Invisible Web

Invisible Web
What is the invisible web?
 All information that cannot be indexed using
general web search engines.
 Also known as the deep internet, deepnet, or the
hidden web.
Search Engines
 Programs that search documents for specified
keywords or phrases and returns a list of
documents where the keywords were found.
How Search Engines Work
 Uses a spider program to fetch as many
webpages as possible.
 A program called an indexer then reads these
webpages and creates an index, storing the URL
and important content of webpage.
 Each search engine has its own ranking algorithm
that returns results based on their relevance to
the user’s specified keywords or phrases.
Spider Programs
 Starts by searching heavily used servers and the
most popular web pages.
 Visits all the links found in the webpages it reads
and sends them to the search engine’s indexer in
a process called web crawling, which continues
automatically.
 To be discovered, a webpage must be static and
linked to other pages.
 All pages that are indexed by a search engine’s
spider programs are known as the visible web.
The Invisible Web
 Everything not found by a search engine’s spider
program is part of the invisible web.
 Most webpages on the internet are not indexed
by search engines.
 Some experts estimate that as much as 75% of
the entire internet is invisible web content.
Content Found On The Invisible Web
 Webpages with no links on them, called
disconnected pages.
 Password protected webpages.
 Webpages generated from databases.
 Dynamically generated webpages.
 Real-time content.
 Webpages that require a registration form to
access.
 Webpages with non-html text, or any coding that
a spider program can not understand.
Invisible Web
Advantages Of Invisible Web Content
 Specialized content focus – large amounts of
information focused on an exact subject.
 Contains information that might not be available
on the visible web.
 Allows a user to find a precise answer to a
specific question.
 Allows a user to find webpages from a specific
date or time .
So what is actually on the Deep Web,
and how do we get there?
Deep Web (layer two):
Content that is only available through
specialized anonymizing software (Tor). This
includes anonymity networks and darknets
(anonymous P2P). This are is a sort of safe-
haven for speech and content which has been
banned from the surface web.
examples: Anonymous chat/imageboards.
CP, drugs, illeagal transactions, weapons, DRM
removal software, pirated software/media/
books, black markets
Accessing the Deep Web
.onion:
.onion is a domain host suffix designating an anonymous
hidden service reachable via the Tor network.
-The purpose of using such a system is to make both the
information provider and the person accessing the
information more difficult to trace, whether by one
another, by an intermediate network host, or by an
outsider.
.onion adresses are 16-character non-mneumonic
hashes, compromised of alphabetic and numeric strings.
The "onion" name refers to onion routing, the technique
used by Tor to achieve a degree of anonymity.
Accessing the Deep Web
Tor:
” The Tor software protects you by bouncing your
communications around a distributed network of relays run by
volunteers all around the world: it prevents somebody watching your
Internet connection from learning what sites you visit, it prevents the
sites you visit from learning your physical location, and it lets you
access sites which are blocked.” –
www.torproject.org
Tor is a network that supports onion routing; a way to help make
your traffic anonymous. Because the Deep Web is compromised of
information that doesn’t show up on search engines, or has no
domain name registry, you must know exactly where you are going to
get there.
The first step is to download, install, and run the Tor Bundle. This will bring up your new
anonymous browser (through Firefox) in order to get started.
Guided Journey Through the Deep Web
The deep web is vast, as we covered before, and most is private.
Here we will go through some examples of websites on the Deep
Web, how online currency works, and the various resources the Deep
Web encompasses (not all entirely legal)
This content can be disturbing. Obviously with great resources such
as free library databases, and banned books, comes information that
is considered scat. Being a safe-haven from the censorship of the
surface web, there is a lot of CP, arms/drug trade, and other illegal
information on the Deep Web. It’s up to you as an individual to steer
clear of what you don’t want to see.
In addition, one must also be skeptical. There are even sites
dedicated to contract killing, but one can’t be sure that these
websites are even serious.
The next step is to access the Hidden Wiki, which most people consider the home page of the Deep Web.
Here you can begin your journey and discover many different types of sites and networks, ranging from tame
to very illegal. There are black market type sites, hacking information sites, huge file databases, political
advocacy sites, and even sites to hire people to engage in illegal activity.
One of the other “main pages” of the Deep Web is TorDir. TorDir is a site that uses a special crawler for the
Deep Web, so that it may act similar to Google in that it categorizes web sites, and allows you to view many
different and obscure .onion sites that fall into each category.
Through the Hidden Wiki you can find pages like this, which are semi-organized lists of different .onion sites.
Many different sites are listed and separated based on function, such as buying/selling/trading,
communication, hacking, or intel exchange.
Currency of the Deep Web
Bitcoins:
An electronic cash system using peer-to-peer networking, digital
signatures and cryptographic proof to enable irreversible payments
between parties without relying on trust. Payments are issued and
transferred by the Bitcoin network.
Participants begin using Bitcoin by first acquiring a Bitcoin wallet and one
or more Bitcoin addresses. Bitcoin addresses are used for receiving
Bitcoins, similar to how e-mail addresses are used for receiving e-mail.
In April 2012, 1 BTC traded at around $4.80. Taking into account the total
number of Bitcoins in circulation, the market capitalization of the Bitcoin
network stands at over 40 million USD.
This is an example of one of the many online black markets. This one did not require a paid
membership. There are many different ways to spend bit coins, such as on apparel, money
transfers, drugs, books, and even digital goods.
This is an example of someone’s own personal page, with content picked out due to it’s
controversial nature. Here you can find anything from banned readings, to trefelling. There is
content on making one’s own explosives, and many different military type documents and
guidebooks.
There is a huge portion of the Deep Web that is not malicious at all. This is a huge database of
banned, black listed, and forbidden books which you can read and download. Books have been
burned in the past and banned for their controversial subject matter, and this is a way for
history to be preserved.
Another scholarly database, this .onion site is a compilation of financial, business, real estate,
and even marketing tools and texts free to anyone who wants to download them. The Deep
Web is a great archive for educational material.
The Deep Web is full of malicious content. On this Russian-based community hacking website,
one can purchase credit card information, PayPal account information, bank accounts, and even
the service of DDoSing a website. This is when the website is overloaded with information sent
to it, and eventually is forced to shut down.
Dangers of the Deep Web
If you decide to look into the Deep Web on your own volition,
make sure to be careful.
 Have anti-virus protection.
 Be intelligent about what links you click. The Deep Web is a
haven for Phishers.
 If you don’t want to see any disturbing images or content,
simply browse as text-only.
Invisible Web
Invisible Web
1 de 26

Recomendados

The Deep WebThe Deep Web
The Deep WebMelissa Pereira
2K visualizações18 slides
Deep webDeep web
Deep webProgramar Animesh
973 visualizações29 slides
Dark web presentationDark web presentation
Dark web presentationTo Mal
5.4K visualizações18 slides
Deep web and dark webDeep web and dark web
Deep web and dark webVaishali Misra
895 visualizações17 slides

Mais conteúdo relacionado

Mais procurados

Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine ImpasClaudine Impas
768 visualizações6 slides
The Dark WebThe Dark Web
The Dark Webjamiecornista
11.6K visualizações6 slides
Dark wedDark wed
Dark wedAraVind Pillai
2.3K visualizações12 slides
Deep webDeep web
Deep webDerek de los Reyes
1.1K visualizações6 slides

Mais procurados(20)

Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
Claudine Impas768 visualizações
The Dark WebThe Dark Web
The Dark Web
jamiecornista11.6K visualizações
Dark wedDark wed
Dark wed
AraVind Pillai2.3K visualizações
Deep webDeep web
Deep web
Derek de los Reyes1.1K visualizações
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
Bich (Evelyn) Chu542 visualizações
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho3.3K visualizações
Deep webDeep web
Deep web
GauravPandey319104 visualizações
My darkweb-presentationMy darkweb-presentation
My darkweb-presentation
Paul Wilson5.1K visualizações
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
Swecha | స్వేచ్ఛ27.6K visualizações
The dark webThe dark web
The dark web
Bella M8.6K visualizações
Deep WebDeep Web
Deep Web
Ahmed Khan3K visualizações
Deep or dark webDeep or dark web
Deep or dark web
Shubham .1K visualizações
DarknetDarknet
Darknet
KamalPreet Saluja433 visualizações
Deep web & DarknetDeep web & Darknet
Deep web & Darknet
Niloy Sikder4.5K visualizações
Deep webDeep web
Deep web
Rawin Windygallery4.6K visualizações
The Dark WebThe Dark Web
The Dark Web
Connor Willer3.2K visualizações
The Hidden WebThe Hidden Web
The Hidden Web
Jon Kane301 visualizações
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
Cysinfo Cyber Security Community4K visualizações
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar3K visualizações

Similar a Invisible Web

Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
1.2K visualizações28 slides
Dark Web.pptxDark Web.pptx
Dark Web.pptxeliofatjon
3 visualizações34 slides
Wp below the_surfaceWp below the_surface
Wp below the_surfaceMedina Núñez
3.5K visualizações48 slides
Research in the deep webResearch in the deep web
Research in the deep webSeth Porter, MA, MLIS
515 visualizações26 slides
Deep WebDeep Web
Deep WebRahulPawar320
6 visualizações2 slides

Similar a Invisible Web (20)

Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar1.2K visualizações
Dark Web.pptxDark Web.pptx
Dark Web.pptx
eliofatjon3 visualizações
Wp below the_surfaceWp below the_surface
Wp below the_surface
Medina Núñez3.5K visualizações
Research in the deep webResearch in the deep web
Research in the deep web
Seth Porter, MA, MLIS515 visualizações
Deep WebDeep Web
Deep Web
RahulPawar3206 visualizações
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptx
ismailwinofo10 visualizações
Internet PredatorsInternet Predators
Internet Predators
Lindsey Rivera2 visualizações
Understanding The Basis Of The Dark WebUnderstanding The Basis Of The Dark Web
Understanding The Basis Of The Dark Web
Carolina Fox6 visualizações
Dark WebDark Web
Dark Web
KunalDas889957228 visualizações
Dark Web.pptxDark Web.pptx
Dark Web.pptx
Soumen Debgupta4 visualizações
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
Gavin O'Toole526 visualizações
Dw communicationDw communication
Dw communication
Arjun Chetry24 visualizações
Deep WebDeep Web
Deep Web
AbishaiDas175 visualizações
unit-1.pptxunit-1.pptx
unit-1.pptx
Srinivas Kanakala15 visualizações
DarknetDarknet
Darknet
BijayKumarSingh1192 visualizações
Dark webDark web
Dark web
VaishnaviSrivastava1841 visualizações
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
Mohammed Bharmal2.6K visualizações
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
IRJET Journal30 visualizações
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
Marlabs948 visualizações

Último(20)

UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity87 visualizações
Serverless cloud architecture patternsServerless cloud architecture patterns
Serverless cloud architecture patterns
Jimmy Dahlqvist17 visualizações
zotabet.pdfzotabet.pdf
zotabet.pdf
zotabetcasino6 visualizações
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04106 visualizações
informationinformation
information
khelgishekhar6 visualizações
UiPath Document Understanding_Day 2.pptxUiPath Document Understanding_Day 2.pptx
UiPath Document Understanding_Day 2.pptx
RohitRadhakrishnan8265 visualizações
childcare.pdfchildcare.pdf
childcare.pdf
fatma alnaqbi13 visualizações
Sustainable MarketingSustainable Marketing
Sustainable Marketing
Theo van der Zee7 visualizações
Existing documentaries (1).docxExisting documentaries (1).docx
Existing documentaries (1).docx
MollyBrown8613 visualizações
KHNOG 5: RPKI Status UpdateKHNOG 5: RPKI Status Update
KHNOG 5: RPKI Status Update
APNIC401 visualizações
KHNOG 5: APNIC ServicesKHNOG 5: APNIC Services
KHNOG 5: APNIC Services
APNIC414 visualizações
Audience profile.pptxAudience profile.pptx
Audience profile.pptx
MollyBrown8612 visualizações
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptx
narmadhamanohar218 visualizações
AI Powered event-driven translation botAI Powered event-driven translation bot
AI Powered event-driven translation bot
Jimmy Dahlqvist16 visualizações
informing ideas.docxinforming ideas.docx
informing ideas.docx
MollyBrown8612 visualizações
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC43 visualizações
DU Series - Day 4.pptxDU Series - Day 4.pptx
DU Series - Day 4.pptx
UiPathCommunity77 visualizações

Invisible Web

  • 2. What is the invisible web?  All information that cannot be indexed using general web search engines.  Also known as the deep internet, deepnet, or the hidden web.
  • 3. Search Engines  Programs that search documents for specified keywords or phrases and returns a list of documents where the keywords were found.
  • 4. How Search Engines Work  Uses a spider program to fetch as many webpages as possible.  A program called an indexer then reads these webpages and creates an index, storing the URL and important content of webpage.  Each search engine has its own ranking algorithm that returns results based on their relevance to the user’s specified keywords or phrases.
  • 5. Spider Programs  Starts by searching heavily used servers and the most popular web pages.  Visits all the links found in the webpages it reads and sends them to the search engine’s indexer in a process called web crawling, which continues automatically.  To be discovered, a webpage must be static and linked to other pages.  All pages that are indexed by a search engine’s spider programs are known as the visible web.
  • 6. The Invisible Web  Everything not found by a search engine’s spider program is part of the invisible web.  Most webpages on the internet are not indexed by search engines.  Some experts estimate that as much as 75% of the entire internet is invisible web content.
  • 7. Content Found On The Invisible Web  Webpages with no links on them, called disconnected pages.  Password protected webpages.  Webpages generated from databases.  Dynamically generated webpages.  Real-time content.  Webpages that require a registration form to access.  Webpages with non-html text, or any coding that a spider program can not understand.
  • 9. Advantages Of Invisible Web Content  Specialized content focus – large amounts of information focused on an exact subject.  Contains information that might not be available on the visible web.  Allows a user to find a precise answer to a specific question.  Allows a user to find webpages from a specific date or time .
  • 10. So what is actually on the Deep Web, and how do we get there? Deep Web (layer two): Content that is only available through specialized anonymizing software (Tor). This includes anonymity networks and darknets (anonymous P2P). This are is a sort of safe- haven for speech and content which has been banned from the surface web. examples: Anonymous chat/imageboards. CP, drugs, illeagal transactions, weapons, DRM removal software, pirated software/media/ books, black markets
  • 11. Accessing the Deep Web .onion: .onion is a domain host suffix designating an anonymous hidden service reachable via the Tor network. -The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider. .onion adresses are 16-character non-mneumonic hashes, compromised of alphabetic and numeric strings. The "onion" name refers to onion routing, the technique used by Tor to achieve a degree of anonymity.
  • 12. Accessing the Deep Web Tor: ” The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.” – www.torproject.org Tor is a network that supports onion routing; a way to help make your traffic anonymous. Because the Deep Web is compromised of information that doesn’t show up on search engines, or has no domain name registry, you must know exactly where you are going to get there.
  • 13. The first step is to download, install, and run the Tor Bundle. This will bring up your new anonymous browser (through Firefox) in order to get started.
  • 14. Guided Journey Through the Deep Web The deep web is vast, as we covered before, and most is private. Here we will go through some examples of websites on the Deep Web, how online currency works, and the various resources the Deep Web encompasses (not all entirely legal) This content can be disturbing. Obviously with great resources such as free library databases, and banned books, comes information that is considered scat. Being a safe-haven from the censorship of the surface web, there is a lot of CP, arms/drug trade, and other illegal information on the Deep Web. It’s up to you as an individual to steer clear of what you don’t want to see. In addition, one must also be skeptical. There are even sites dedicated to contract killing, but one can’t be sure that these websites are even serious.
  • 15. The next step is to access the Hidden Wiki, which most people consider the home page of the Deep Web. Here you can begin your journey and discover many different types of sites and networks, ranging from tame to very illegal. There are black market type sites, hacking information sites, huge file databases, political advocacy sites, and even sites to hire people to engage in illegal activity.
  • 16. One of the other “main pages” of the Deep Web is TorDir. TorDir is a site that uses a special crawler for the Deep Web, so that it may act similar to Google in that it categorizes web sites, and allows you to view many different and obscure .onion sites that fall into each category.
  • 17. Through the Hidden Wiki you can find pages like this, which are semi-organized lists of different .onion sites. Many different sites are listed and separated based on function, such as buying/selling/trading, communication, hacking, or intel exchange.
  • 18. Currency of the Deep Web Bitcoins: An electronic cash system using peer-to-peer networking, digital signatures and cryptographic proof to enable irreversible payments between parties without relying on trust. Payments are issued and transferred by the Bitcoin network. Participants begin using Bitcoin by first acquiring a Bitcoin wallet and one or more Bitcoin addresses. Bitcoin addresses are used for receiving Bitcoins, similar to how e-mail addresses are used for receiving e-mail. In April 2012, 1 BTC traded at around $4.80. Taking into account the total number of Bitcoins in circulation, the market capitalization of the Bitcoin network stands at over 40 million USD.
  • 19. This is an example of one of the many online black markets. This one did not require a paid membership. There are many different ways to spend bit coins, such as on apparel, money transfers, drugs, books, and even digital goods.
  • 20. This is an example of someone’s own personal page, with content picked out due to it’s controversial nature. Here you can find anything from banned readings, to trefelling. There is content on making one’s own explosives, and many different military type documents and guidebooks.
  • 21. There is a huge portion of the Deep Web that is not malicious at all. This is a huge database of banned, black listed, and forbidden books which you can read and download. Books have been burned in the past and banned for their controversial subject matter, and this is a way for history to be preserved.
  • 22. Another scholarly database, this .onion site is a compilation of financial, business, real estate, and even marketing tools and texts free to anyone who wants to download them. The Deep Web is a great archive for educational material.
  • 23. The Deep Web is full of malicious content. On this Russian-based community hacking website, one can purchase credit card information, PayPal account information, bank accounts, and even the service of DDoSing a website. This is when the website is overloaded with information sent to it, and eventually is forced to shut down.
  • 24. Dangers of the Deep Web If you decide to look into the Deep Web on your own volition, make sure to be careful.  Have anti-virus protection.  Be intelligent about what links you click. The Deep Web is a haven for Phishers.  If you don’t want to see any disturbing images or content, simply browse as text-only.