SlideShare a Scribd company logo
1 of 12
By - Raghav Bisht
Contents
Introduction
Clearweb
Dark web
Deepweb
Case Study
Q/A
Introduction
●Onion Routing
○ Onion routing is a technique for anonymous communication over a computer network. In an
onion network, messages are encapsulated in layers of encryption, analogous to layers of the
vegetable onion.
●About Tor
○ Tor History
○ What Is Tor ?
○ How Tor Works ?
○ Pros & Cons of Tor
○ How to config Tor ?
●About I2P
○ What is I2P ?
○ How to config I2P
Introduction
About Tor
○ Tor History
■ The core principle of Tor, "onion routing", was developed in the mid-1990s by United States Naval
Research Laboratory employees, mathematician Paul Syverson and computer scientists Michael Reed
and David Goldschlag, with the purpose of protecting U.S. intelligence communications online. Onion
routing was further developed by DARPA in 1997
○ What Is Tor ?
■ Anonymous Communication Software
○ How Tor Works ?
■ relay point
○ Pros & Cons of Tor
■ Bad Guys V/s Good Guys
○ How to config Tor ?
■ Download :
https://www.torproject.org/download/download
■ Start Vidalia
■ Settings > Advanced > Tor Control
> Use Tcp Connection > 127.0.0.1:9051
■ Browser Set proxy : 127.0.0.1:9050
Introduction
About I2P
○ What is I2P ?
■ The Invisible Internet Project (I2P)
is an overlay network
and darknet that allows
applications to send
messages to
each other pseudonymously
and securely.
○ How to config I2P
■ https://geti2p.net/en/download
■ Open http://127.0.0.1:7657/home
Clearweb
●So the part of the web which can be
accessed by a search engine is called
Clearweb.
What this means is that anything that we get as a result of
a search engine query is part of the clearweb.
Dark Web
●So apart from the web that is accessed by
search engines there is still a huge amount
of data that exists in pages not touched by
web spiders/crawlers. This part of the web is
known as dark web or darknet.
DeepWeb
● The dark web comprises of a huge part of the overall web. Inside this dark
web there exists another section which is called as deep web.
● This deep web is also not accessible to the search engines but it also
cannot be accessed directly by standard browsers we daily use.
● This portion of the web is hidden deep inside the web and requires special
applications and configurations to be accessed and hence is called deep
web.
How To Use Deep Web ?
● Through Darknet services like
○ Tor
○ I2p
● The Hidden Wiki
○ http://zqktlwi4fecvo6ri
.onion/wiki/index.php
/Main_Page
Notice that this URL does not
contain a .com, .net, .org, or
other familiar domain names,
but is .onion. Firstly try to open
this URL into a regular browser,
does it open up? Now open this
URL into our Tor browser.
How To Use Deep Web ?
http://torwikignoueupfm.onion/index.php?title=Main_Page
Osint - Dark side of Internet
Osint - Dark side of Internet

More Related Content

What's hot

Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
Chaitanya Kn
 
What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...
What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...
What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...
Simplilearn
 

What's hot (20)

Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Document Classification with Neo4j
Document Classification with Neo4jDocument Classification with Neo4j
Document Classification with Neo4j
 
Informatica Forense - Nahuel Sagardoy
Informatica Forense - Nahuel SagardoyInformatica Forense - Nahuel Sagardoy
Informatica Forense - Nahuel Sagardoy
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Genetic algorithm for hyperparameter tuning
Genetic algorithm for hyperparameter tuningGenetic algorithm for hyperparameter tuning
Genetic algorithm for hyperparameter tuning
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
MongoDB Blockchain
MongoDB BlockchainMongoDB Blockchain
MongoDB Blockchain
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Ai notes
Ai notesAi notes
Ai notes
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Ch32
Ch32Ch32
Ch32
 
What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...
What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...
What Is Deep Learning? | Introduction to Deep Learning | Deep Learning Tutori...
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
The dark web
The dark webThe dark web
The dark web
 
Hive and HiveQL - Module6
Hive and HiveQL - Module6Hive and HiveQL - Module6
Hive and HiveQL - Module6
 
APACHE SPARK.pptx
APACHE SPARK.pptxAPACHE SPARK.pptx
APACHE SPARK.pptx
 

Similar to Osint - Dark side of Internet

Dark Web1- Introduction-What is Dark Web- What is the subject of using.docx
Dark Web1- Introduction-What is Dark Web- What is the subject of using.docxDark Web1- Introduction-What is Dark Web- What is the subject of using.docx
Dark Web1- Introduction-What is Dark Web- What is the subject of using.docx
cliftonl1
 

Similar to Osint - Dark side of Internet (20)

Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Dark net
Dark netDark net
Dark net
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Deep web
Deep webDeep web
Deep web
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
Deep and Dark web
Deep and Dark webDeep and Dark web
Deep and Dark web
 
Deep web
Deep webDeep web
Deep web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Dark web (1)
Dark web (1)Dark web (1)
Dark web (1)
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentation2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentation
 
Dark Web1- Introduction-What is Dark Web- What is the subject of using.docx
Dark Web1- Introduction-What is Dark Web- What is the subject of using.docxDark Web1- Introduction-What is Dark Web- What is the subject of using.docx
Dark Web1- Introduction-What is Dark Web- What is the subject of using.docx
 
Dark Net
Dark NetDark Net
Dark Net
 
Introduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring projectIntroduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring project
 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknet
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
The deep web & the dark net
The deep web & the dark netThe deep web & the dark net
The deep web & the dark net
 

More from Raghav Bisht

Windows Registry Tips & Tricks
Windows Registry Tips & TricksWindows Registry Tips & Tricks
Windows Registry Tips & Tricks
Raghav Bisht
 

More from Raghav Bisht (20)

OSINT - Yandex Search
OSINT - Yandex SearchOSINT - Yandex Search
OSINT - Yandex Search
 
OSINT - Twitter Searches
OSINT - Twitter SearchesOSINT - Twitter Searches
OSINT - Twitter Searches
 
OSINT Tool - Reconnaissance with Recon-ng
OSINT Tool - Reconnaissance with Recon-ngOSINT Tool - Reconnaissance with Recon-ng
OSINT Tool - Reconnaissance with Recon-ng
 
OSINT Tool - Reconnaissance with Maltego
OSINT Tool - Reconnaissance with MaltegoOSINT Tool - Reconnaissance with Maltego
OSINT Tool - Reconnaissance with Maltego
 
OSINT - Linkedin Search Slides
OSINT - Linkedin Search SlidesOSINT - Linkedin Search Slides
OSINT - Linkedin Search Slides
 
OSINT - Facebook Searches
OSINT - Facebook SearchesOSINT - Facebook Searches
OSINT - Facebook Searches
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
Sql injection attack
Sql injection attackSql injection attack
Sql injection attack
 
Os Command Injection Attack
Os Command Injection AttackOs Command Injection Attack
Os Command Injection Attack
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Introduction To Exploitation & Metasploit
Introduction To Exploitation & MetasploitIntroduction To Exploitation & Metasploit
Introduction To Exploitation & Metasploit
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Directory Traversal & File Inclusion Attacks
Directory Traversal & File Inclusion AttacksDirectory Traversal & File Inclusion Attacks
Directory Traversal & File Inclusion Attacks
 
Antivirus Bypass Techniques - 2016
Antivirus Bypass Techniques - 2016Antivirus Bypass Techniques - 2016
Antivirus Bypass Techniques - 2016
 
ccna practical notes
ccna practical notesccna practical notes
ccna practical notes
 
Hacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav BishtHacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav Bisht
 
Web-servers & Application Hacking
Web-servers & Application HackingWeb-servers & Application Hacking
Web-servers & Application Hacking
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Windows Registry Tips & Tricks
Windows Registry Tips & TricksWindows Registry Tips & Tricks
Windows Registry Tips & Tricks
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 

Osint - Dark side of Internet

  • 1. By - Raghav Bisht
  • 3. Introduction ●Onion Routing ○ Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of the vegetable onion. ●About Tor ○ Tor History ○ What Is Tor ? ○ How Tor Works ? ○ Pros & Cons of Tor ○ How to config Tor ? ●About I2P ○ What is I2P ? ○ How to config I2P
  • 4. Introduction About Tor ○ Tor History ■ The core principle of Tor, "onion routing", was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson and computer scientists Michael Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online. Onion routing was further developed by DARPA in 1997 ○ What Is Tor ? ■ Anonymous Communication Software ○ How Tor Works ? ■ relay point ○ Pros & Cons of Tor ■ Bad Guys V/s Good Guys ○ How to config Tor ? ■ Download : https://www.torproject.org/download/download ■ Start Vidalia ■ Settings > Advanced > Tor Control > Use Tcp Connection > 127.0.0.1:9051 ■ Browser Set proxy : 127.0.0.1:9050
  • 5. Introduction About I2P ○ What is I2P ? ■ The Invisible Internet Project (I2P) is an overlay network and darknet that allows applications to send messages to each other pseudonymously and securely. ○ How to config I2P ■ https://geti2p.net/en/download ■ Open http://127.0.0.1:7657/home
  • 6. Clearweb ●So the part of the web which can be accessed by a search engine is called Clearweb. What this means is that anything that we get as a result of a search engine query is part of the clearweb.
  • 7. Dark Web ●So apart from the web that is accessed by search engines there is still a huge amount of data that exists in pages not touched by web spiders/crawlers. This part of the web is known as dark web or darknet.
  • 8. DeepWeb ● The dark web comprises of a huge part of the overall web. Inside this dark web there exists another section which is called as deep web. ● This deep web is also not accessible to the search engines but it also cannot be accessed directly by standard browsers we daily use. ● This portion of the web is hidden deep inside the web and requires special applications and configurations to be accessed and hence is called deep web.
  • 9. How To Use Deep Web ? ● Through Darknet services like ○ Tor ○ I2p ● The Hidden Wiki ○ http://zqktlwi4fecvo6ri .onion/wiki/index.php /Main_Page Notice that this URL does not contain a .com, .net, .org, or other familiar domain names, but is .onion. Firstly try to open this URL into a regular browser, does it open up? Now open this URL into our Tor browser.
  • 10. How To Use Deep Web ? http://torwikignoueupfm.onion/index.php?title=Main_Page