
AlphaBay
Email address
leakage
July 2017
Dream Market
Sustained DDoS
Attacks?
March 2019
Wall Street
Market
Careless use of
VPN
Europol
May 2019
Deepdotweb.com
Dark web links site
Taken down because of
links to illegal markets
FBI, Europol, NCA
May 2019
Hansa
Addresses leaked
in IRC logs
Operation
Bayonet
(multinational law
enforcement)
Detection and Protection
31
Case 1: Employees access dark web sites
32
Case 2: Employees hosting dark web sites
33
Case 3: Anonymous external reconnaisance
34
Several sites provide the list in convenient form:
https://check.torproject.org/exit-addresses (exit nodes only)
https://www.dan.me.uk/tornodes (exit only, or all relays)
http://blutmagie.de (exit only, or all relays)
Security vendors often have automatically-updated node lists built in to their solutions.
Tor Detection by RelayAddresses
35
Good news: It is possible to detect the Tor protocol
Not so good news: Tor provides explicit means to avoid being detected
Fortinet has built-in application detection of Tor, I2P, FreeNet, and others, as well as
popular proxy applications such as Psiphon and Ultrasurf.
Tor does makes it possible to use private relay nodes and personalized transport protocols
which can make detection close to impossible.
However, in practice, there are many associated difficulties with these techniques.
Detection by Protocol
36
• Dark web is more about the technology than the content
• Much of the content is legal and legitimate
• Tor is by far the most popular access technology
• It is very difficult to make a site 100% anonymous
• The dark web can present a risk to legitimate users and companies
• Simple security measures can deter all but the most determined attackers
Key Takeaways
Come and see us at stand 14
1 de 37

Recomendados

Deep and Dark Web por
Deep and Dark WebDeep and Dark Web
Deep and Dark WebMd. Nazmus Shakib Robin
17.6K visualizações14 slides
The Dark Web por
The Dark WebThe Dark Web
The Dark Webjamiecornista
11.7K visualizações6 slides
Introduction To Dark Web por
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark WebAdityakumar Yadav
1.4K visualizações10 slides
The Dark Web por
The Dark WebThe Dark Web
The Dark WebSuraj Jaundoo
3.8K visualizações8 slides
Dark web presentation por
Dark web presentationDark web presentation
Dark web presentationTo Mal
5.5K visualizações18 slides
Journey To The Dark Web por
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
1.8K visualizações20 slides

Mais conteúdo relacionado

Mais procurados

Dark web (1) por
Dark web (1)Dark web (1)
Dark web (1)university of Gujrat, pakistan
208 visualizações20 slides
Dark Web and Privacy por
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
4.1K visualizações44 slides
Presentation on Ethical Hacking ppt por
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
142.3K visualizações29 slides
The Dark side of the Web por
The Dark side of the WebThe Dark side of the Web
The Dark side of the WebPaula Ripoll Cacho
3.3K visualizações12 slides
Dark web by Pranesh Kulkarni por
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
596 visualizações9 slides
Phishing ppt por
Phishing pptPhishing ppt
Phishing pptSanjay Kumar
58.5K visualizações16 slides

Mais procurados(20)

Dark Web and Privacy por Brian Pichman
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
Brian Pichman4.1K visualizações
Presentation on Ethical Hacking ppt por Shravan Sanidhya
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya142.3K visualizações
The Dark side of the Web por Paula Ripoll Cacho
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho3.3K visualizações
Dark web by Pranesh Kulkarni por PraneshKulkarni22
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
PraneshKulkarni22596 visualizações
Phishing ppt por Sanjay Kumar
Phishing pptPhishing ppt
Phishing ppt
Sanjay Kumar58.5K visualizações
Dark web por Safwan Hashmi
Dark webDark web
Dark web
Safwan Hashmi2.2K visualizações
The Dark Web por Connor Willer
The Dark WebThe Dark Web
The Dark Web
Connor Willer3.2K visualizações
Dark wed por AraVind Pillai
Dark wedDark wed
Dark wed
AraVind Pillai2.3K visualizações
Deepweb and darkweb vinodkumar ancha por vinod kumar
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar3K visualizações
Dark and Deep web por Khaled Sany
Dark and Deep webDark and Deep web
Dark and Deep web
Khaled Sany5.3K visualizações
Social Media Cyber Security Awareness Briefing por Department of Defense
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense38.1K visualizações
Deep web por Abu Kaisar
Deep webDeep web
Deep web
Abu Kaisar 1.1K visualizações
Dark net por Mudasser Afzal
Dark netDark net
Dark net
Mudasser Afzal1.4K visualizações
Darknet por Shubham Dwivedi
DarknetDarknet
Darknet
Shubham Dwivedi9.6K visualizações
Deep web and dark web por Vaishali Misra
Deep web and dark webDeep web and dark web
Deep web and dark web
Vaishali Misra898 visualizações
The dark web por hellboytonmoy
The dark webThe dark web
The dark web
hellboytonmoy2.7K visualizações
Cyber crime & security por Ronson Fernandes
Cyber crime & securityCyber crime & security
Cyber crime & security
Ronson Fernandes3.6K visualizações

Similar a Illuminating the dark web

The Deep Web, TOR Network and Internet Anonymity por
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
3.3K visualizações38 slides
The Dark Web : Hidden Services por
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
14 visualizações24 slides
Tor Project and The Darknet por
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
1.8K visualizações23 slides
The Onion Routing Network por
The Onion Routing NetworkThe Onion Routing Network
The Onion Routing NetworkDivyanshu
1.6K visualizações24 slides
Dark Web.pptx por
Dark Web.pptxDark Web.pptx
Dark Web.pptxSoumen Debgupta
4 visualizações78 slides
Deep web por
Deep webDeep web
Deep webMayank Chaudhari
1.3K visualizações17 slides

Similar a Illuminating the dark web(20)

The Deep Web, TOR Network and Internet Anonymity por Abhimanyu Singh
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
Abhimanyu Singh3.3K visualizações
The Dark Web : Hidden Services por Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh14 visualizações
Tor Project and The Darknet por Ahmed Mater
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
Ahmed Mater1.8K visualizações
The Onion Routing Network por Divyanshu
The Onion Routing NetworkThe Onion Routing Network
The Onion Routing Network
Divyanshu 1.6K visualizações
Dark Web.pptx por Soumen Debgupta
Dark Web.pptxDark Web.pptx
Dark Web.pptx
Soumen Debgupta4 visualizações
Deep web por Mayank Chaudhari
Deep webDeep web
Deep web
Mayank Chaudhari1.3K visualizações
Dark Web.pptx por eliofatjon
Dark Web.pptxDark Web.pptx
Dark Web.pptx
eliofatjon3 visualizações
Анонимность Tor: миф и реальность por CEE-SEC(R)
Анонимность Tor: миф и реальностьАнонимность Tor: миф и реальность
Анонимность Tor: миф и реальность
CEE-SEC(R)412 visualizações
(130727) #fitalk anonymous network concepts and implementation por INSIGHT FORENSIC
(130727) #fitalk   anonymous network concepts and implementation(130727) #fitalk   anonymous network concepts and implementation
(130727) #fitalk anonymous network concepts and implementation
INSIGHT FORENSIC232 visualizações
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia por OWASP Delhi
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
OWASP Delhi850 visualizações
Presentation darknet por Dvir Barel
Presentation darknetPresentation darknet
Presentation darknet
Dvir Barel66 visualizações
Dark Web por KunalDas889957
Dark WebDark Web
Dark Web
KunalDas889957254 visualizações
Dw communication por Arjun Chetry
Dw communicationDw communication
Dw communication
Arjun Chetry24 visualizações
Ali shahbazi khojasteh - deep web por Ali Shahbazi Khojasteh
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
Ali Shahbazi Khojasteh383 visualizações
Darkle Slideshow _ by Slidesgo.pptx por JamalAmzil6
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptx
JamalAmzil624 visualizações
Demystifying the Dark Web por Tom Kranz
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
Tom Kranz138 visualizações
Cyber espionage - Tinker, taylor, soldier, spy por b coatesworth
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
b coatesworth3.1K visualizações
2006: Hack.lu Luxembourg 2006: Anonymous Communication por Fabio Pietrosanti
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
Fabio Pietrosanti2.8K visualizações
Tor: The Second Generation Onion Router por Mohammed Bharmal
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
Mohammed Bharmal2.6K visualizações
.Onion por KajolPatel17
.Onion.Onion
.Onion
KajolPatel1764 visualizações

Mais de Jisc

Community-led Open Access Publishing webinar.pptx por
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
98 visualizações9 slides
The Open Access Community Framework (OACF) 2023 (1).pptx por
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
118 visualizações7 slides
Are we onboard yet University of Sussex.pptx por
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
99 visualizações7 slides
JiscOAWeek_LAIR_slides_October2023.pptx por
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
100 visualizações8 slides
UWP OA Week Presentation (1).pptx por
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
91 visualizações11 slides
An introduction to Cyber Essentials por
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
494 visualizações14 slides

Mais de Jisc(20)

Community-led Open Access Publishing webinar.pptx por Jisc
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
Jisc98 visualizações
The Open Access Community Framework (OACF) 2023 (1).pptx por Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc118 visualizações
Are we onboard yet University of Sussex.pptx por Jisc
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
Jisc99 visualizações
JiscOAWeek_LAIR_slides_October2023.pptx por Jisc
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
Jisc100 visualizações
UWP OA Week Presentation (1).pptx por Jisc
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
Jisc91 visualizações
An introduction to Cyber Essentials por Jisc
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
Jisc494 visualizações
MarkChilds.pptx por Jisc
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptx
Jisc94 visualizações
RStrachanOct23.pptx por Jisc
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
Jisc99 visualizações
ISDX2 Oct 2023 .pptx por Jisc
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptx
Jisc99 visualizações
FerrellWalker.pptx por Jisc
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptx
Jisc97 visualizações
ExpertsknightOct23.pptx por Jisc
ExpertsknightOct23.pptxExpertsknightOct23.pptx
ExpertsknightOct23.pptx
Jisc94 visualizações
BeyondBlended17Oct23.pptx por Jisc
BeyondBlended17Oct23.pptxBeyondBlended17Oct23.pptx
BeyondBlended17Oct23.pptx
Jisc104 visualizações
Collective Funding Models for OA Books 3 - Thoth presentation.pptx por Jisc
Collective Funding Models for OA Books 3 - Thoth presentation.pptxCollective Funding Models for OA Books 3 - Thoth presentation.pptx
Collective Funding Models for OA Books 3 - Thoth presentation.pptx
Jisc166 visualizações
Collective Funding Models for OA Books 3 OAPEN PPT.pptx por Jisc
Collective Funding Models for OA Books 3 OAPEN PPT.pptxCollective Funding Models for OA Books 3 OAPEN PPT.pptx
Collective Funding Models for OA Books 3 OAPEN PPT.pptx
Jisc166 visualizações
Collective funding models for Open Access Books 3 - Manchester.pptx por Jisc
Collective funding models for Open Access Books 3 - Manchester.pptxCollective funding models for Open Access Books 3 - Manchester.pptx
Collective funding models for Open Access Books 3 - Manchester.pptx
Jisc163 visualizações
Understanding international students’ digital experiences​ por Jisc
Understanding international students’ digital experiences​Understanding international students’ digital experiences​
Understanding international students’ digital experiences​
Jisc126 visualizações
Demonstrating digital transformation: a framework for Higher Education​ por Jisc
Demonstrating digital transformation: a framework for Higher Education​Demonstrating digital transformation: a framework for Higher Education​
Demonstrating digital transformation: a framework for Higher Education​
Jisc136 visualizações
Beyond blended – new definitions, principles and resources​ por Jisc
Beyond blended – new definitions, principles and resources​Beyond blended – new definitions, principles and resources​
Beyond blended – new definitions, principles and resources​
Jisc130 visualizações
51st Student experience​ experts meeting por Jisc
51st Student experience​ experts meeting51st Student experience​ experts meeting
51st Student experience​ experts meeting
Jisc134 visualizações
Introducing Historical Texts' new resources for learning and teaching por Jisc
Introducing Historical Texts' new resources for learning and teachingIntroducing Historical Texts' new resources for learning and teaching
Introducing Historical Texts' new resources for learning and teaching
Jisc82 visualizações

Último

2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue por
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlueShapeBlue
50 visualizações23 slides
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue por
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueShapeBlue
96 visualizações7 slides
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericShapeBlue
41 visualizações9 slides
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... por
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
31 visualizações52 slides
20231123_Camunda Meetup Vienna.pdf por
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
46 visualizações73 slides
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...ShapeBlue
77 visualizações12 slides

Último(20)

2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue por ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue50 visualizações
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue por ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue96 visualizações
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue41 visualizações
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... por The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
The Digital Insurer31 visualizações
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue77 visualizações
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... por ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue82 visualizações
"Surviving highload with Node.js", Andrii Shumada por Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays40 visualizações
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... por ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue42 visualizações
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... por ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue48 visualizações
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... por ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue46 visualizações
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... por ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue88 visualizações
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... por ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue35 visualizações
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online por ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue102 visualizações
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue por ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue46 visualizações
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 visualizações
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc77 visualizações
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... por ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue83 visualizações
Data Integrity for Banking and Financial Services por Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely56 visualizações
Microsoft Power Platform.pptx por Uni Systems S.M.S.A.
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptx
Uni Systems S.M.S.A.67 visualizações

Illuminating the dark web

  • 1. 1 Illuminating the Dark Web Simon Bryden Consulting Systems Engineer, EMEA
  • 2. 2 Introduction to the dark web The Onion Router and Hidden Services Dark Web Takedowns Protecting yourself from the dark web Illuminating the Dark Web
  • 4. 4 Protected by authentication layer or paywall Not linked from any other pages Not referenced by search engines Deep Web characteristics
  • 5. 5 Anonymous Special access software Associated with illegal activities Dark Web characteristics
  • 6. 6 Illegal content Illegal marketplaces Cybercrime services Cryptocurrency services What can be found on the Dark Web?
  • 7. 7
  • 8. 8
  • 9. 9
  • 10. 10 Journalism Legal markets Social Media Repressed minorities Legal dark web services
  • 12. 12 • Based on technology developed by the US Naval Research Laboratory in 1990s • Designed to protect US intelligence communications online • Tor project launched in 2002, first public release in 2004 • The Tor Project Inc. launched in 2006 as a non-profit organisation What is Tor?
  • 13. 13 Tor can provide two levels of anonymity: Anonymous access to surface web services • The Tor network provides an anonymous access through the Tor network. • The Tor network “exit node” connects to the surface web server Anonymous access to hidden services • The Tor network provides complete end-to-end anonymity • Hides the identity of both client and server How muchAnonymity does Tor Provide?
  • 14. 14
  • 15. 15
  • 16. 16 How Anonymous? “Alice is using the Tor service” Tor relay nodes are publicly known “Someone is connecting to Bob from the Tor network” “We can see this traffic”
  • 17. 17 How Anonymous? “Alice is using a VPN service” HTTPS VPN Provider “Someone is connecting to Bob from the Tor network”
  • 19. 19 Volunteers. Often universities and other institutions Most people host Relay or Guard (Entry) nodes Nodes cannot become guards unless they are stable, and have at least 2Mbytes/s bandwidth Running an Exit node opens up the potential of receiving abuse complaints Exit nodes are often blocked by providers or website owners Who Owns the Tor Nodes?
  • 20. 20 Where are the relays? Germany UK Netherlands USA France
  • 22. 22 • Hidden services provide anonymity for the server • Servers are identified by an onion address such as 4nrvt5xpejyo27zf.onion • These are not resolved by DNS, rather by the Tor network itself • Most importantly: • There is no link between server name and server address Tor Hidden Services
  • 23. 23 Tor Hidden Service Operation RP
  • 26. 26 • It’s more than just Tor! • Payment methods • Delivery of goods • All other system tools and applications must be anonymized • Ancillary communications (forgotten passwords, tech support) • Web services platforms (Wordpress, Joomla etc. are full of vulnerabilities) Perfect anonymity is Difficult
  • 27. 27 In 2013, the FBI managed to infiltrate “Freedom Hosting”, a hosting operation serving child pornography sites It inserted an exploit kit which targeted a vulnerability in Firefox 17 (used in Tor browser) This resulted in the download of a file which would report back the identity of the user Resulted in the arrests of the owner, and many of the consumers The Silk Road marketplace was reportedly identified through a non-anonymized captcha Freedom Hosting Silk Road
  • 28. 28 Child sex abuse marketplace More than 8 terabytes of data Used bitcoin – 7,300 recorded transactions from more than 1 million user addresses UK National Crime Agency used BitCoin transaction analysis to identify users Arrests of 337 users made in 38 countries 23 abused children identified and rescued Abusers found, not by using offensive hacking, but by simply tracing bitcoin transactions Welcome To Video
  • 29. 29 Dark Web Markets Silk Road Data leaked via CAPTCHA US DEA and FBI June 2013 Silk Road 2.0 Bitcoin Vulnerability FBI & Europol Nov 2014 AlphaBay Email address leakage July 2017 Dream Market Sustained DDoS Attacks? March 2019 Wall Street Market Careless use of VPN Europol May 2019 Deepdotweb.com Dark web links site Taken down because of links to illegal markets FBI, Europol, NCA May 2019 Hansa Addresses leaked in IRC logs Operation Bayonet (multinational law enforcement)
  • 31. 31 Case 1: Employees access dark web sites
  • 32. 32 Case 2: Employees hosting dark web sites
  • 33. 33 Case 3: Anonymous external reconnaisance
  • 34. 34 Several sites provide the list in convenient form: https://check.torproject.org/exit-addresses (exit nodes only) https://www.dan.me.uk/tornodes (exit only, or all relays) http://blutmagie.de (exit only, or all relays) Security vendors often have automatically-updated node lists built in to their solutions. Tor Detection by RelayAddresses
  • 35. 35 Good news: It is possible to detect the Tor protocol Not so good news: Tor provides explicit means to avoid being detected Fortinet has built-in application detection of Tor, I2P, FreeNet, and others, as well as popular proxy applications such as Psiphon and Ultrasurf. Tor does makes it possible to use private relay nodes and personalized transport protocols which can make detection close to impossible. However, in practice, there are many associated difficulties with these techniques. Detection by Protocol
  • 36. 36 • Dark web is more about the technology than the content • Much of the content is legal and legitimate • Tor is by far the most popular access technology • It is very difficult to make a site 100% anonymous • The dark web can present a risk to legitimate users and companies • Simple security measures can deter all but the most determined attackers Key Takeaways
  • 37. Come and see us at stand 14