SlideShare uma empresa Scribd logo
1 de 48
Scary Halloween Lecture 365/765
The Deep Web—From Spooky to Creepy
Presented by Nicholas Davis, CISSP, CISA
This presentation contains explicit content,
which some people may find offensive.
The examples shown do not represent my
views or opinions, and are used for
demonstration only.
I do not endorse the use of the Deep Web
for unethical or illicit activities.
10/28/16 UNIVERSITY OF WISCONSIN 2
Session OverviewSession Overview
Introduction and Warning
The Deep Web Defined
Dynamic Content
Unlinked Content
Private Web
Contextual Web
Limited Access Content
Scripted Content
Non-HTML Content
Deep Web Search Engines & Tor Client
Examples of what can found on the Deep Web
Exciting Documentary Video
Question and Answer session
10/28/16 UNIVERSITY OF WISCONSIN 3
Some DefinitionsSome Definitions
Deep Web, Deep Net, Invisible Web, or
Hidden Web is not part of the Surface
Web (that which is normally accessed).
Do not confuse it with the Dark Internet,
which refers to computers which can no
longer be reached over the Internet
Some people think that the Deep Web is
a haven for serious criminality, and I
agree with them
10/28/16 UNIVERSITY OF WISCONSIN 4
Normal Web SearchNormal Web Search
vs. Deep Web Searchvs. Deep Web Search
Searching on the Internet today can be
compared to dragging a net across the
surface of the ocean: a great deal may be
caught in the net, but there is a wealth of
information that is deep and therefore
missed
10/28/16 UNIVERSITY OF WISCONSIN 5
Normal Web SearchNormal Web Search
vs. Deep Web Searchvs. Deep Web Search
Traditional search engines cannot see or
retrieve content in the deep Web—those
pages do not exist until they are created
dynamically as the result of a specific
search. As of 2001, the deep Web was
several orders of magnitude larger than
the surface Web
10/28/16 UNIVERSITY OF WISCONSIN 6
Deep Web SizeDeep Web Size
It is impossible to measure
or put estimates onto the
size of the deep web
because the majority of the
information is hidden or
locked inside databases.
Early estimates suggested
that the deep web is 4,000
to 5,000 times larger than
the surface web
10/28/16 UNIVERSITY OF WISCONSIN 7
Deep Web ResourcesDeep Web Resources
Dynamic ContentDynamic Content
Dynamic pages which are returned in
response to a submitted query or
accessed only through a form, especially
if open-domain input elements (such as
text fields) are used; such fields are hard
to navigate without domain knowledge.
10/28/16 UNIVERSITY OF WISCONSIN 8
Deep Web ResourcesDeep Web Resources
Unlinked ContentUnlinked Content
Unlinked content: pages which are not
linked to by other pages, which may
prevent Web crawling programs from
accessing the content. This content is
referred to as pages without backlinks
(or inlinks).
10/28/16 UNIVERSITY OF WISCONSIN 9
Deep Web ResourcesDeep Web Resources
Private WebPrivate Web
Private Web: sites that require
registration and login (password-
protected resources).
10/28/16 UNIVERSITY OF WISCONSIN 10
Deep Web ResourcesDeep Web Resources
Contextual WebContextual Web
Contextual Web:
pages with content
varying for different
access contexts (e.g.,
ranges of client IP
addresses or previous
navigation sequence).
10/28/16 UNIVERSITY OF WISCONSIN 11
Deep Web ResourcesDeep Web Resources
Limited Access ContentLimited Access Content
Limited access content: sites that limit
access to their pages in a technical way
(e.g., using the Robots Exclusion
Standard or CAPTCHAs, or no-store
directive which prohibit search engines
from browsing them and creating
cached copies
10/28/16 UNIVERSITY OF WISCONSIN 12
Deep Web ResourcesDeep Web Resources
Scripted ContentScripted Content
Scripted content: pages that are only
accessible through links produced by
JavaScript as well as content
dynamically downloaded from Web
servers via Flash or Ajax solutions.
10/28/16 UNIVERSITY OF WISCONSIN 13
Deep Web ResourcesDeep Web Resources
Non HTML ContentNon HTML Content
Non-HTML/text
content: textual
content encoded
in multimedia
(image or video)
files or specific
file formats not
handled by
search engines.
10/28/16 UNIVERSITY OF WISCONSIN 14
Accessing the Deep WebAccessing the Deep Web
While it is not always possible to
discover a specific web server's external
IP address, theoretically almost any site
can be accessed via its IP address,
regardless of whether or not it has been
indexed.
10/28/16 UNIVERSITY OF WISCONSIN 15
Accessing the Deep WebAccessing the Deep Web
Certain content is
intentionally hidden from
the regular internet,
accessible only with special
software, such as Tor. Tor
allows users to access
websites using the .onion
host suffix anonymously,
hiding their IP address.
Other such software includes
I2P and Freenet.
10/28/16 UNIVERSITY OF WISCONSIN 16
The Onion Router (Tor)The Onion Router (Tor)
Tool For the Deep WebTool For the Deep Web
Tor is software that installs into your
browser and sets up the specific
connections you need to access dark
Web sites. Critically, Tor is an encrypted
technology that helps people maintain
anonymity online. It does this in part by
routing connections through servers
around the world, making them much
harder to track.
10/28/16 UNIVERSITY OF WISCONSIN 17
Who Invented Tor?Who Invented Tor?
Oddly enough, Tor is the result of research
done by the U.S. Naval Research
Laboratory, which created Tor for political
dissidents and whistleblowers, allowing
them to communicate without fear of
reprisal.
10/28/16 UNIVERSITY OF WISCONSIN 18
Tor Client AvailableTor Client Available
For DownloadFor Download
10/28/16 UNIVERSITY OF WISCONSIN 19
Accessing the Deep WebAccessing the Deep Web
.onion.onion
.onion is a pseudo-top-level domain host
suffix designating an anonymous hidden
service reachable via the Tor network.
Such addresses are not actual DNS
names, and the .onion TLD is not in the
Internet DNS root, but with the
appropriate proxy software installed,
Internet programs such as Web
browsers can access sites with .onion
addresses by sending the request
through the network of Tor servers.
10/28/16 UNIVERSITY OF WISCONSIN 20
Accessing the Deep WebAccessing the Deep Web
Tor2web
10/28/16 UNIVERSITY OF WISCONSIN 21
What Deep Web LinksWhat Deep Web Links
Look LikeLook Like
Deep Web links
appear as a random
string of letters
followed by the .onion
TLD. For example,
http://xmh57jrzrnw6i
nsl followed by .onion,
links to TORCH, the
Tor search engine web
page.
10/28/16 UNIVERSITY OF WISCONSIN 22
Searching the Deep WebSearching the Deep Web
To discover content on the
Web, search engines use web
crawlers that follow
hyperlinks through known
protocol virtual port
numbers. This technique is
ideal for discovering
resources on the surface
Web but is often ineffective
at finding Deep Web
resources.
10/28/16 UNIVERSITY OF WISCONSIN 23
Give the People What TheyGive the People What They
Came Here For, Tonight!Came Here For, Tonight!
Just like general web search, searching
the Invisible Web is also about looking
for the needle in the haystack. Only
here, the haystack is much bigger. The
Invisible Web is definitely not for the
casual searcher. It is a deep but not dark
because if you know what you are
searching for, enlightenment is a few
keywords away.
10/28/16 UNIVERSITY OF WISCONSIN 24
Deep Web SearchDeep Web Search
EnginesEngines
10/28/16 UNIVERSITY OF WISCONSIN 25
In mid-2014, a hacker created Grams, the Dark Web’s
first distributed search engine. Grams allows would-be
criminals to search for drugs, guns, and stolen bank
accounts across multiple hidden sites. It even includes
an "I’m Feeling Lucky" button and targeted ads where
drug dealers compete for clicks.
10/28/16 UNIVERSITY OF WISCONSIN 26
Grams Sample SearchGrams Sample Search
Crunchy Dutch MoonrocksCrunchy Dutch Moonrocks
10/28/16 UNIVERSITY OF WISCONSIN 27
Tools of the TradeTools of the Trade
10/28/16 UNIVERSITY OF WISCONSIN 28
Things That Make theThings That Make the
Deep Web WorkDeep Web Work
Cryptocurrency
Digital cash, such as bitcoin and darkcoin, and the
payment system Liberty Reserve provide a convenient
system for users to spend money online while keeping
their real-world identities hidden.
10/28/16 UNIVERSITY OF WISCONSIN 29
Things That Make theThings That Make the
Deep Web WorkDeep Web Work
Bulletproof Web-hosting Services
Some Web hosts in places such as Russia or Ukraine welcome all
content, make no attempts to learn their customers’ true
identities, accept anonymous payments in bitcoin, and routinely
ignore subpoena requests from law enforcement.
10/28/16 UNIVERSITY OF WISCONSIN 30
Things That Make theThings That Make the
Deep Web WorkDeep Web Work
Cloud Computing
By hosting their criminal
malware with reputable
firms, hackers are much less
likely to see their traffic
blocked by security systems.
A recent study suggested that
16 percent of the world’s
malware and cyberattack
distribution channels
originated in the Amazon
Cloud.
10/28/16 UNIVERSITY OF WISCONSIN 31
Things That Make theThings That Make the
Deep Web WorkDeep Web Work
Crimeware
Less skilled criminals can buy
all the tools they need to
identify system
vulnerabilities, commit
identity theft, compromise
servers, and steal data. It was
a hacker with just such a tool
kit who invaded Target’s
point-of-sale system in 2013.
10/28/16 UNIVERSITY OF WISCONSIN 32
Things That Make theThings That Make the
Deep Web WorkDeep Web Work
Hackers For Hire
Organized cybercrime
syndicates outsource
hackers-for-hire. The
Hidden Lynx group boasts
up to 100 professional
cyberthieves, some of whom
are known to have
penetrated systems at
Google, Adobe, and
Lockheed Martin.
10/28/16 UNIVERSITY OF WISCONSIN 33
Things That Make theThings That Make the
Deep Web WorkDeep Web Work
Multilingual Crime Call
Centers
Employees will play any
duplicitous role you would
like, such as providing job
and educational
references, initiating wire
transfers, and unblocking
hacked accounts. Calls
cost around $10.
10/28/16 UNIVERSITY OF WISCONSIN 34
Be Careful of What YouBe Careful of What You
Search For, You Might Just Find ItSearch For, You Might Just Find It
10/28/16 UNIVERSITY OF WISCONSIN 35
Deep WebDeep Web
Dangerous WebDangerous Web
10/28/16 UNIVERSITY OF WISCONSIN 36
Deep WebDeep Web
Dangerous WebDangerous Web
10/28/16 UNIVERSITY OF WISCONSIN 37
Deep Web, Dangerous WebDeep Web, Dangerous Web
SteganographySteganography
(ste-g&n-o´gr&-fē) (n.) The art and
science of hiding information by
embedding messages within other,
seemingly harmless messages
10/28/16 UNIVERSITY OF WISCONSIN 38
Deep WebDeep Web
Dangerous WebDangerous Web
10/28/16 UNIVERSITY OF WISCONSIN 39
Deep WebDeep Web
Dangerous WebDangerous Web
10/28/16 UNIVERSITY OF WISCONSIN 40
Deep WebDeep Web
Dangerous WebDangerous Web
10/28/16 UNIVERSITY OF WISCONSIN 41
Deep WebDeep Web
Dangerous WebDangerous Web
10/28/16 UNIVERSITY OF WISCONSIN 42
Deep WebDeep Web
Dangerous WebDangerous Web
10/28/16 UNIVERSITY OF WISCONSIN 43
Deep WebDeep Web
Dangerous WebDangerous Web
10/28/16 UNIVERSITY OF WISCONSIN 44
Deep WebDeep Web
Dangerous WebDangerous Web
10/28/16 UNIVERSITY OF WISCONSIN 45
Deep WebDeep Web
Dangerous WebDangerous Web
10/28/16 UNIVERSITY OF WISCONSIN 46
Deep Web VideoDeep Web Video
https://www.youtube.com/watch?v=osYwxy9B4Y4
10/28/16 UNIVERSITY OF WISCONSIN 47
Class DiscussionClass Discussion
You love the Internet. However, you favorite sites, such as Facebook,
Amazon, and wisc.edu are just the surface. There is another world out
there: the Deep Web
The Deep Web is where online information is password protected, or
requires special software to access—and it’s massive, yet it’s almost
completely out of sight. The Deep Web contains a hidden world, a
community where malicious actors unite in common nefarious purpose.
Should the government control or forbid certain sites? Why? Do you
think buying the following items on the Internet is possible? If it is
possible, should they be forbidden? How and why?
• Drugs (both prescription and clearly the clearly illegal type)
• Forged identity papers
• Weapons, explosives and ammunition
• Hired assassins
• Human organs
10/28/16 UNIVERSITY OF WISCONSIN 48

Mais conteúdo relacionado

Mais procurados

Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep webKhaled Sany
 
Deep web & Darknet
Deep web & DarknetDeep web & Darknet
Deep web & DarknetNiloy Sikder
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden WebJon Kane
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden WebJon Kane
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth YuKenny Yu
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine ImpasClaudine Impas
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Search Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsSearch Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsCase IQ
 

Mais procurados (20)

Deep web
Deep webDeep web
Deep web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Deep web & Darknet
Deep web & DarknetDeep web & Darknet
Deep web & Darknet
 
Deep web
Deep webDeep web
Deep web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Deep web
Deep webDeep web
Deep web
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Deep and dark web
Deep and dark webDeep and dark web
Deep and dark web
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Search Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsSearch Engine Skills for Workplace Investigators
Search Engine Skills for Workplace Investigators
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 

Destaque

Digging deep into Korean Web Service History(한글)
Digging deep into Korean Web Service History(한글)Digging deep into Korean Web Service History(한글)
Digging deep into Korean Web Service History(한글)YJ Min
 
קורות חיים-שורס אולגה
קורות חיים-שורס אולגהקורות חיים-שורס אולגה
קורות חיים-שורס אולגהOlga Schors
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional CertificationsNicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 

Destaque (6)

search engines
search enginessearch engines
search engines
 
Digging deep into Korean Web Service History(한글)
Digging deep into Korean Web Service History(한글)Digging deep into Korean Web Service History(한글)
Digging deep into Korean Web Service History(한글)
 
קורות חיים-שורס אולגה
קורות חיים-שורס אולגהקורות חיים-שורס אולגה
קורות חיים-שורס אולגה
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 

Semelhante a Spooky Halloween IT Security Lecture -- The Deep Web

Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebNicholas Davis
 
The Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to CreepyThe Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to CreepyNicholas Davis
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxismailwinofo
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight IntelliaggGavin O'Toole
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosisP-e-t-a-r
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Nicholas Davis
 

Semelhante a Spooky Halloween IT Security Lecture -- The Deep Web (20)

Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep Web
 
The Deep Hidden Web
The Deep Hidden WebThe Deep Hidden Web
The Deep Hidden Web
 
The Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to CreepyThe Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to Creepy
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Darknet
DarknetDarknet
Darknet
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptx
 
Deep Web
Deep WebDeep Web
Deep Web
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosis
 
Dw communication
Dw communicationDw communication
Dw communication
 
Darkweb
DarkwebDarkweb
Darkweb
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
The Deep Web.pptx
The Deep Web.pptxThe Deep Web.pptx
The Deep Web.pptx
 
Deep web
Deep webDeep web
Deep web
 
Dark Web
Dark WebDark Web
Dark Web
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 

Mais de Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 
Cloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) SecurityCloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) SecurityNicholas Davis
 
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 Nicholas Davis
 
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Nicholas Davis
 

Mais de Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 
Cloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) SecurityCloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) Security
 
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
 
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
 

Último

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 

Último (20)

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 

Spooky Halloween IT Security Lecture -- The Deep Web

  • 1. Scary Halloween Lecture 365/765 The Deep Web—From Spooky to Creepy Presented by Nicholas Davis, CISSP, CISA
  • 2. This presentation contains explicit content, which some people may find offensive. The examples shown do not represent my views or opinions, and are used for demonstration only. I do not endorse the use of the Deep Web for unethical or illicit activities. 10/28/16 UNIVERSITY OF WISCONSIN 2
  • 3. Session OverviewSession Overview Introduction and Warning The Deep Web Defined Dynamic Content Unlinked Content Private Web Contextual Web Limited Access Content Scripted Content Non-HTML Content Deep Web Search Engines & Tor Client Examples of what can found on the Deep Web Exciting Documentary Video Question and Answer session 10/28/16 UNIVERSITY OF WISCONSIN 3
  • 4. Some DefinitionsSome Definitions Deep Web, Deep Net, Invisible Web, or Hidden Web is not part of the Surface Web (that which is normally accessed). Do not confuse it with the Dark Internet, which refers to computers which can no longer be reached over the Internet Some people think that the Deep Web is a haven for serious criminality, and I agree with them 10/28/16 UNIVERSITY OF WISCONSIN 4
  • 5. Normal Web SearchNormal Web Search vs. Deep Web Searchvs. Deep Web Search Searching on the Internet today can be compared to dragging a net across the surface of the ocean: a great deal may be caught in the net, but there is a wealth of information that is deep and therefore missed 10/28/16 UNIVERSITY OF WISCONSIN 5
  • 6. Normal Web SearchNormal Web Search vs. Deep Web Searchvs. Deep Web Search Traditional search engines cannot see or retrieve content in the deep Web—those pages do not exist until they are created dynamically as the result of a specific search. As of 2001, the deep Web was several orders of magnitude larger than the surface Web 10/28/16 UNIVERSITY OF WISCONSIN 6
  • 7. Deep Web SizeDeep Web Size It is impossible to measure or put estimates onto the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 4,000 to 5,000 times larger than the surface web 10/28/16 UNIVERSITY OF WISCONSIN 7
  • 8. Deep Web ResourcesDeep Web Resources Dynamic ContentDynamic Content Dynamic pages which are returned in response to a submitted query or accessed only through a form, especially if open-domain input elements (such as text fields) are used; such fields are hard to navigate without domain knowledge. 10/28/16 UNIVERSITY OF WISCONSIN 8
  • 9. Deep Web ResourcesDeep Web Resources Unlinked ContentUnlinked Content Unlinked content: pages which are not linked to by other pages, which may prevent Web crawling programs from accessing the content. This content is referred to as pages without backlinks (or inlinks). 10/28/16 UNIVERSITY OF WISCONSIN 9
  • 10. Deep Web ResourcesDeep Web Resources Private WebPrivate Web Private Web: sites that require registration and login (password- protected resources). 10/28/16 UNIVERSITY OF WISCONSIN 10
  • 11. Deep Web ResourcesDeep Web Resources Contextual WebContextual Web Contextual Web: pages with content varying for different access contexts (e.g., ranges of client IP addresses or previous navigation sequence). 10/28/16 UNIVERSITY OF WISCONSIN 11
  • 12. Deep Web ResourcesDeep Web Resources Limited Access ContentLimited Access Content Limited access content: sites that limit access to their pages in a technical way (e.g., using the Robots Exclusion Standard or CAPTCHAs, or no-store directive which prohibit search engines from browsing them and creating cached copies 10/28/16 UNIVERSITY OF WISCONSIN 12
  • 13. Deep Web ResourcesDeep Web Resources Scripted ContentScripted Content Scripted content: pages that are only accessible through links produced by JavaScript as well as content dynamically downloaded from Web servers via Flash or Ajax solutions. 10/28/16 UNIVERSITY OF WISCONSIN 13
  • 14. Deep Web ResourcesDeep Web Resources Non HTML ContentNon HTML Content Non-HTML/text content: textual content encoded in multimedia (image or video) files or specific file formats not handled by search engines. 10/28/16 UNIVERSITY OF WISCONSIN 14
  • 15. Accessing the Deep WebAccessing the Deep Web While it is not always possible to discover a specific web server's external IP address, theoretically almost any site can be accessed via its IP address, regardless of whether or not it has been indexed. 10/28/16 UNIVERSITY OF WISCONSIN 15
  • 16. Accessing the Deep WebAccessing the Deep Web Certain content is intentionally hidden from the regular internet, accessible only with special software, such as Tor. Tor allows users to access websites using the .onion host suffix anonymously, hiding their IP address. Other such software includes I2P and Freenet. 10/28/16 UNIVERSITY OF WISCONSIN 16
  • 17. The Onion Router (Tor)The Onion Router (Tor) Tool For the Deep WebTool For the Deep Web Tor is software that installs into your browser and sets up the specific connections you need to access dark Web sites. Critically, Tor is an encrypted technology that helps people maintain anonymity online. It does this in part by routing connections through servers around the world, making them much harder to track. 10/28/16 UNIVERSITY OF WISCONSIN 17
  • 18. Who Invented Tor?Who Invented Tor? Oddly enough, Tor is the result of research done by the U.S. Naval Research Laboratory, which created Tor for political dissidents and whistleblowers, allowing them to communicate without fear of reprisal. 10/28/16 UNIVERSITY OF WISCONSIN 18
  • 19. Tor Client AvailableTor Client Available For DownloadFor Download 10/28/16 UNIVERSITY OF WISCONSIN 19
  • 20. Accessing the Deep WebAccessing the Deep Web .onion.onion .onion is a pseudo-top-level domain host suffix designating an anonymous hidden service reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as Web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. 10/28/16 UNIVERSITY OF WISCONSIN 20
  • 21. Accessing the Deep WebAccessing the Deep Web Tor2web 10/28/16 UNIVERSITY OF WISCONSIN 21
  • 22. What Deep Web LinksWhat Deep Web Links Look LikeLook Like Deep Web links appear as a random string of letters followed by the .onion TLD. For example, http://xmh57jrzrnw6i nsl followed by .onion, links to TORCH, the Tor search engine web page. 10/28/16 UNIVERSITY OF WISCONSIN 22
  • 23. Searching the Deep WebSearching the Deep Web To discover content on the Web, search engines use web crawlers that follow hyperlinks through known protocol virtual port numbers. This technique is ideal for discovering resources on the surface Web but is often ineffective at finding Deep Web resources. 10/28/16 UNIVERSITY OF WISCONSIN 23
  • 24. Give the People What TheyGive the People What They Came Here For, Tonight!Came Here For, Tonight! Just like general web search, searching the Invisible Web is also about looking for the needle in the haystack. Only here, the haystack is much bigger. The Invisible Web is definitely not for the casual searcher. It is a deep but not dark because if you know what you are searching for, enlightenment is a few keywords away. 10/28/16 UNIVERSITY OF WISCONSIN 24
  • 25. Deep Web SearchDeep Web Search EnginesEngines 10/28/16 UNIVERSITY OF WISCONSIN 25
  • 26. In mid-2014, a hacker created Grams, the Dark Web’s first distributed search engine. Grams allows would-be criminals to search for drugs, guns, and stolen bank accounts across multiple hidden sites. It even includes an "I’m Feeling Lucky" button and targeted ads where drug dealers compete for clicks. 10/28/16 UNIVERSITY OF WISCONSIN 26
  • 27. Grams Sample SearchGrams Sample Search Crunchy Dutch MoonrocksCrunchy Dutch Moonrocks 10/28/16 UNIVERSITY OF WISCONSIN 27
  • 28. Tools of the TradeTools of the Trade 10/28/16 UNIVERSITY OF WISCONSIN 28
  • 29. Things That Make theThings That Make the Deep Web WorkDeep Web Work Cryptocurrency Digital cash, such as bitcoin and darkcoin, and the payment system Liberty Reserve provide a convenient system for users to spend money online while keeping their real-world identities hidden. 10/28/16 UNIVERSITY OF WISCONSIN 29
  • 30. Things That Make theThings That Make the Deep Web WorkDeep Web Work Bulletproof Web-hosting Services Some Web hosts in places such as Russia or Ukraine welcome all content, make no attempts to learn their customers’ true identities, accept anonymous payments in bitcoin, and routinely ignore subpoena requests from law enforcement. 10/28/16 UNIVERSITY OF WISCONSIN 30
  • 31. Things That Make theThings That Make the Deep Web WorkDeep Web Work Cloud Computing By hosting their criminal malware with reputable firms, hackers are much less likely to see their traffic blocked by security systems. A recent study suggested that 16 percent of the world’s malware and cyberattack distribution channels originated in the Amazon Cloud. 10/28/16 UNIVERSITY OF WISCONSIN 31
  • 32. Things That Make theThings That Make the Deep Web WorkDeep Web Work Crimeware Less skilled criminals can buy all the tools they need to identify system vulnerabilities, commit identity theft, compromise servers, and steal data. It was a hacker with just such a tool kit who invaded Target’s point-of-sale system in 2013. 10/28/16 UNIVERSITY OF WISCONSIN 32
  • 33. Things That Make theThings That Make the Deep Web WorkDeep Web Work Hackers For Hire Organized cybercrime syndicates outsource hackers-for-hire. The Hidden Lynx group boasts up to 100 professional cyberthieves, some of whom are known to have penetrated systems at Google, Adobe, and Lockheed Martin. 10/28/16 UNIVERSITY OF WISCONSIN 33
  • 34. Things That Make theThings That Make the Deep Web WorkDeep Web Work Multilingual Crime Call Centers Employees will play any duplicitous role you would like, such as providing job and educational references, initiating wire transfers, and unblocking hacked accounts. Calls cost around $10. 10/28/16 UNIVERSITY OF WISCONSIN 34
  • 35. Be Careful of What YouBe Careful of What You Search For, You Might Just Find ItSearch For, You Might Just Find It 10/28/16 UNIVERSITY OF WISCONSIN 35
  • 36. Deep WebDeep Web Dangerous WebDangerous Web 10/28/16 UNIVERSITY OF WISCONSIN 36
  • 37. Deep WebDeep Web Dangerous WebDangerous Web 10/28/16 UNIVERSITY OF WISCONSIN 37
  • 38. Deep Web, Dangerous WebDeep Web, Dangerous Web SteganographySteganography (ste-g&n-o´gr&-fē) (n.) The art and science of hiding information by embedding messages within other, seemingly harmless messages 10/28/16 UNIVERSITY OF WISCONSIN 38
  • 39. Deep WebDeep Web Dangerous WebDangerous Web 10/28/16 UNIVERSITY OF WISCONSIN 39
  • 40. Deep WebDeep Web Dangerous WebDangerous Web 10/28/16 UNIVERSITY OF WISCONSIN 40
  • 41. Deep WebDeep Web Dangerous WebDangerous Web 10/28/16 UNIVERSITY OF WISCONSIN 41
  • 42. Deep WebDeep Web Dangerous WebDangerous Web 10/28/16 UNIVERSITY OF WISCONSIN 42
  • 43. Deep WebDeep Web Dangerous WebDangerous Web 10/28/16 UNIVERSITY OF WISCONSIN 43
  • 44. Deep WebDeep Web Dangerous WebDangerous Web 10/28/16 UNIVERSITY OF WISCONSIN 44
  • 45. Deep WebDeep Web Dangerous WebDangerous Web 10/28/16 UNIVERSITY OF WISCONSIN 45
  • 46. Deep WebDeep Web Dangerous WebDangerous Web 10/28/16 UNIVERSITY OF WISCONSIN 46
  • 47. Deep Web VideoDeep Web Video https://www.youtube.com/watch?v=osYwxy9B4Y4 10/28/16 UNIVERSITY OF WISCONSIN 47
  • 48. Class DiscussionClass Discussion You love the Internet. However, you favorite sites, such as Facebook, Amazon, and wisc.edu are just the surface. There is another world out there: the Deep Web The Deep Web is where online information is password protected, or requires special software to access—and it’s massive, yet it’s almost completely out of sight. The Deep Web contains a hidden world, a community where malicious actors unite in common nefarious purpose. Should the government control or forbid certain sites? Why? Do you think buying the following items on the Internet is possible? If it is possible, should they be forbidden? How and why? • Drugs (both prescription and clearly the clearly illegal type) • Forged identity papers • Weapons, explosives and ammunition • Hired assassins • Human organs 10/28/16 UNIVERSITY OF WISCONSIN 48