SlideShare a Scribd company logo
1 of 16
Web Layer
MUHAMMAD HASHIM
Web Layers
1. SurfaceWeb
2. DeepWeb
3. DarkWeb
4. MarinasWeb
Muhammad Hashim January 21, 2020
Muhammad Hashim January 21, 2020
Surface Web
• “visible” area.
• available to the general public and searchable with standard web
search engines.
• The SurfaceWeb only consists 10 percent of the information that is
on the internet.
• According to one source, as of June 14, 2015, Google's index of the
surface web contains about 14.5 billion pages
Muhammad Hashim January 21, 2020
Deep web
• In 2009 when deep web search terminology was discussed together
with illegal activities taking place through it.
• Its often confused with dark web.
• It first debuted asThe Onion Routing project in 2002, made by the
U.S. Naval Research Laboratory as a method for communicating
online anonymously.
• The DeepWeb contains all content that is not indexed by search
engines.
Muhammad Hashim January 21, 2020
Contd…
• Its include on database of a website or even intranet pages.
• Deep web is vast and accounts for almost 90’s % of the Internet.
• The deep web at almost 7,500 terabytes of information.
• A 2016 study by the University of Norwich estimated that over $100
million is generated on the deep web every year.
Muhammad Hashim January 21, 2020
Is Facebook on the dark web?
• Facebook maintained on “Onion” site that resides on the
Tor network.
• The number of people connecting to Facebook overTor is growing at
a steady clip.
• Facebook said that in June 2015 some 525,000 people accessed
its dark-web site.
Muhammad Hashim January 21, 2020
Dark Web
• The DarkWeb (or Dark Net) is part of the DeepWeb, but can only be
accessed via specific software, such as theTor Browser and theTor
network
• The DarkWeb offers the user a certain hide there identity.
• As the DarkWeb makes many illegal content available, such as how
to mix poison or cook drugs, buy weapons, drugs, child pornography,
and criminal acts, there is also some danger to the user on the Dark
Web.
Muhammad Hashim January 21, 2020
Contd…
• It was developed by the U.S. Navy for the government in the mid-
1990’s. But it was open-sourced in 2004, and that's when it went
public.
• The dark web likely only accounts for about almost.01 percent.
• Dark Red Rooms………………..? It is concept probably taken from the
1983 ‘Videodrome’ horror movie.
Muhammad Hashim January 21, 2020
Links of deep web:
• For Facebook: 7qzmtqy2itl7dwuu
• The Pirate Bay: uj3wazyk5u4hnvtk
• Bet Fixed Matches : hbetshipq5yhhrsd
• Browser torch : xmh57jrzrnw6insl
Muhammad Hashim January 21, 2020
Diff between tor and normal browser:
• Hide identity.
• Chrome for example, does not allow you to change you IP at will. It
does allow you to configureVPN and proxy settings however.
Muhammad Hashim January 21, 2020
How tor browser works
Muhammad Hashim January 21, 2020
Tor Vs Vpn
• Both are similar.
• Tor creates connection between ur system and the tor network.
• Vpn enters into the tor network which is called an entry node.
• Tor use relays and each is varying bandwidth.
Muhammad Hashim January 21, 2020
Marinas Web
• Even deeper and dangerous than dark web and deep web.
• U need specific address(link) and a code to enter in the site.
• That most state secrets are stored here, histories of theVatican
Others argue that it is now the communication network for the
Illuminati.
Muhammad Hashim January 21, 2020
How marina web is accessed?
• Network quantum computers with software architecture that can
store and process information on artificially modified photons.
• Quantum computers allow particles to exist in two states
simultaneously this structural instability means it is impossible for
hackers to penetrate.
Muhammad Hashim January 21, 2020
Muhammad Hashim January 21, 2020

More Related Content

What's hot

Deep Web
Deep WebDeep Web
Deep WebSt John
 
You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionCrowdStrike
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
 
The dark web
The dark webThe dark web
The dark webBella M
 
Introduction to Penetration Testing
Introduction to Penetration TestingIntroduction to Penetration Testing
Introduction to Penetration TestingAndrew McNicol
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Network security
Network securityNetwork security
Network securityNandini Raj
 

What's hot (20)

ethical hacking
ethical hackingethical hacking
ethical hacking
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
Deep Web
Deep WebDeep Web
Deep Web
 
You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And Detection
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
cyber quiz
cyber quizcyber quiz
cyber quiz
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
The dark web
The dark webThe dark web
The dark web
 
Introduction to Penetration Testing
Introduction to Penetration TestingIntroduction to Penetration Testing
Introduction to Penetration Testing
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Network security
Network securityNetwork security
Network security
 

Similar to Web layers

Similar to Web layers (20)

Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Dark web
Dark webDark web
Dark web
 
darkweb
darkwebdarkweb
darkweb
 
Deep Web
Deep WebDeep Web
Deep Web
 
Dark net
Dark netDark net
Dark net
 
Darknet
DarknetDarknet
Darknet
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
An Analysis Of The Deep Web
An Analysis Of The Deep WebAn Analysis Of The Deep Web
An Analysis Of The Deep Web
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Deep and dark web
Deep and dark web Deep and dark web
Deep and dark web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Dark Net
Dark NetDark Net
Dark Net
 
Dark net (escalona)
Dark net (escalona)Dark net (escalona)
Dark net (escalona)
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 

More from hashim102

Polymorphism
PolymorphismPolymorphism
Polymorphismhashim102
 
Politicial instability in bloachistan
Politicial instability in bloachistanPoliticial instability in bloachistan
Politicial instability in bloachistanhashim102
 
Writing skills
Writing skillsWriting skills
Writing skillshashim102
 
Reading skills
Reading skillsReading skills
Reading skillshashim102
 
Differnce of two processors
Differnce of two processorsDiffernce of two processors
Differnce of two processorshashim102
 
introduction to Web system
introduction to Web systemintroduction to Web system
introduction to Web systemhashim102
 
cpu scheduling
cpu schedulingcpu scheduling
cpu schedulinghashim102
 
data structure
data structuredata structure
data structurehashim102
 

More from hashim102 (11)

Holography
HolographyHolography
Holography
 
Polymorphism
PolymorphismPolymorphism
Polymorphism
 
Bad news
Bad newsBad news
Bad news
 
Politicial instability in bloachistan
Politicial instability in bloachistanPoliticial instability in bloachistan
Politicial instability in bloachistan
 
Writing skills
Writing skillsWriting skills
Writing skills
 
Reading skills
Reading skillsReading skills
Reading skills
 
Differnce of two processors
Differnce of two processorsDiffernce of two processors
Differnce of two processors
 
Gpu
GpuGpu
Gpu
 
introduction to Web system
introduction to Web systemintroduction to Web system
introduction to Web system
 
cpu scheduling
cpu schedulingcpu scheduling
cpu scheduling
 
data structure
data structuredata structure
data structure
 

Recently uploaded

Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appscristianmanaila2
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsrahman018755
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsrahman018755
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfe-Market Hub
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebJie Liau
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkklolsDocherty
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresencePC Doctors NET
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.Tortogel
 
AI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model GeneratorAI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model Generator3DailyAI1
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfappinfoedgeca
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxChloeMeadows1
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsrahman018755
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirtrahman018755
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideVarun Mithran
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfOndejSur
 

Recently uploaded (17)

Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdf
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
AI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model GeneratorAI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model Generator
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 

Web layers

  • 2. Web Layers 1. SurfaceWeb 2. DeepWeb 3. DarkWeb 4. MarinasWeb Muhammad Hashim January 21, 2020
  • 4. Surface Web • “visible” area. • available to the general public and searchable with standard web search engines. • The SurfaceWeb only consists 10 percent of the information that is on the internet. • According to one source, as of June 14, 2015, Google's index of the surface web contains about 14.5 billion pages Muhammad Hashim January 21, 2020
  • 5. Deep web • In 2009 when deep web search terminology was discussed together with illegal activities taking place through it. • Its often confused with dark web. • It first debuted asThe Onion Routing project in 2002, made by the U.S. Naval Research Laboratory as a method for communicating online anonymously. • The DeepWeb contains all content that is not indexed by search engines. Muhammad Hashim January 21, 2020
  • 6. Contd… • Its include on database of a website or even intranet pages. • Deep web is vast and accounts for almost 90’s % of the Internet. • The deep web at almost 7,500 terabytes of information. • A 2016 study by the University of Norwich estimated that over $100 million is generated on the deep web every year. Muhammad Hashim January 21, 2020
  • 7. Is Facebook on the dark web? • Facebook maintained on “Onion” site that resides on the Tor network. • The number of people connecting to Facebook overTor is growing at a steady clip. • Facebook said that in June 2015 some 525,000 people accessed its dark-web site. Muhammad Hashim January 21, 2020
  • 8. Dark Web • The DarkWeb (or Dark Net) is part of the DeepWeb, but can only be accessed via specific software, such as theTor Browser and theTor network • The DarkWeb offers the user a certain hide there identity. • As the DarkWeb makes many illegal content available, such as how to mix poison or cook drugs, buy weapons, drugs, child pornography, and criminal acts, there is also some danger to the user on the Dark Web. Muhammad Hashim January 21, 2020
  • 9. Contd… • It was developed by the U.S. Navy for the government in the mid- 1990’s. But it was open-sourced in 2004, and that's when it went public. • The dark web likely only accounts for about almost.01 percent. • Dark Red Rooms………………..? It is concept probably taken from the 1983 ‘Videodrome’ horror movie. Muhammad Hashim January 21, 2020
  • 10. Links of deep web: • For Facebook: 7qzmtqy2itl7dwuu • The Pirate Bay: uj3wazyk5u4hnvtk • Bet Fixed Matches : hbetshipq5yhhrsd • Browser torch : xmh57jrzrnw6insl Muhammad Hashim January 21, 2020
  • 11. Diff between tor and normal browser: • Hide identity. • Chrome for example, does not allow you to change you IP at will. It does allow you to configureVPN and proxy settings however. Muhammad Hashim January 21, 2020
  • 12. How tor browser works Muhammad Hashim January 21, 2020
  • 13. Tor Vs Vpn • Both are similar. • Tor creates connection between ur system and the tor network. • Vpn enters into the tor network which is called an entry node. • Tor use relays and each is varying bandwidth. Muhammad Hashim January 21, 2020
  • 14. Marinas Web • Even deeper and dangerous than dark web and deep web. • U need specific address(link) and a code to enter in the site. • That most state secrets are stored here, histories of theVatican Others argue that it is now the communication network for the Illuminati. Muhammad Hashim January 21, 2020
  • 15. How marina web is accessed? • Network quantum computers with software architecture that can store and process information on artificially modified photons. • Quantum computers allow particles to exist in two states simultaneously this structural instability means it is impossible for hackers to penetrate. Muhammad Hashim January 21, 2020

Editor's Notes

  1. means in the Surface Web are all websites that are indexed by search engines such as Google, Yahoo or Bing. Every Internet user surfs regularly in the Surface Web.
  2. Unlike public websites, which enable organizations to communicate and broadcast their value proposition to customers, 
  3. criminal investigator Gary Alford, Ross Ulbricht was alleged by the FBI to be the founder and owner of silk road
  4. Because there is such a huge network of nodes, it gives you the ability to bounce between IP addresses freely. The Tor Project claims that only 1.5 percent of overall traffic
  5. I2p invisible internet project
  6. Its name is derived from the Mariana Trench.