SlideShare una empresa de Scribd logo
1 de 10
What is Dark Web ?
• Basically 3 parts of WWW :
1. Surface Web
2. Deep Web
3. Dark Web
• Surface Web :
 Publicly Available & Accessible
• Deep Web :
 Invisible Web , inaccessible by Web Crawlers.
 Not indexed by Standard Search Engines.
 500 times > Surface Web
• Dark Web :
 Tiny Part of Deep Web
 Accessible by specialized Software such as Tor
Browser
 Used for anonymous communication and
illegal activities.
Who Uses Dark Web ?
• Anonymous Nature
• Instrumental Role in illegal activities :
 Child Pornography
 Sale of Drugs
 Fraud Services
 Phishing and Scams
 Terrorism
 Hoaxes and Unverified Content
• Case Study : Silk Road
 First online Black Market
 Platform for selling Illegal Drugs
 Operated as Tor’s Hidden Service
 Transaction carried By Bitcoins (BTC)
 Shutdown By F.B.I
• Journalists and activists also use the dark web
to avoid being traced by autocratic
governments
How to access Dark Web ?
• Tools : Tor Browser
• Access websites whose address
ends with .onion extension
• Anonymizes Browser Traffic
• Establishes secure communications
• Slower than Normal Browsers
• Protects from Eavesdropping and
Surveillance
• Has Social Contracts with users
• Tor network is growing quickly
What is Onion Routing ?
• Onion routing is a technique
for anonymous communication over
a computer network.
• In an onion network, messages are
encapsulated in layers of encryption,
analogous to layers of an onion.
• The encrypted data is transmitted through a
series of network nodes called onion
routers, each of which "peels" away a single
layer, uncovering the data's next destination.
• When the final layer is decrypted, the
message arrives at its destination.
• The sender remains anonymous because
each intermediary knows only the location
of the immediately preceding and following
nodes.
• There are methods to break the anonymity
of this technique, e.g. timing analysis.
Illegal Marketing Statistics
Introduction To Dark Web
Introduction To Dark Web

Más contenido relacionado

La actualidad más candente

The dark web
The dark webThe dark web
The dark web
Bella M
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
James Bollen
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
albafg55
 

La actualidad más candente (20)

The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Dark web
Dark webDark web
Dark web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Dark wed
Dark wedDark wed
Dark wed
 
The dark web
The dark webThe dark web
The dark web
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 

Similar a Introduction To Dark Web

Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
raevenroxas
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Auto Parts Wholesale Online
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
Fabio Pietrosanti
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Auto Parts Wholesale Online
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Auto Parts Wholesale Online
 

Similar a Introduction To Dark Web (20)

Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 
.Onion
.Onion.Onion
.Onion
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdf
 
Darknet
DarknetDarknet
Darknet
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
 
Deep Web
Deep WebDeep Web
Deep Web
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
 
Tor browser
Tor browserTor browser
Tor browser
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Dark net
Dark netDark net
Dark net
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Introduction To Dark Web

  • 1.
  • 2. What is Dark Web ? • Basically 3 parts of WWW : 1. Surface Web 2. Deep Web 3. Dark Web • Surface Web :  Publicly Available & Accessible • Deep Web :  Invisible Web , inaccessible by Web Crawlers.  Not indexed by Standard Search Engines.  500 times > Surface Web • Dark Web :  Tiny Part of Deep Web  Accessible by specialized Software such as Tor Browser  Used for anonymous communication and illegal activities.
  • 3. Who Uses Dark Web ? • Anonymous Nature • Instrumental Role in illegal activities :  Child Pornography  Sale of Drugs  Fraud Services  Phishing and Scams  Terrorism  Hoaxes and Unverified Content • Case Study : Silk Road  First online Black Market  Platform for selling Illegal Drugs  Operated as Tor’s Hidden Service  Transaction carried By Bitcoins (BTC)  Shutdown By F.B.I • Journalists and activists also use the dark web to avoid being traced by autocratic governments
  • 4.
  • 5. How to access Dark Web ? • Tools : Tor Browser • Access websites whose address ends with .onion extension • Anonymizes Browser Traffic • Establishes secure communications • Slower than Normal Browsers • Protects from Eavesdropping and Surveillance • Has Social Contracts with users • Tor network is growing quickly
  • 6.
  • 7. What is Onion Routing ? • Onion routing is a technique for anonymous communication over a computer network. • In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. • The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination. • When the final layer is decrypted, the message arrives at its destination. • The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes. • There are methods to break the anonymity of this technique, e.g. timing analysis.