SlideShare una empresa de Scribd logo
1 de 18
THE DEEP WEB
That part of the Internet people don’t really know
about..
By Melissa Pereira and Fahad Nasir
WHAT IS IT?
 The deep, the dark web, the hidden web,
etc.
 Makes up for most of the information on the
Internet
 Not indexed
 Can’t be found using normal search engines
 Not part of Surface Web
 Contains up to 7500 terabytes of information
 400 to 550 times the information of the surface web
 No domain names, thus making sites hard to find
 Example of a URL on the deep web
(SdddEEDOHIIDdddgmomiunw.onion)
WHAT AWESOME STUFF CAN I FIND?
 Just about anything
 Drug purchase, hit man for hire, weaponry,
pornography (don’t look for it, it’s the illegal
kind)
 Information regarding corporations
 Company secrets
 Hacking sites (eZines)
 Whistleblowing sites (e.g wikileaks)
 Bitcoin is the general form of currency to be
anonymous
THE HIDDEN WIKI
 The hidden wiki
 Categorized listing of stuff you can find on
the deep web
 Helps to navigate through the deep web
WHO’S ON IT?
 Hackers
 Criminals
 Whistle blowers
 Probably you in the next couple of days….
HOW CAN IT BE USEFUL?
 Opens a HUGE well of information!
 What else do you need?
 Reconnaissance stage
THE INTERESTING PART…
HOW CAN I ACCESS IT?
 Using special browsers
 Tor! (The Onion Router), Free net, Jon Do
TOR!
 Uses a browser based on FireFox
 Tor obfuscates
 Uses Nodes
 *torrenting, using Javascript/flash could
compromise your identity
BE CAREFUL!
 Be anonymous
 Don’t click on random links
 No illegal shit
 Don’t trust anyone
THIS COULD HAPPEN….
Just use common sense! :D
That’s all folks!

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Deep web
Deep webDeep web
Deep web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Deep web
Deep webDeep web
Deep web
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Darknet
DarknetDarknet
Darknet
 
Dark wed
Dark wedDark wed
Dark wed
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Deep web
Deep webDeep web
Deep web
 
The dark web
The dark webThe dark web
The dark web
 
The dark web
The dark webThe dark web
The dark web
 
Deep web
Deep webDeep web
Deep web
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
 

Similar a The Deep Web

What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxhelzerpatrina
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webPaul Brooks
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
Darknet: The Other Side
Darknet: The Other SideDarknet: The Other Side
Darknet: The Other Sidejbraindc
 
Perils of ignoring dark web monitoring services by Trojan Hunt India.
Perils of ignoring dark web monitoring services by Trojan Hunt India.Perils of ignoring dark web monitoring services by Trojan Hunt India.
Perils of ignoring dark web monitoring services by Trojan Hunt India.Trojan Hunt India
 
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?Kimberly Williams
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
Misuse of Internet.ppt
Misuse of Internet.pptMisuse of Internet.ppt
Misuse of Internet.pptJoshuaMadera2
 

Similar a The Deep Web (20)

What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
 
Scuba diving into The Deep Dark Web
Scuba diving into The Deep Dark WebScuba diving into The Deep Dark Web
Scuba diving into The Deep Dark Web
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Deep Web
Deep WebDeep Web
Deep Web
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
 
Darkweb
DarkwebDarkweb
Darkweb
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Darknet: The Other Side
Darknet: The Other SideDarknet: The Other Side
Darknet: The Other Side
 
Deep and dark web
Deep and dark webDeep and dark web
Deep and dark web
 
Dark web
Dark webDark web
Dark web
 
Dark web
Dark webDark web
Dark web
 
Perils of ignoring dark web monitoring services by Trojan Hunt India.
Perils of ignoring dark web monitoring services by Trojan Hunt India.Perils of ignoring dark web monitoring services by Trojan Hunt India.
Perils of ignoring dark web monitoring services by Trojan Hunt India.
 
Dark Web
Dark WebDark Web
Dark Web
 
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Misuse of Internet.ppt
Misuse of Internet.pptMisuse of Internet.ppt
Misuse of Internet.ppt
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

The Deep Web

  • 1. THE DEEP WEB That part of the Internet people don’t really know about.. By Melissa Pereira and Fahad Nasir
  • 2. WHAT IS IT?  The deep, the dark web, the hidden web, etc.  Makes up for most of the information on the Internet  Not indexed  Can’t be found using normal search engines  Not part of Surface Web
  • 3.  Contains up to 7500 terabytes of information  400 to 550 times the information of the surface web  No domain names, thus making sites hard to find  Example of a URL on the deep web (SdddEEDOHIIDdddgmomiunw.onion)
  • 4. WHAT AWESOME STUFF CAN I FIND?  Just about anything  Drug purchase, hit man for hire, weaponry, pornography (don’t look for it, it’s the illegal kind)  Information regarding corporations  Company secrets  Hacking sites (eZines)  Whistleblowing sites (e.g wikileaks)  Bitcoin is the general form of currency to be anonymous
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. THE HIDDEN WIKI  The hidden wiki  Categorized listing of stuff you can find on the deep web  Helps to navigate through the deep web
  • 10.
  • 11. WHO’S ON IT?  Hackers  Criminals  Whistle blowers  Probably you in the next couple of days….
  • 12. HOW CAN IT BE USEFUL?  Opens a HUGE well of information!  What else do you need?  Reconnaissance stage
  • 13. THE INTERESTING PART… HOW CAN I ACCESS IT?  Using special browsers  Tor! (The Onion Router), Free net, Jon Do
  • 14. TOR!  Uses a browser based on FireFox  Tor obfuscates  Uses Nodes  *torrenting, using Javascript/flash could compromise your identity
  • 15.
  • 16. BE CAREFUL!  Be anonymous  Don’t click on random links  No illegal shit  Don’t trust anyone
  • 18. Just use common sense! :D That’s all folks!