Dark Web

Dark Net
- Kunal Das
Abstract
In recent years, the Darknet has become one of the most discussed
topics in cyber security circles.
Current academic studies and media reports tend to highlight how the
anonymous nature of the Darknet is used to facilitate criminal activities.
The dark web is a hidden part of the world wide web that can only be
accessed using a special browser known as Tor
Parts of Web
To understand what the dark web is, we need to understand its
terminology. The internet is often described as consisting of three
parts:
i. The surface web,
ii. The deep web
iii. The dark web.
Surface Web
It is the part of the internet most of us use every day , activities like social
networking and reading news on the Common Web
It’s accessible through regular browsers such as Google Chrome, Safari, or
Firefox.
You can access it anywhere and at any time, as long as you have an internet
connection and a browser.
Don’t forget that it's because of the surface web that giants like Facebook and
Google know almost everything about you.
Deep Web
The term “deep web” refers to the part of the internet that’s behind
closed doors.
Most of the deep web consists of pages and databases that are only
meant for a certain group of people within an organization.
Your work database might be on this part of the Deep web.
Most of us won’t have access to this part of web and the required login
credentials and this information can’t be found on search engines
Dark web
The dark web is the part of the deep web that’s only accessible
through a special browser: the Tor browser.
Also called the “darknet,” this collection of sites refers to the
unregulated part of the internet.
No organization, business, or government is in charge of the
dark web or is able to enforce rules.
Dark Web
Tor (The Onion Routing project)
The Tor project is a non-profit organization that conducts research and
development into online privacy and anonymity.
It is intended to prevent anybody from tracking your browsing history or
discovering where you are, including businesses and the government.
The Tor network is a secure, encrypted protocol that can ensure privacy for
data and communications on the web.
Tor is legal to use but Tor is not designed nor intended for Tor users or Tor
network operators to break the law
Who created Tor?
Onion routing,The original technology behind Tor was developed by the
United States Naval Research Laboratory in 1990s.
The Onion Routing project (which later simply became "Tor), was
launched on 20 September 2002
The US Navy used tor with the specific purpose of insuring the
anonymity of communications over the Internet.
With the help of tor the US Navy protects the identity of US Navy
intelligence agents
Question you may ask
But the Navy is government!! Who made TOR
Fair. But only relevant because that’s where Dr. Syverson worked at the time (and
(and works still).
He said “Create anonymity software that the US Navy can run so our warfighters
can securely communicate in the field”
Even if Tor aligned with the official ones, that does not mean Tor is "owned and
operated" by the US government
How Tor works?
Tor is a network of virtual tunnels
Tor works by sending your traffic through three
random servers (also known as relays) in the
Tor network
The last relay in the circuit (the “exit relay”) then
sends the traffic out onto the public Internet.
Thus, it creates multi-layered encryption (layers
like an onion) and a hard-to-follow path
There are over 7,000 of these servers, which
mostly belong to volunteers.
When and Why Was the Dark
Web Created?
The dark web is known to have begun in 2000
The thesis project of University of Edinburgh student , who
set out to create a "Distributed Decentralized Information
Storage and Retrieval System.
He aimed to create a new way to anonymously communicate
and share files online
Is the Dark Web Safe?
Like most things, it depends. Here are some cybersecurity issues you should consider:
◦ Remote administration tools can be auto downloaded
◦ Malware Like Spyware / Ransomware
◦ Hackers may
◦ Phishing scams
◦ Suspicious links
◦ Criminal element
It’s dangerous to buy or download anything from illegal marketplaces it
may contain malware.
Legal Uses of the Dark Web
While using the dark web may seem suspect on the surface, it is perfectly
legal, and there are many legitimate uses of Tor and anonymous
browsing
For example,
In countries where government surveillance may be used to spy on and
oppress political dissidents, the dark web is often a place for
communication that avoids government censorship and scrutiny
Harmful contents of darkweb
Due to the dark web's encryption, websites cannot track geolocation or IP address of
users. This allows users to talk, blog, transact and share files confidentially.
Some contents of Dark web.
I. Stolen Information
II. Drugs and Stolen Goods
III. Disturbing Content
IV. Bitcoin Lottery Tickets
V. Terrorist Content
VI. Hacking Services
What You Can Find on the Dark
Web?
1) Black markets
Black markets have flourished since the birth of the internet. The dark web is
home to many black marketplaces, where all sorts of goods can be sold and
bought, from cheap Netflix accounts to credit card numbers, weapons, and
drugs.
2) Email services
Email services on the dark web almost always require you to use Tor and only
allow you to send emails to others who are also using Tor.
What You Can Find on the Dark
Web?
3) File uploads and transfers
Secure file uploads and transfers are widespread on the dark web, as the onion
network provides several layers of encryption on both your files and connection.
Similar to whistleblowing websites, file transfer services are used by journalists
and informants to share files with sensitive information.
4) Forums and chat boards
There are several message boards and chatrooms on the dark web, often
dedicated to topics that aren’t safe to discuss in other parts of the internet.
What You Can Find on the Dark
Web?
5) Whistleblowing websites
Whistleblowers and journalists use the dark web to leak or find sensitive
information. People who want to report a company or their government for illegal
acts can use Tor to try and stay anonymous.
6) Link directories
to access a specific dark website, you need to know the exact URL of that
page. And it’s not like these URLs are easy to remember either: they’re strings
of random numbers, letters, and special characters there are dedicated pages
that can help you find what you’re looking for.
The Dark Side of the Dark Web
Hackers use the dark web as their playground to sell their services and earn a living.
One can hire a hacker or hire an assassin
Drug marketplace where drugs are been sold
Weapons
Child Pornography
Red Rooms
Human Flesh
Disturbing contents and a lot more
The Red Room
A Red Room is basically a livestream on the deep/dark web where dark web criminals will take
people that they have kidnapped and kill them on camera.
The human parts are cut out instead of money. The transaction of money on these websites are
through Bitcoins.
The people also take membership fee to access these Red Rooms.
Most of these types of websites are banned by Cyber Police
The silk road
The first modern dark web market, known for selling drugs created by Ross Ulbricht who was
only 31.
Ulbricht’s website had more than $1.2 billion in sales for illegal drugs and other products,
using cryptocurrency to make the exchanges.
Police arrested Ulbricht on Oct. 1, 2013, in the science fiction section of the San Francisco
public library.
Agents who made the arrest said the young man was literally working on the site when they
arrested him.
The FBI tracked Ulbricht by tracing some of his early requests to others to help him build the
site.
How to visit dark web
The safest way to get on the dark web is through the Tor network which is a browser support
Tor network also known as Tor Browser.
Then you will have to get the onion links with .onion extension links because dark websites
are not indexed publicly.
The easiest way to search for the link are https://onion.live/
Tor supports duckduck go search engine which does not store IP addresses or user
information
While visiting .onion links or the darkweb one should turn off his/her javascript of the Tor
browser.
Live Example
Open Tor browser and connect to Tor
network
Search for https://onion.live/
You can see lots of # each # contains
onion sites of that particular topic
For example I clicked #drugs
Live Example
After opening the subtopic name DRUGS there are sub sub topics
colored in red and green
Red ones are dead and green ones are still alive
Let us explore the 9th sub-subtopic i.e, ARCHETYP
After clicking we will get a brief summary of the site.
Live Example
After opening the summery we can see
they provided with the onion link
Its green that means its live so opened it in
a new tab
Live Example
First the site asks for a captcha
Most of the darkweb captchas are not easy to solve, though this
was easy hence after solving the captcha I entered the site
There I was asked to login, So I created a account with temp mail
Then again, I solved the captcha and entered the site.
Live
Example
After entering the site I went to the
marketplace
We can see the screenshot that there
are lots of drugs that are been sold.
Conclusion
Navigating the darkweb can be quite interesting yet you must
exercise safety as you ride the dark tunnel. First block web
cam, second don’t download anything from the darknet, and
lastly don't maximize the tor browser screen. Enjoy surfing!
Thank you
1 de 29

Recomendados

Deep web and Dark webDeep web and Dark web
Deep web and Dark webParvez Hossain
2.2K visualizações14 slides
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark WebAdityakumar Yadav
1.4K visualizações10 slides
The dark webThe dark web
The dark webBella M
8.6K visualizações6 slides
Dark web presentationDark web presentation
Dark web presentationTo Mal
5.4K visualizações18 slides
The Dark WebThe Dark Web
The Dark WebConnor Willer
3.2K visualizações31 slides

Mais conteúdo relacionado

Mais procurados

The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth YuKenny Yu
481 visualizações7 slides
The Dark WebThe Dark Web
The Dark WebSuraj Jaundoo
3.7K visualizações8 slides
Dark wedDark wed
Dark wedAraVind Pillai
2.3K visualizações12 slides
The Dark side of the WebThe Dark side of the Web
The Dark side of the WebPaula Ripoll Cacho
3.3K visualizações12 slides
The Dark WebThe Dark Web
The Dark WebJan Siy
1.5K visualizações7 slides

Mais procurados(20)

The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
Swecha | స్వేచ్ఛ27.6K visualizações
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
Kenny Yu481 visualizações
The Dark WebThe Dark Web
The Dark Web
Suraj Jaundoo3.7K visualizações
Dark wedDark wed
Dark wed
AraVind Pillai2.3K visualizações
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho3.3K visualizações
The Dark WebThe Dark Web
The Dark Web
Jan Siy1.5K visualizações
Deep web Seminar Deep web Seminar
Deep web Seminar
Hareendran MG840 visualizações
The dark webThe dark web
The dark web
hellboytonmoy2.7K visualizações
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
Md. Nazmus Shakib Robin17.6K visualizações
Deep web and dark webDeep web and dark web
Deep web and dark web
Vaishali Misra895 visualizações
Research in the deep webResearch in the deep web
Research in the deep web
Seth Porter, MA, MLIS515 visualizações
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
Jisc23.4K visualizações
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee798 visualizações
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
Claudine Impas768 visualizações
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
MiteshWani1.8K visualizações
Dark and Deep webDark and Deep web
Dark and Deep web
Khaled Sany5.3K visualizações
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
Trend Micro4.4K visualizações
Dark webDark web
Dark web
Safwan Hashmi2.2K visualizações
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar3K visualizações

Similar a Dark Web

Dark Web.pptxDark Web.pptx
Dark Web.pptxeliofatjon
3 visualizações34 slides
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
1.2K visualizações28 slides
ABOUT DARK WEB ABOUT DARK WEB
ABOUT DARK WEB VenkatVs7
29 visualizações12 slides

Similar a Dark Web(20)

Dark Web.pptxDark Web.pptx
Dark Web.pptx
eliofatjon3 visualizações
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
Ali Shahbazi Khojasteh383 visualizações
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar1.2K visualizações
ABOUT DARK WEB ABOUT DARK WEB
ABOUT DARK WEB
VenkatVs729 visualizações
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
Paul Brooks15 visualizações
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
Ahmed Mater1.8K visualizações
Invisible Web Invisible Web
Invisible Web
Muhammad Azeem Mazhar80 visualizações
Understanding The Basis Of The Dark WebUnderstanding The Basis Of The Dark Web
Understanding The Basis Of The Dark Web
Carolina Fox6 visualizações
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
Mohammed Bharmal2.6K visualizações
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web
ASAD AHMED1.2K visualizações
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
Gavin O'Toole526 visualizações
Dw communicationDw communication
Dw communication
Arjun Chetry24 visualizações
Dark webDark web
Dark web
VaishnaviSrivastava1841 visualizações
Deep webDeep web
Deep web
Programar Animesh973 visualizações
DarknetDarknet
Darknet
KamalPreet Saluja433 visualizações
Internet PredatorsInternet Predators
Internet Predators
Lindsey Rivera2 visualizações
An Analysis Of The Deep WebAn Analysis Of The Deep Web
An Analysis Of The Deep Web
Joe Osborn4 visualizações
Deep webDeep web
Deep web
GauravPandey319104 visualizações

Último

UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
65 visualizações11 slides
Plastic waste.pdfPlastic waste.pdf
Plastic waste.pdfalqaseedae
94 visualizações5 slides
ICANNICANN
ICANNRajaulKarim20
61 visualizações13 slides
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docxTARIQ KHAN
92 visualizações11 slides

Último(20)

UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
Jisc65 visualizações
Plastic waste.pdfPlastic waste.pdf
Plastic waste.pdf
alqaseedae94 visualizações
ICANNICANN
ICANN
RajaulKarim2061 visualizações
Material del tarjetero LEES Travesías.docxMaterial del tarjetero LEES Travesías.docx
Material del tarjetero LEES Travesías.docx
Norberto Millán Muñoz60 visualizações
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
TARIQ KHAN92 visualizações
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
SukhwinderSingh895865480 visualizações
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch54 visualizações
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptx
TARIQ KHAN74 visualizações
discussion post.pdfdiscussion post.pdf
discussion post.pdf
jessemercerail85 visualizações
Psychology KS4Psychology KS4
Psychology KS4
WestHatch54 visualizações
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA190 visualizações
Streaming Quiz 2023.pdfStreaming Quiz 2023.pdf
Streaming Quiz 2023.pdf
Quiz Club NITW97 visualizações
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar87 visualizações
GSoC 2024GSoC 2024
GSoC 2024
DeveloperStudentClub1056 visualizações
Universe revised.pdfUniverse revised.pdf
Universe revised.pdf
DrHafizKosar88 visualizações
ACTIVITY BOOK key water sports.pptxACTIVITY BOOK key water sports.pptx
ACTIVITY BOOK key water sports.pptx
Mar Caston Palacio275 visualizações
Lecture: Open InnovationLecture: Open Innovation
Lecture: Open Innovation
Michal Hron94 visualizações
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov74 visualizações

Dark Web

  • 2. Abstract In recent years, the Darknet has become one of the most discussed topics in cyber security circles. Current academic studies and media reports tend to highlight how the anonymous nature of the Darknet is used to facilitate criminal activities. The dark web is a hidden part of the world wide web that can only be accessed using a special browser known as Tor
  • 3. Parts of Web To understand what the dark web is, we need to understand its terminology. The internet is often described as consisting of three parts: i. The surface web, ii. The deep web iii. The dark web.
  • 4. Surface Web It is the part of the internet most of us use every day , activities like social networking and reading news on the Common Web It’s accessible through regular browsers such as Google Chrome, Safari, or Firefox. You can access it anywhere and at any time, as long as you have an internet connection and a browser. Don’t forget that it's because of the surface web that giants like Facebook and Google know almost everything about you.
  • 5. Deep Web The term “deep web” refers to the part of the internet that’s behind closed doors. Most of the deep web consists of pages and databases that are only meant for a certain group of people within an organization. Your work database might be on this part of the Deep web. Most of us won’t have access to this part of web and the required login credentials and this information can’t be found on search engines
  • 6. Dark web The dark web is the part of the deep web that’s only accessible through a special browser: the Tor browser. Also called the “darknet,” this collection of sites refers to the unregulated part of the internet. No organization, business, or government is in charge of the dark web or is able to enforce rules.
  • 8. Tor (The Onion Routing project) The Tor project is a non-profit organization that conducts research and development into online privacy and anonymity. It is intended to prevent anybody from tracking your browsing history or discovering where you are, including businesses and the government. The Tor network is a secure, encrypted protocol that can ensure privacy for data and communications on the web. Tor is legal to use but Tor is not designed nor intended for Tor users or Tor network operators to break the law
  • 9. Who created Tor? Onion routing,The original technology behind Tor was developed by the United States Naval Research Laboratory in 1990s. The Onion Routing project (which later simply became "Tor), was launched on 20 September 2002 The US Navy used tor with the specific purpose of insuring the anonymity of communications over the Internet. With the help of tor the US Navy protects the identity of US Navy intelligence agents
  • 10. Question you may ask But the Navy is government!! Who made TOR Fair. But only relevant because that’s where Dr. Syverson worked at the time (and (and works still). He said “Create anonymity software that the US Navy can run so our warfighters can securely communicate in the field” Even if Tor aligned with the official ones, that does not mean Tor is "owned and operated" by the US government
  • 11. How Tor works? Tor is a network of virtual tunnels Tor works by sending your traffic through three random servers (also known as relays) in the Tor network The last relay in the circuit (the “exit relay”) then sends the traffic out onto the public Internet. Thus, it creates multi-layered encryption (layers like an onion) and a hard-to-follow path There are over 7,000 of these servers, which mostly belong to volunteers.
  • 12. When and Why Was the Dark Web Created? The dark web is known to have begun in 2000 The thesis project of University of Edinburgh student , who set out to create a "Distributed Decentralized Information Storage and Retrieval System. He aimed to create a new way to anonymously communicate and share files online
  • 13. Is the Dark Web Safe? Like most things, it depends. Here are some cybersecurity issues you should consider: ◦ Remote administration tools can be auto downloaded ◦ Malware Like Spyware / Ransomware ◦ Hackers may ◦ Phishing scams ◦ Suspicious links ◦ Criminal element It’s dangerous to buy or download anything from illegal marketplaces it may contain malware.
  • 14. Legal Uses of the Dark Web While using the dark web may seem suspect on the surface, it is perfectly legal, and there are many legitimate uses of Tor and anonymous browsing For example, In countries where government surveillance may be used to spy on and oppress political dissidents, the dark web is often a place for communication that avoids government censorship and scrutiny
  • 15. Harmful contents of darkweb Due to the dark web's encryption, websites cannot track geolocation or IP address of users. This allows users to talk, blog, transact and share files confidentially. Some contents of Dark web. I. Stolen Information II. Drugs and Stolen Goods III. Disturbing Content IV. Bitcoin Lottery Tickets V. Terrorist Content VI. Hacking Services
  • 16. What You Can Find on the Dark Web? 1) Black markets Black markets have flourished since the birth of the internet. The dark web is home to many black marketplaces, where all sorts of goods can be sold and bought, from cheap Netflix accounts to credit card numbers, weapons, and drugs. 2) Email services Email services on the dark web almost always require you to use Tor and only allow you to send emails to others who are also using Tor.
  • 17. What You Can Find on the Dark Web? 3) File uploads and transfers Secure file uploads and transfers are widespread on the dark web, as the onion network provides several layers of encryption on both your files and connection. Similar to whistleblowing websites, file transfer services are used by journalists and informants to share files with sensitive information. 4) Forums and chat boards There are several message boards and chatrooms on the dark web, often dedicated to topics that aren’t safe to discuss in other parts of the internet.
  • 18. What You Can Find on the Dark Web? 5) Whistleblowing websites Whistleblowers and journalists use the dark web to leak or find sensitive information. People who want to report a company or their government for illegal acts can use Tor to try and stay anonymous. 6) Link directories to access a specific dark website, you need to know the exact URL of that page. And it’s not like these URLs are easy to remember either: they’re strings of random numbers, letters, and special characters there are dedicated pages that can help you find what you’re looking for.
  • 19. The Dark Side of the Dark Web Hackers use the dark web as their playground to sell their services and earn a living. One can hire a hacker or hire an assassin Drug marketplace where drugs are been sold Weapons Child Pornography Red Rooms Human Flesh Disturbing contents and a lot more
  • 20. The Red Room A Red Room is basically a livestream on the deep/dark web where dark web criminals will take people that they have kidnapped and kill them on camera. The human parts are cut out instead of money. The transaction of money on these websites are through Bitcoins. The people also take membership fee to access these Red Rooms. Most of these types of websites are banned by Cyber Police
  • 21. The silk road The first modern dark web market, known for selling drugs created by Ross Ulbricht who was only 31. Ulbricht’s website had more than $1.2 billion in sales for illegal drugs and other products, using cryptocurrency to make the exchanges. Police arrested Ulbricht on Oct. 1, 2013, in the science fiction section of the San Francisco public library. Agents who made the arrest said the young man was literally working on the site when they arrested him. The FBI tracked Ulbricht by tracing some of his early requests to others to help him build the site.
  • 22. How to visit dark web The safest way to get on the dark web is through the Tor network which is a browser support Tor network also known as Tor Browser. Then you will have to get the onion links with .onion extension links because dark websites are not indexed publicly. The easiest way to search for the link are https://onion.live/ Tor supports duckduck go search engine which does not store IP addresses or user information While visiting .onion links or the darkweb one should turn off his/her javascript of the Tor browser.
  • 23. Live Example Open Tor browser and connect to Tor network Search for https://onion.live/ You can see lots of # each # contains onion sites of that particular topic For example I clicked #drugs
  • 24. Live Example After opening the subtopic name DRUGS there are sub sub topics colored in red and green Red ones are dead and green ones are still alive Let us explore the 9th sub-subtopic i.e, ARCHETYP After clicking we will get a brief summary of the site.
  • 25. Live Example After opening the summery we can see they provided with the onion link Its green that means its live so opened it in a new tab
  • 26. Live Example First the site asks for a captcha Most of the darkweb captchas are not easy to solve, though this was easy hence after solving the captcha I entered the site There I was asked to login, So I created a account with temp mail Then again, I solved the captcha and entered the site.
  • 27. Live Example After entering the site I went to the marketplace We can see the screenshot that there are lots of drugs that are been sold.
  • 28. Conclusion Navigating the darkweb can be quite interesting yet you must exercise safety as you ride the dark tunnel. First block web cam, second don’t download anything from the darknet, and lastly don't maximize the tor browser screen. Enjoy surfing!