SlideShare uma empresa Scribd logo
1 de 47
Scary Halloween Lecture 365/765
The Deep Web—From Spooky to Creepy
Presented by Nicholas Davis, CISSP, CISA
This presentation contains explicit content,
which some people may find offensive.
The examples shown do not represent my
views or opinions, and are used for
demonstration only.
I do not endorse the use of the Deep Web
for unethical or illicit activities.
10/26/16 UNIVERSITY OF WISCONSIN 2
Session OverviewSession Overview
Introduction and Warning
The Deep Web Defined
Dynamic Content
Unlinked Content
Private Web
Contextual Web
Limited Access Content
Scripted Content
Non-HTML Content
Deep Web Search Engines & Tor Client
Examples of what can found on the Deep Web
Exciting Documentary Video
Question and Answer session
10/26/16 UNIVERSITY OF WISCONSIN 3
Some DefinitionsSome Definitions
Deep Web, Deep Net, Invisible Web, or
Hidden Web is not part of the Surface
Web (that which is normally accessed).
Do not confuse it with the Dark Internet,
which refers to computers which can no
longer be reached over the Internet
Some people think that the Deep Web is
a haven for serious criminality, and I
agree with them
10/26/16 UNIVERSITY OF WISCONSIN 4
Normal Web SearchNormal Web Search
vs. Deep Web Searchvs. Deep Web Search
Searching on the Internet today can be
compared to dragging a net across the
surface of the ocean: a great deal may be
caught in the net, but there is a wealth of
information that is deep and therefore
missed
10/26/16 UNIVERSITY OF WISCONSIN 5
Normal Web SearchNormal Web Search
vs. Deep Web Searchvs. Deep Web Search
Traditional search engines cannot see or
retrieve content in the deep Web—those
pages do not exist until they are created
dynamically as the result of a specific
search. As of 2001, the deep Web was
several orders of magnitude larger than
the surface Web
10/26/16 UNIVERSITY OF WISCONSIN 6
Deep Web SizeDeep Web Size
It is impossible to measure
or put estimates onto the
size of the deep web
because the majority of the
information is hidden or
locked inside databases.
Early estimates suggested
that the deep web is 4,000
to 5,000 times larger than
the surface web
10/26/16 UNIVERSITY OF WISCONSIN 7
Deep Web ResourcesDeep Web Resources
Dynamic ContentDynamic Content
Dynamic pages which are returned in
response to a submitted query or
accessed only through a form, especially
if open-domain input elements (such as
text fields) are used; such fields are hard
to navigate without domain knowledge.
10/26/16 UNIVERSITY OF WISCONSIN 8
Deep Web ResourcesDeep Web Resources
Unlinked ContentUnlinked Content
Unlinked content: pages which are not
linked to by other pages, which may
prevent Web crawling programs from
accessing the content. This content is
referred to as pages without backlinks
(or inlinks).
10/26/16 UNIVERSITY OF WISCONSIN 9
Deep Web ResourcesDeep Web Resources
Private WebPrivate Web
Private Web: sites that require
registration and login (password-
protected resources).
10/26/16 UNIVERSITY OF WISCONSIN 10
Deep Web ResourcesDeep Web Resources
Contextual WebContextual Web
Contextual Web:
pages with content
varying for different
access contexts (e.g.,
ranges of client IP
addresses or previous
navigation sequence).
10/26/16 UNIVERSITY OF WISCONSIN 11
Deep Web ResourcesDeep Web Resources
Limited Access ContentLimited Access Content
Limited access content: sites that limit
access to their pages in a technical way
(e.g., using the Robots Exclusion
Standard or CAPTCHAs, or no-store
directive which prohibit search engines
from browsing them and creating
cached copies
10/26/16 UNIVERSITY OF WISCONSIN 12
Deep Web ResourcesDeep Web Resources
Scripted ContentScripted Content
Scripted content: pages that are only
accessible through links produced by
JavaScript as well as content
dynamically downloaded from Web
servers via Flash or Ajax solutions.
10/26/16 UNIVERSITY OF WISCONSIN 13
Deep Web ResourcesDeep Web Resources
Non HTML ContentNon HTML Content
Non-HTML/text
content: textual
content encoded
in multimedia
(image or video)
files or specific
file formats not
handled by
search engines.
10/26/16 UNIVERSITY OF WISCONSIN 14
Accessing the Deep WebAccessing the Deep Web
While it is not always possible to
discover a specific web server's external
IP address, theoretically almost any site
can be accessed via its IP address,
regardless of whether or not it has been
indexed.
10/26/16 UNIVERSITY OF WISCONSIN 15
Accessing the Deep WebAccessing the Deep Web
Certain content is
intentionally hidden from
the regular internet,
accessible only with special
software, such as Tor. Tor
allows users to access
websites using the .onion
host suffix anonymously,
hiding their IP address.
Other such software includes
I2P and Freenet.
10/26/16 UNIVERSITY OF WISCONSIN 16
The Onion Router (Tor)The Onion Router (Tor)
Tool For the Deep WebTool For the Deep Web
Tor is software that installs into your
browser and sets up the specific
connections you need to access dark
Web sites. Critically, Tor is an encrypted
technology that helps people maintain
anonymity online. It does this in part by
routing connections through servers
around the world, making them much
harder to track.
10/26/16 UNIVERSITY OF WISCONSIN 17
Who Invented Tor?Who Invented Tor?
Oddly enough, Tor is the result of research
done by the U.S. Naval Research
Laboratory, which created Tor for political
dissidents and whistleblowers, allowing
them to communicate without fear of
reprisal.
10/26/16 UNIVERSITY OF WISCONSIN 18
Tor Client AvailableTor Client Available
For DownloadFor Download
10/26/16 UNIVERSITY OF WISCONSIN 19
Accessing the Deep WebAccessing the Deep Web
.onion.onion
.onion is a pseudo-top-level domain host
suffix designating an anonymous hidden
service reachable via the Tor network.
Such addresses are not actual DNS
names, and the .onion TLD is not in the
Internet DNS root, but with the
appropriate proxy software installed,
Internet programs such as Web
browsers can access sites with .onion
addresses by sending the request
through the network of Tor servers.
10/26/16 UNIVERSITY OF WISCONSIN 20
Accessing the Deep WebAccessing the Deep Web
Tor2web
10/26/16 UNIVERSITY OF WISCONSIN 21
What Deep Web LinksWhat Deep Web Links
Look LikeLook Like
Deep Web links
appear as a random
string of letters
followed by the .onion
TLD. For example,
http://xmh57jrzrnw6i
nsl followed by .onion,
links to TORCH, the
Tor search engine web
page.
10/26/16 UNIVERSITY OF WISCONSIN 22
Searching the Deep WebSearching the Deep Web
To discover content on the
Web, search engines use web
crawlers that follow
hyperlinks through known
protocol virtual port
numbers. This technique is
ideal for discovering
resources on the surface
Web but is often ineffective
at finding Deep Web
resources.
10/26/16 UNIVERSITY OF WISCONSIN 23
Give the People What TheyGive the People What They
Came Here For, Tonight!Came Here For, Tonight!
Just like general web search, searching
the Invisible Web is also about looking
for the needle in the haystack. Only
here, the haystack is much bigger. The
Invisible Web is definitely not for the
casual searcher. It is a deep but not dark
because if you know what you are
searching for, enlightenment is a few
keywords away.
10/26/16 UNIVERSITY OF WISCONSIN 24
Deep Web SearchDeep Web Search
EnginesEngines
10/26/16 UNIVERSITY OF WISCONSIN 25
Deep Web SearchDeep Web Search
infomineinfomine
http://infomine.ucr.edu/
Infomine has been built by a pool of
libraries in the United States. Some of them
are University of California, Wake Forest
University, California State University, and
the University of Detroit. Infomine ‘mines’
information from databases, electronic
journals, electronic books, bulletin boards,
mailing lists, online library card catalogs,
articles, directories of researchers, and
many other resources.
10/26/16 UNIVERSITY OF WISCONSIN 26
Deep Web SearchDeep Web Search
The WWW Virtual LibraryThe WWW Virtual Library
http://vlib.org/
This is considered to be the oldest
catalog on the web and was started by
started by Tim Berners-Lee, the creator
of the web. So, isn’t it strange that it
finds a place in the list of Invisible Web
resources? Maybe, but the WWW
Virtual Library lists quite a lot of
relevant resources on quite a lot of
subjects.
10/26/16 UNIVERSITY OF WISCONSIN 27
Deep Web SearchDeep Web Search
Complete PlanetComplete Planet
http://aip.completeplanet.com/
Complete Planet calls itself the ‘front door to
the Deep Web’. This free and well designed
directory resource makes it easy to access the
mass of dynamic databases that are cloaked
from a general purpose search. The databases
indexed by Complete Planet number around
70,000 and range from Agriculture to Weather.
Also thrown in are databases like Food & Drink
and Military.
For a really effective Deep Web search, try out
the Advanced Search options where among
other things, you can set a date range.
10/26/16 UNIVERSITY OF WISCONSIN 28
Deep Web SearchDeep Web Search
DeepPeepDeepPeep
http://www.deeppeep.org/
DeepPeep aims to enter the Invisible Web
through forms that query databases and web
services for information. Typed queries open
up dynamic but short lived results which
cannot be indexed by normal search engines.
By indexing databases, DeepPeep hopes to
track 45,000 forms across 7 domains.
The domains covered by DeepPeep (Beta) are
Auto, Airfare, Biology, Book, Hotel, Job, and
Rental. Being a beta service, there are
occasional glitches as some results don’t load in
the browser.
10/26/16 UNIVERSITY OF WISCONSIN 29
Deep Web SearchDeep Web Search
IncyWincyIncyWincy
http://www.incywincy.com/
IncyWincy is an Invisible Web search
engine and it behaves as a meta-search
engine by tapping into other search
engines and filtering the results. It
searches the web, directory, forms, and
images. With a free registration, you can
track search results with alerts.
10/26/16 UNIVERSITY OF WISCONSIN 30
Deep Web SearchDeep Web Search
DeepWebTechDeepWebTech
http://www.deepwebtech.com/
DeepWebTech gives you five search
engines (and browser plugins) for
specific topics. The search engines cover
science, medicine, and business. Using
these topic specific search engines, you
can query the underlying databases in
the Deep Web.
10/26/16 UNIVERSITY OF WISCONSIN 31
Deep Web SearchDeep Web Search
ScirusScirus
http://www.scirus.com/srsapp/
Scirus has a pure scientific focus. It is a
far reaching research engine that can
scour journals, scientists’ homepages,
courseware, pre-print server material,
patents and institutional intranets.
10/26/16 UNIVERSITY OF WISCONSIN 32
Deep Web SearchDeep Web Search
TechXtraTechXtra
http://www.techxtra.ac.uk/index.html
TechXtra concentrates on engineering,
mathematics and computing. It gives
you industry news, job announcements,
technical reports, technical data, full text
eprints, teaching and learning resources
along with articles and relevant website
information.
10/26/16 UNIVERSITY OF WISCONSIN 33
Bitcoin, The Currency of theBitcoin, The Currency of the
Deep WebDeep Web
• While not completely
anonymous, when
used correctly, it is
very difficult to track
down the true
owner/identity
• Not regulated by any
government or
corporate entity
10/26/16 UNIVERSITY OF WISCONSIN 34
Be Careful of What YouBe Careful of What You
Search For, You Might Just Find ItSearch For, You Might Just Find It
10/26/16 UNIVERSITY OF WISCONSIN 35
Deep WebDeep Web
Dangerous WebDangerous Web
10/26/16 UNIVERSITY OF WISCONSIN 36
Deep WebDeep Web
Dangerous WebDangerous Web
10/26/16 UNIVERSITY OF WISCONSIN 37
Deep Web, Dangerous WebDeep Web, Dangerous Web
SteganographySteganography
(ste-g&n-o´gr&-fē) (n.) The art and
science of hiding information by
embedding messages within other,
seemingly harmless messages
10/26/16 UNIVERSITY OF WISCONSIN 38
Deep WebDeep Web
Dangerous WebDangerous Web
10/26/16 UNIVERSITY OF WISCONSIN 39
Deep WebDeep Web
Dangerous WebDangerous Web
10/26/16 UNIVERSITY OF WISCONSIN 40
Deep WebDeep Web
Dangerous WebDangerous Web
10/26/16 UNIVERSITY OF WISCONSIN 41
Deep WebDeep Web
Dangerous WebDangerous Web
10/26/16 UNIVERSITY OF WISCONSIN 42
Deep WebDeep Web
Dangerous WebDangerous Web
10/26/16 UNIVERSITY OF WISCONSIN 43
Deep WebDeep Web
Dangerous WebDangerous Web
10/26/16 UNIVERSITY OF WISCONSIN 44
Deep WebDeep Web
Dangerous WebDangerous Web
10/26/16 UNIVERSITY OF WISCONSIN 45
Deep WebDeep Web
Dangerous WebDangerous Web
10/26/16 UNIVERSITY OF WISCONSIN 46
10/26/16 UNIVERSITY OF WISCONSIN 47

Mais conteúdo relacionado

Mais procurados

Deep web & Darknet
Deep web & DarknetDeep web & Darknet
Deep web & DarknetNiloy Sikder
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep WebIRJET Journal
 
Concept ofinternet web_f2010211
Concept ofinternet web_f2010211Concept ofinternet web_f2010211
Concept ofinternet web_f2010211Kh Ravy
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanEC-Council
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight IntelliaggGavin O'Toole
 

Mais procurados (7)

The deepweb
The deepwebThe deepweb
The deepweb
 
Deep web & Darknet
Deep web & DarknetDeep web & Darknet
Deep web & Darknet
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
Concept ofinternet web_f2010211
Concept ofinternet web_f2010211Concept ofinternet web_f2010211
Concept ofinternet web_f2010211
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
 
Deep web
Deep webDeep web
Deep web
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 

Destaque

TUSHAR MATE RESUME
TUSHAR MATE RESUMETUSHAR MATE RESUME
TUSHAR MATE RESUMETushar Mate
 
University of Derby Diplomas
University of Derby DiplomasUniversity of Derby Diplomas
University of Derby DiplomasGiovane Bertuol
 
EMD Strategies Services
EMD Strategies ServicesEMD Strategies Services
EMD Strategies ServicesSelena Beltran
 
Telecom consumer plans :1-The architecture
Telecom consumer plans :1-The architectureTelecom consumer plans :1-The architecture
Telecom consumer plans :1-The architectureMohammad Ghazizadeh
 
Jboad formation-jboss-administration
Jboad formation-jboss-administrationJboad formation-jboss-administration
Jboad formation-jboss-administrationCERTyou Formation
 
Motivator indonesia
Motivator indonesiaMotivator indonesia
Motivator indonesiaiwel sastra
 
Sobrellevando la diabetes
Sobrellevando la diabetesSobrellevando la diabetes
Sobrellevando la diabetesLiberty Medical
 
Where streaming rugby between ((( crusaders vs lions ))) 14 march
Where streaming rugby between ((( crusaders vs lions ))) 14 marchWhere streaming rugby between ((( crusaders vs lions ))) 14 march
Where streaming rugby between ((( crusaders vs lions ))) 14 marchwilmer_kk
 
Sessie d presentatie wim bewegend doel
Sessie d presentatie wim bewegend doelSessie d presentatie wim bewegend doel
Sessie d presentatie wim bewegend doelPraktijkleerstoel
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...Spark Security
 
Resposta a Incidentes de Segurança com ferramentas SIEM
Resposta a Incidentes de Segurança com ferramentas SIEMResposta a Incidentes de Segurança com ferramentas SIEM
Resposta a Incidentes de Segurança com ferramentas SIEMSpark Security
 

Destaque (14)

TUSHAR MATE RESUME
TUSHAR MATE RESUMETUSHAR MATE RESUME
TUSHAR MATE RESUME
 
University of Derby Diplomas
University of Derby DiplomasUniversity of Derby Diplomas
University of Derby Diplomas
 
EMD Strategies Services
EMD Strategies ServicesEMD Strategies Services
EMD Strategies Services
 
Telecom consumer plans :1-The architecture
Telecom consumer plans :1-The architectureTelecom consumer plans :1-The architecture
Telecom consumer plans :1-The architecture
 
Jboad formation-jboss-administration
Jboad formation-jboss-administrationJboad formation-jboss-administration
Jboad formation-jboss-administration
 
Motivator indonesia
Motivator indonesiaMotivator indonesia
Motivator indonesia
 
Sobrellevando la diabetes
Sobrellevando la diabetesSobrellevando la diabetes
Sobrellevando la diabetes
 
Iui formation-iui
Iui formation-iuiIui formation-iui
Iui formation-iui
 
Where streaming rugby between ((( crusaders vs lions ))) 14 march
Where streaming rugby between ((( crusaders vs lions ))) 14 marchWhere streaming rugby between ((( crusaders vs lions ))) 14 march
Where streaming rugby between ((( crusaders vs lions ))) 14 march
 
Sessie d presentatie wim bewegend doel
Sessie d presentatie wim bewegend doelSessie d presentatie wim bewegend doel
Sessie d presentatie wim bewegend doel
 
Process modelling at BaneDanmark
Process modelling at BaneDanmarkProcess modelling at BaneDanmark
Process modelling at BaneDanmark
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
 
Resposta a Incidentes de Segurança com ferramentas SIEM
Resposta a Incidentes de Segurança com ferramentas SIEMResposta a Incidentes de Segurança com ferramentas SIEM
Resposta a Incidentes de Segurança com ferramentas SIEM
 

Semelhante a Scary Halloween Lecture on Deep Web

Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxismailwinofo
 
LODLAM Landscape NOTES
LODLAM Landscape NOTESLODLAM Landscape NOTES
LODLAM Landscape NOTESShana McDanold
 
Presentation Deep Web Technology.pptx
Presentation Deep Web Technology.pptxPresentation Deep Web Technology.pptx
Presentation Deep Web Technology.pptxmayurbokan
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Internert workshop
Internert workshop Internert workshop
Internert workshop sofiag000414
 
SIOC: Semantic Web for Social Media Sites
SIOC: Semantic Web for Social Media SitesSIOC: Semantic Web for Social Media Sites
SIOC: Semantic Web for Social Media SitesUldis Bojars
 
Introduction to the Social Semantic Web
Introduction to the Social Semantic WebIntroduction to the Social Semantic Web
Introduction to the Social Semantic Webmdabrowski
 

Semelhante a Scary Halloween Lecture on Deep Web (20)

Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Deep web
Deep webDeep web
Deep web
 
Deep web Seminar
Deep web Seminar Deep web Seminar
Deep web Seminar
 
L017447590
L017447590L017447590
L017447590
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Deep Web
Deep WebDeep Web
Deep Web
 
Darknet
DarknetDarknet
Darknet
 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptx
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
LODLAM Landscape NOTES
LODLAM Landscape NOTESLODLAM Landscape NOTES
LODLAM Landscape NOTES
 
Deep web
Deep webDeep web
Deep web
 
Presentation Deep Web Technology.pptx
Presentation Deep Web Technology.pptxPresentation Deep Web Technology.pptx
Presentation Deep Web Technology.pptx
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Internert workshop
Internert workshop Internert workshop
Internert workshop
 
World Wide Web
World Wide WebWorld Wide Web
World Wide Web
 
SIOC: Semantic Web for Social Media Sites
SIOC: Semantic Web for Social Media SitesSIOC: Semantic Web for Social Media Sites
SIOC: Semantic Web for Social Media Sites
 
Internet(Internetwork)
Internet(Internetwork)Internet(Internetwork)
Internet(Internetwork)
 
Chapter1.pptx
Chapter1.pptxChapter1.pptx
Chapter1.pptx
 
Introduction to the Social Semantic Web
Introduction to the Social Semantic WebIntroduction to the Social Semantic Web
Introduction to the Social Semantic Web
 

Mais de Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional CertificationsNicholas Davis
 

Mais de Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
 

Último

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 

Último (20)

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 

Scary Halloween Lecture on Deep Web

  • 1. Scary Halloween Lecture 365/765 The Deep Web—From Spooky to Creepy Presented by Nicholas Davis, CISSP, CISA
  • 2. This presentation contains explicit content, which some people may find offensive. The examples shown do not represent my views or opinions, and are used for demonstration only. I do not endorse the use of the Deep Web for unethical or illicit activities. 10/26/16 UNIVERSITY OF WISCONSIN 2
  • 3. Session OverviewSession Overview Introduction and Warning The Deep Web Defined Dynamic Content Unlinked Content Private Web Contextual Web Limited Access Content Scripted Content Non-HTML Content Deep Web Search Engines & Tor Client Examples of what can found on the Deep Web Exciting Documentary Video Question and Answer session 10/26/16 UNIVERSITY OF WISCONSIN 3
  • 4. Some DefinitionsSome Definitions Deep Web, Deep Net, Invisible Web, or Hidden Web is not part of the Surface Web (that which is normally accessed). Do not confuse it with the Dark Internet, which refers to computers which can no longer be reached over the Internet Some people think that the Deep Web is a haven for serious criminality, and I agree with them 10/26/16 UNIVERSITY OF WISCONSIN 4
  • 5. Normal Web SearchNormal Web Search vs. Deep Web Searchvs. Deep Web Search Searching on the Internet today can be compared to dragging a net across the surface of the ocean: a great deal may be caught in the net, but there is a wealth of information that is deep and therefore missed 10/26/16 UNIVERSITY OF WISCONSIN 5
  • 6. Normal Web SearchNormal Web Search vs. Deep Web Searchvs. Deep Web Search Traditional search engines cannot see or retrieve content in the deep Web—those pages do not exist until they are created dynamically as the result of a specific search. As of 2001, the deep Web was several orders of magnitude larger than the surface Web 10/26/16 UNIVERSITY OF WISCONSIN 6
  • 7. Deep Web SizeDeep Web Size It is impossible to measure or put estimates onto the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 4,000 to 5,000 times larger than the surface web 10/26/16 UNIVERSITY OF WISCONSIN 7
  • 8. Deep Web ResourcesDeep Web Resources Dynamic ContentDynamic Content Dynamic pages which are returned in response to a submitted query or accessed only through a form, especially if open-domain input elements (such as text fields) are used; such fields are hard to navigate without domain knowledge. 10/26/16 UNIVERSITY OF WISCONSIN 8
  • 9. Deep Web ResourcesDeep Web Resources Unlinked ContentUnlinked Content Unlinked content: pages which are not linked to by other pages, which may prevent Web crawling programs from accessing the content. This content is referred to as pages without backlinks (or inlinks). 10/26/16 UNIVERSITY OF WISCONSIN 9
  • 10. Deep Web ResourcesDeep Web Resources Private WebPrivate Web Private Web: sites that require registration and login (password- protected resources). 10/26/16 UNIVERSITY OF WISCONSIN 10
  • 11. Deep Web ResourcesDeep Web Resources Contextual WebContextual Web Contextual Web: pages with content varying for different access contexts (e.g., ranges of client IP addresses or previous navigation sequence). 10/26/16 UNIVERSITY OF WISCONSIN 11
  • 12. Deep Web ResourcesDeep Web Resources Limited Access ContentLimited Access Content Limited access content: sites that limit access to their pages in a technical way (e.g., using the Robots Exclusion Standard or CAPTCHAs, or no-store directive which prohibit search engines from browsing them and creating cached copies 10/26/16 UNIVERSITY OF WISCONSIN 12
  • 13. Deep Web ResourcesDeep Web Resources Scripted ContentScripted Content Scripted content: pages that are only accessible through links produced by JavaScript as well as content dynamically downloaded from Web servers via Flash or Ajax solutions. 10/26/16 UNIVERSITY OF WISCONSIN 13
  • 14. Deep Web ResourcesDeep Web Resources Non HTML ContentNon HTML Content Non-HTML/text content: textual content encoded in multimedia (image or video) files or specific file formats not handled by search engines. 10/26/16 UNIVERSITY OF WISCONSIN 14
  • 15. Accessing the Deep WebAccessing the Deep Web While it is not always possible to discover a specific web server's external IP address, theoretically almost any site can be accessed via its IP address, regardless of whether or not it has been indexed. 10/26/16 UNIVERSITY OF WISCONSIN 15
  • 16. Accessing the Deep WebAccessing the Deep Web Certain content is intentionally hidden from the regular internet, accessible only with special software, such as Tor. Tor allows users to access websites using the .onion host suffix anonymously, hiding their IP address. Other such software includes I2P and Freenet. 10/26/16 UNIVERSITY OF WISCONSIN 16
  • 17. The Onion Router (Tor)The Onion Router (Tor) Tool For the Deep WebTool For the Deep Web Tor is software that installs into your browser and sets up the specific connections you need to access dark Web sites. Critically, Tor is an encrypted technology that helps people maintain anonymity online. It does this in part by routing connections through servers around the world, making them much harder to track. 10/26/16 UNIVERSITY OF WISCONSIN 17
  • 18. Who Invented Tor?Who Invented Tor? Oddly enough, Tor is the result of research done by the U.S. Naval Research Laboratory, which created Tor for political dissidents and whistleblowers, allowing them to communicate without fear of reprisal. 10/26/16 UNIVERSITY OF WISCONSIN 18
  • 19. Tor Client AvailableTor Client Available For DownloadFor Download 10/26/16 UNIVERSITY OF WISCONSIN 19
  • 20. Accessing the Deep WebAccessing the Deep Web .onion.onion .onion is a pseudo-top-level domain host suffix designating an anonymous hidden service reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as Web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. 10/26/16 UNIVERSITY OF WISCONSIN 20
  • 21. Accessing the Deep WebAccessing the Deep Web Tor2web 10/26/16 UNIVERSITY OF WISCONSIN 21
  • 22. What Deep Web LinksWhat Deep Web Links Look LikeLook Like Deep Web links appear as a random string of letters followed by the .onion TLD. For example, http://xmh57jrzrnw6i nsl followed by .onion, links to TORCH, the Tor search engine web page. 10/26/16 UNIVERSITY OF WISCONSIN 22
  • 23. Searching the Deep WebSearching the Deep Web To discover content on the Web, search engines use web crawlers that follow hyperlinks through known protocol virtual port numbers. This technique is ideal for discovering resources on the surface Web but is often ineffective at finding Deep Web resources. 10/26/16 UNIVERSITY OF WISCONSIN 23
  • 24. Give the People What TheyGive the People What They Came Here For, Tonight!Came Here For, Tonight! Just like general web search, searching the Invisible Web is also about looking for the needle in the haystack. Only here, the haystack is much bigger. The Invisible Web is definitely not for the casual searcher. It is a deep but not dark because if you know what you are searching for, enlightenment is a few keywords away. 10/26/16 UNIVERSITY OF WISCONSIN 24
  • 25. Deep Web SearchDeep Web Search EnginesEngines 10/26/16 UNIVERSITY OF WISCONSIN 25
  • 26. Deep Web SearchDeep Web Search infomineinfomine http://infomine.ucr.edu/ Infomine has been built by a pool of libraries in the United States. Some of them are University of California, Wake Forest University, California State University, and the University of Detroit. Infomine ‘mines’ information from databases, electronic journals, electronic books, bulletin boards, mailing lists, online library card catalogs, articles, directories of researchers, and many other resources. 10/26/16 UNIVERSITY OF WISCONSIN 26
  • 27. Deep Web SearchDeep Web Search The WWW Virtual LibraryThe WWW Virtual Library http://vlib.org/ This is considered to be the oldest catalog on the web and was started by started by Tim Berners-Lee, the creator of the web. So, isn’t it strange that it finds a place in the list of Invisible Web resources? Maybe, but the WWW Virtual Library lists quite a lot of relevant resources on quite a lot of subjects. 10/26/16 UNIVERSITY OF WISCONSIN 27
  • 28. Deep Web SearchDeep Web Search Complete PlanetComplete Planet http://aip.completeplanet.com/ Complete Planet calls itself the ‘front door to the Deep Web’. This free and well designed directory resource makes it easy to access the mass of dynamic databases that are cloaked from a general purpose search. The databases indexed by Complete Planet number around 70,000 and range from Agriculture to Weather. Also thrown in are databases like Food & Drink and Military. For a really effective Deep Web search, try out the Advanced Search options where among other things, you can set a date range. 10/26/16 UNIVERSITY OF WISCONSIN 28
  • 29. Deep Web SearchDeep Web Search DeepPeepDeepPeep http://www.deeppeep.org/ DeepPeep aims to enter the Invisible Web through forms that query databases and web services for information. Typed queries open up dynamic but short lived results which cannot be indexed by normal search engines. By indexing databases, DeepPeep hopes to track 45,000 forms across 7 domains. The domains covered by DeepPeep (Beta) are Auto, Airfare, Biology, Book, Hotel, Job, and Rental. Being a beta service, there are occasional glitches as some results don’t load in the browser. 10/26/16 UNIVERSITY OF WISCONSIN 29
  • 30. Deep Web SearchDeep Web Search IncyWincyIncyWincy http://www.incywincy.com/ IncyWincy is an Invisible Web search engine and it behaves as a meta-search engine by tapping into other search engines and filtering the results. It searches the web, directory, forms, and images. With a free registration, you can track search results with alerts. 10/26/16 UNIVERSITY OF WISCONSIN 30
  • 31. Deep Web SearchDeep Web Search DeepWebTechDeepWebTech http://www.deepwebtech.com/ DeepWebTech gives you five search engines (and browser plugins) for specific topics. The search engines cover science, medicine, and business. Using these topic specific search engines, you can query the underlying databases in the Deep Web. 10/26/16 UNIVERSITY OF WISCONSIN 31
  • 32. Deep Web SearchDeep Web Search ScirusScirus http://www.scirus.com/srsapp/ Scirus has a pure scientific focus. It is a far reaching research engine that can scour journals, scientists’ homepages, courseware, pre-print server material, patents and institutional intranets. 10/26/16 UNIVERSITY OF WISCONSIN 32
  • 33. Deep Web SearchDeep Web Search TechXtraTechXtra http://www.techxtra.ac.uk/index.html TechXtra concentrates on engineering, mathematics and computing. It gives you industry news, job announcements, technical reports, technical data, full text eprints, teaching and learning resources along with articles and relevant website information. 10/26/16 UNIVERSITY OF WISCONSIN 33
  • 34. Bitcoin, The Currency of theBitcoin, The Currency of the Deep WebDeep Web • While not completely anonymous, when used correctly, it is very difficult to track down the true owner/identity • Not regulated by any government or corporate entity 10/26/16 UNIVERSITY OF WISCONSIN 34
  • 35. Be Careful of What YouBe Careful of What You Search For, You Might Just Find ItSearch For, You Might Just Find It 10/26/16 UNIVERSITY OF WISCONSIN 35
  • 36. Deep WebDeep Web Dangerous WebDangerous Web 10/26/16 UNIVERSITY OF WISCONSIN 36
  • 37. Deep WebDeep Web Dangerous WebDangerous Web 10/26/16 UNIVERSITY OF WISCONSIN 37
  • 38. Deep Web, Dangerous WebDeep Web, Dangerous Web SteganographySteganography (ste-g&n-o´gr&-fē) (n.) The art and science of hiding information by embedding messages within other, seemingly harmless messages 10/26/16 UNIVERSITY OF WISCONSIN 38
  • 39. Deep WebDeep Web Dangerous WebDangerous Web 10/26/16 UNIVERSITY OF WISCONSIN 39
  • 40. Deep WebDeep Web Dangerous WebDangerous Web 10/26/16 UNIVERSITY OF WISCONSIN 40
  • 41. Deep WebDeep Web Dangerous WebDangerous Web 10/26/16 UNIVERSITY OF WISCONSIN 41
  • 42. Deep WebDeep Web Dangerous WebDangerous Web 10/26/16 UNIVERSITY OF WISCONSIN 42
  • 43. Deep WebDeep Web Dangerous WebDangerous Web 10/26/16 UNIVERSITY OF WISCONSIN 43
  • 44. Deep WebDeep Web Dangerous WebDangerous Web 10/26/16 UNIVERSITY OF WISCONSIN 44
  • 45. Deep WebDeep Web Dangerous WebDangerous Web 10/26/16 UNIVERSITY OF WISCONSIN 45
  • 46. Deep WebDeep Web Dangerous WebDangerous Web 10/26/16 UNIVERSITY OF WISCONSIN 46
  • 47. 10/26/16 UNIVERSITY OF WISCONSIN 47