SlideShare a Scribd company logo
1 of 35
DEEP WEB
WHAT TO DO ‘N’ WHAT NOT TO DO
root@topdeepweb:$> cat whoami.txt
[+] AJAY KUMAR [+]
[+] INDEPENDENT SECURITY RESEARCHER [+]
[+] DEEP WEB ENTHUISIAT AND RESEARCHER [+]
[+] YET TO BE AN ENGINEER [+]
[+] Find my research works on 0xmalweb.online [+]
WHAT IS DEEP WEB ?
The deep web or invisible web or hidden
webare parts of the World Wide
Web whose contents are not indexed by
standard search engines for any reason
WONDER WHAT IT IS ?
• Deep web contains 75% of the total world wide web
• Only remaining 25% is Surface web (which includes Facebook ,
Twitter , Google etc)
• The most popular search engine GOOGLE can search only 18% of
the SURFACE WEB
• In the sense , only 18% of the surface web is indexed by google
Levels Of web
SURFACE WEB: The web that the vast majority of internet users are
connected to. Accessible in any nation that does not block internet
access.
E.g: Social media sites like Facebook, informational websites like
Wikipedia, general websites, etc.
BERGIE WEB: The layer of the Surface Web that is blocked in some
nations. Some other information is only accessible through illegal
means.
E.g: Google locked results, recently web crawled old content, pirated
media, pornography etc
Levels Of Web (contd…)
DEEPWEB: Requires special software or proxy to access
(TOR).Contains most of the archived web pages of the 1990s Web
that did not renew their domain names and such.E.g:
Government/Business Research, Hackers, ScriptKiddies, Virus
Information, Illegal and Obscene Content (CP, Gore, Suicides, etc…)
CHARTER WEB: It is like the regular deep web, but harder to get into
and more illegal content.
Advanced covert government research, most of the internet black
market (run on bitcoins), Human/Arms/Drug/Rare Animal Trafficking,
Assassination Networks , illegal game hunting, line of blood locations,
more banned obscene content like CP, Gore, etc.
Levels Of Web (contd…)
• MARIANAS WEB:
Lowest known level of the Deep Web. Named after the Spanish
Technician who created it. It is extremely difficult to access, users say
it is the safest part of the internet due to the privacy.
Julian Assange and other top-level Wikileaks members are believed to
have access.
Do Deep Web Is Really Illegal?
If So what actually the Deep Web contains to call it Illegal
SPAMMERS / SOCIAL ENGINEERERS / DOXERS
SECURE YOURSELF
RED ROOMS / SUICIDAL FORUMS
FBI / GOVERNMENT
TERRORISM
HITMAN / CONTRACT KILLERS
HACKERS
ILLEGAL DRUGS
GOVERNMENT DATA
But Not Everything In Deep Web Is Illegal
Researchers from Terbium Labs claim to have found
evidence that 50% of the deep web contents are legal
50%
13%
11%
9%
4%
3%
3%
2%2%1%1%1%
Deep Web
legal
Drugs
Multiple other categories (illicit)
Site Down
Other illicit activity
Explicit
Fraud
Pharmaceuticals
Hacking & Exploits
Downloadable
Exploitation
Extremisum
What Legal Things Do Deep Web Contains ??
Galaxy 2
Freedom Of Press
Sigaint Mail Services
Forums
Ebooks / Tutorials
History Archives
0 Day Exploits and Data Dumps
Secure Yourself While Accessing Deep Web
• Manual settings For Tor Browser
go for about:config and make sure javascript.enabled and
geo.enabled is set to false
• Disable Javascript using No script addon too
• Disable or Uninstall all addons except HTTPS Everywhere
• Try to change tor circuit and network over a period of time manually
• Donot download any files directly from the Deep Web
• Donot open any links directly from Deep Web in surface web
• Use PGP to chat or mail with someone on Deep Web
• Use unique username for each and every forums you visit
• Don’t use same usernames while using IRC or on surface web
• Avoid using .to and .link (tor2web services)
• Try to use tor in a dedicated system (tail live os )
“Anonymity does not mean criminality”
Privacy Matters In Deep Web , Don’t loose it to morons
QUESTIONS ?
Thank you

More Related Content

What's hot

Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep webKhaled Sany
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentationalbafg55
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)Ali Saif Mirza
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth YuKenny Yu
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 

What's hot (20)

Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
The dark web
The dark webThe dark web
The dark web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
Darkweb
DarkwebDarkweb
Darkweb
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Deep web
Deep webDeep web
Deep web
 
Dark web
Dark webDark web
Dark web
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 

Viewers also liked

Impossible Is Nothing
Impossible Is NothingImpossible Is Nothing
Impossible Is NothingRichard Dedor
 
Presentation on Medicated Chewing Gums
Presentation on Medicated Chewing GumsPresentation on Medicated Chewing Gums
Presentation on Medicated Chewing GumsManoj Kumar Tekuri
 
Dos and Don'ts of an Engineering Statement of Purpose
Dos and Don'ts of an Engineering Statement of PurposeDos and Don'ts of an Engineering Statement of Purpose
Dos and Don'ts of an Engineering Statement of PurposeSOP Writing
 
Data made out of functions
Data made out of functionsData made out of functions
Data made out of functionskenbot
 
The Deep Web - How the Deep Web Works
The Deep Web - How the Deep Web WorksThe Deep Web - How the Deep Web Works
The Deep Web - How the Deep Web WorksOmar Samy
 
Japan - An Emerging Civilization
Japan - An Emerging CivilizationJapan - An Emerging Civilization
Japan - An Emerging CivilizationEleven
 
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
Nobel Peace Prize 2014: Malala Yousafzai and Kailash SatyarthiNobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthimaditabalnco
 
Sustainable Innovation Day
Sustainable Innovation DaySustainable Innovation Day
Sustainable Innovation DayPeter Bertels
 
Clean and green hydrocarbons ignite publish
Clean and green hydrocarbons ignite publishClean and green hydrocarbons ignite publish
Clean and green hydrocarbons ignite publishKrzysztof (Kris) Palka
 
10 Practical Ways to Be More Efficient at Work
10 Practical Ways to Be More Efficient at Work10 Practical Ways to Be More Efficient at Work
10 Practical Ways to Be More Efficient at WorkWeekdone.com
 
iOS Scroll Performance
iOS Scroll PerformanceiOS Scroll Performance
iOS Scroll PerformanceKyle Sherman
 
Stop smoking......
Stop smoking......Stop smoking......
Stop smoking......Bhanu Vyas
 

Viewers also liked (20)

Impossible Is Nothing
Impossible Is NothingImpossible Is Nothing
Impossible Is Nothing
 
Impossible is Nothing?
Impossible is Nothing?Impossible is Nothing?
Impossible is Nothing?
 
The Journey
The JourneyThe Journey
The Journey
 
10 facts about japan
10 facts about japan10 facts about japan
10 facts about japan
 
Nobel prize
Nobel prizeNobel prize
Nobel prize
 
Presentation on Medicated Chewing Gums
Presentation on Medicated Chewing GumsPresentation on Medicated Chewing Gums
Presentation on Medicated Chewing Gums
 
Dos and Don'ts of an Engineering Statement of Purpose
Dos and Don'ts of an Engineering Statement of PurposeDos and Don'ts of an Engineering Statement of Purpose
Dos and Don'ts of an Engineering Statement of Purpose
 
Data made out of functions
Data made out of functionsData made out of functions
Data made out of functions
 
The Deep Web - How the Deep Web Works
The Deep Web - How the Deep Web WorksThe Deep Web - How the Deep Web Works
The Deep Web - How the Deep Web Works
 
Human Body
Human BodyHuman Body
Human Body
 
Bubble gum
Bubble gumBubble gum
Bubble gum
 
Deep Web
Deep WebDeep Web
Deep Web
 
Japan - An Emerging Civilization
Japan - An Emerging CivilizationJapan - An Emerging Civilization
Japan - An Emerging Civilization
 
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
Nobel Peace Prize 2014: Malala Yousafzai and Kailash SatyarthiNobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
 
Sustainable Innovation Day
Sustainable Innovation DaySustainable Innovation Day
Sustainable Innovation Day
 
Clean and green hydrocarbons ignite publish
Clean and green hydrocarbons ignite publishClean and green hydrocarbons ignite publish
Clean and green hydrocarbons ignite publish
 
10 Practical Ways to Be More Efficient at Work
10 Practical Ways to Be More Efficient at Work10 Practical Ways to Be More Efficient at Work
10 Practical Ways to Be More Efficient at Work
 
iOS Scroll Performance
iOS Scroll PerformanceiOS Scroll Performance
iOS Scroll Performance
 
Testing at Spotify
Testing at SpotifyTesting at Spotify
Testing at Spotify
 
Stop smoking......
Stop smoking......Stop smoking......
Stop smoking......
 

Similar to Deep Web - what to do and what not to do

Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSideOWASP EEE
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Deep and Dark web
Deep and Dark webDeep and Dark web
Deep and Dark webNihal Ahmed
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
The Deep Web
The Deep WebThe Deep Web
The Deep Webmartinp
 

Similar to Deep Web - what to do and what not to do (20)

Deep web
Deep webDeep web
Deep web
 
The Deep Web.pptx
The Deep Web.pptxThe Deep Web.pptx
The Deep Web.pptx
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Deep Web
Deep WebDeep Web
Deep Web
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide
 
Deep web
Deep webDeep web
Deep web
 
Dark Web
Dark WebDark Web
Dark Web
 
Overview of Deep web
Overview of Deep webOverview of Deep web
Overview of Deep web
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Deep and Dark web
Deep and Dark webDeep and Dark web
Deep and Dark web
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Darknet
DarknetDarknet
Darknet
 

More from Cysinfo Cyber Security Community

Understanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K AUnderstanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K ACysinfo Cyber Security Community
 
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram KharviUnderstanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram KharviCysinfo Cyber Security Community
 
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TKGetting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TKCysinfo Cyber Security Community
 
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
A look into the sanitizer family (ASAN & UBSAN) by Akul PillaiA look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
A look into the sanitizer family (ASAN & UBSAN) by Akul PillaiCysinfo Cyber Security Community
 
Reversing and Decrypting Malware Communications by Monnappa
Reversing and Decrypting Malware Communications by MonnappaReversing and Decrypting Malware Communications by Monnappa
Reversing and Decrypting Malware Communications by MonnappaCysinfo Cyber Security Community
 
Understanding evasive hollow process injection techniques monnappa k a
Understanding evasive hollow process injection techniques   	monnappa k aUnderstanding evasive hollow process injection techniques   	monnappa k a
Understanding evasive hollow process injection techniques monnappa k aCysinfo Cyber Security Community
 
Security challenges in d2d communication by ajithkumar vyasarao
Security challenges in d2d communication  by ajithkumar vyasaraoSecurity challenges in d2d communication  by ajithkumar vyasarao
Security challenges in d2d communication by ajithkumar vyasaraoCysinfo Cyber Security Community
 

More from Cysinfo Cyber Security Community (20)

Understanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K AUnderstanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K A
 
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram KharviUnderstanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
 
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TKGetting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
 
Emerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar PrustyEmerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar Prusty
 
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
A look into the sanitizer family (ASAN & UBSAN) by Akul PillaiA look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
 
Closer look at PHP Unserialization by Ashwin Shenoi
Closer look at PHP Unserialization by Ashwin ShenoiCloser look at PHP Unserialization by Ashwin Shenoi
Closer look at PHP Unserialization by Ashwin Shenoi
 
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
Unicorn: The Ultimate CPU Emulator by Akshay AjayanUnicorn: The Ultimate CPU Emulator by Akshay Ajayan
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
 
The Art of Executing JavaScript by Akhil Mahendra
The Art of Executing JavaScript by Akhil MahendraThe Art of Executing JavaScript by Akhil Mahendra
The Art of Executing JavaScript by Akhil Mahendra
 
Reversing and Decrypting Malware Communications by Monnappa
Reversing and Decrypting Malware Communications by MonnappaReversing and Decrypting Malware Communications by Monnappa
Reversing and Decrypting Malware Communications by Monnappa
 
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by SreelakshmiDeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
 
Analysis of android apk using adhrit by Abhishek J.M
 Analysis of android apk using adhrit by Abhishek J.M Analysis of android apk using adhrit by Abhishek J.M
Analysis of android apk using adhrit by Abhishek J.M
 
Understanding evasive hollow process injection techniques monnappa k a
Understanding evasive hollow process injection techniques   	monnappa k aUnderstanding evasive hollow process injection techniques   	monnappa k a
Understanding evasive hollow process injection techniques monnappa k a
 
Security challenges in d2d communication by ajithkumar vyasarao
Security challenges in d2d communication  by ajithkumar vyasaraoSecurity challenges in d2d communication  by ajithkumar vyasarao
Security challenges in d2d communication by ajithkumar vyasarao
 
S2 e (selective symbolic execution) -shivkrishna a
S2 e (selective symbolic execution) -shivkrishna aS2 e (selective symbolic execution) -shivkrishna a
S2 e (selective symbolic execution) -shivkrishna a
 
Dynamic binary analysis using angr siddharth muralee
Dynamic binary analysis using angr   siddharth muraleeDynamic binary analysis using angr   siddharth muralee
Dynamic binary analysis using angr siddharth muralee
 
Bit flipping attack on aes cbc - ashutosh ahelleya
Bit flipping attack on aes cbc -	ashutosh ahelleyaBit flipping attack on aes cbc -	ashutosh ahelleya
Bit flipping attack on aes cbc - ashutosh ahelleya
 
Security Analytics using ELK stack
Security Analytics using ELK stack	Security Analytics using ELK stack
Security Analytics using ELK stack
 
Linux Malware Analysis
Linux Malware Analysis	Linux Malware Analysis
Linux Malware Analysis
 
Introduction to Binary Exploitation
Introduction to Binary Exploitation	Introduction to Binary Exploitation
Introduction to Binary Exploitation
 
ATM Malware: Understanding the threat
ATM Malware: Understanding the threat	ATM Malware: Understanding the threat
ATM Malware: Understanding the threat
 

Recently uploaded

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Recently uploaded (20)

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Deep Web - what to do and what not to do

  • 1. DEEP WEB WHAT TO DO ‘N’ WHAT NOT TO DO
  • 2. root@topdeepweb:$> cat whoami.txt [+] AJAY KUMAR [+] [+] INDEPENDENT SECURITY RESEARCHER [+] [+] DEEP WEB ENTHUISIAT AND RESEARCHER [+] [+] YET TO BE AN ENGINEER [+] [+] Find my research works on 0xmalweb.online [+]
  • 3. WHAT IS DEEP WEB ?
  • 4. The deep web or invisible web or hidden webare parts of the World Wide Web whose contents are not indexed by standard search engines for any reason
  • 5. WONDER WHAT IT IS ? • Deep web contains 75% of the total world wide web • Only remaining 25% is Surface web (which includes Facebook , Twitter , Google etc) • The most popular search engine GOOGLE can search only 18% of the SURFACE WEB • In the sense , only 18% of the surface web is indexed by google
  • 6. Levels Of web SURFACE WEB: The web that the vast majority of internet users are connected to. Accessible in any nation that does not block internet access. E.g: Social media sites like Facebook, informational websites like Wikipedia, general websites, etc. BERGIE WEB: The layer of the Surface Web that is blocked in some nations. Some other information is only accessible through illegal means. E.g: Google locked results, recently web crawled old content, pirated media, pornography etc
  • 7. Levels Of Web (contd…) DEEPWEB: Requires special software or proxy to access (TOR).Contains most of the archived web pages of the 1990s Web that did not renew their domain names and such.E.g: Government/Business Research, Hackers, ScriptKiddies, Virus Information, Illegal and Obscene Content (CP, Gore, Suicides, etc…) CHARTER WEB: It is like the regular deep web, but harder to get into and more illegal content. Advanced covert government research, most of the internet black market (run on bitcoins), Human/Arms/Drug/Rare Animal Trafficking, Assassination Networks , illegal game hunting, line of blood locations, more banned obscene content like CP, Gore, etc.
  • 8. Levels Of Web (contd…) • MARIANAS WEB: Lowest known level of the Deep Web. Named after the Spanish Technician who created it. It is extremely difficult to access, users say it is the safest part of the internet due to the privacy. Julian Assange and other top-level Wikileaks members are believed to have access.
  • 9. Do Deep Web Is Really Illegal? If So what actually the Deep Web contains to call it Illegal
  • 10. SPAMMERS / SOCIAL ENGINEERERS / DOXERS
  • 11. SECURE YOURSELF RED ROOMS / SUICIDAL FORUMS
  • 14. HITMAN / CONTRACT KILLERS
  • 15.
  • 19. But Not Everything In Deep Web Is Illegal
  • 20. Researchers from Terbium Labs claim to have found evidence that 50% of the deep web contents are legal
  • 21. 50% 13% 11% 9% 4% 3% 3% 2%2%1%1%1% Deep Web legal Drugs Multiple other categories (illicit) Site Down Other illicit activity Explicit Fraud Pharmaceuticals Hacking & Exploits Downloadable Exploitation Extremisum
  • 22. What Legal Things Do Deep Web Contains ??
  • 29. 0 Day Exploits and Data Dumps
  • 30. Secure Yourself While Accessing Deep Web
  • 31. • Manual settings For Tor Browser go for about:config and make sure javascript.enabled and geo.enabled is set to false
  • 32. • Disable Javascript using No script addon too • Disable or Uninstall all addons except HTTPS Everywhere • Try to change tor circuit and network over a period of time manually • Donot download any files directly from the Deep Web • Donot open any links directly from Deep Web in surface web • Use PGP to chat or mail with someone on Deep Web • Use unique username for each and every forums you visit • Don’t use same usernames while using IRC or on surface web • Avoid using .to and .link (tor2web services) • Try to use tor in a dedicated system (tail live os )
  • 33. “Anonymity does not mean criminality” Privacy Matters In Deep Web , Don’t loose it to morons