SlideShare a Scribd company logo
1 of 10
Web Forensics
Under the surface web (accessible by
everybody) and the deep web (accessible
with a password or code) is the dark web,
which accounts for 90% of all web
content.
This layer of the internet is a great source for
digital forensics since criminal elements,
hackers, terrorists, members of crime
organizations, and other threat actors exchange
information, buy and sell stolen data, illicit
goods, and hacker tools, plan terrorist attacks,
and pay or get paid in cryptocurrency.
Law enforcement agencies need to access
the dark web to follow the digital footprints
of criminals and get insight into their
networks, transactions, and co-conspirators.
But dark web scanning to collect and process big
data is time-consuming and complicated for
analyzing these huge amounts of data from dark web
marketplaces, forums, blogs, online message boards,
and social media. Therefore, Investigators and
analysts need OSINT tools for dark web scanning to
identify and find links between criminals and various
profiles.
But dark web scanning to collect and process big data is
time-consuming and complicated for analyzing these
huge amounts of data from web forensics
marketplaces, forums, blogs, online message boards,
and social media. Therefore, Investigators and analysts
need OSINT tools for dark web scanning to identify and
find links between criminals and various profiles.
The results of the analyzed OSINT data
sources must be presented in graphs and
maps for actionable insights. In other
words, a best-of-breed dark web
scanning service is needed.
Dark web monitoring tools help investigators
and analysts to identify threat actors, follow the
cryptocurrency money trail, map connections
between threat actors, their affiliates, and group
members to solve and prevent crimes such as
cyber threats.
Dark web monitoring tools are also useful for
detecting and preventing insider threats. Such
internet monitoring software can scan for direct
mentions of a specific organization (e.g., a bank or a
research lab) or specific assets (e.g., research papers,
confidential memos, or drafts of patents) that could
indicate either being targeted or a potential breach.
The best dark web monitoring services use
smart algorithms, especially Natural
Language Processing (NLP), since a lot of
dark web forums and message boards are
in various languages, including English,
Arabic, Russian, and Chinese.

More Related Content

Similar to Web forensics

3i mind-open mind-web
3i mind-open mind-web3i mind-open mind-web
3i mind-open mind-web
DeepDude
 
3i mind-open mind-web
3i mind-open mind-web3i mind-open mind-web
3i mind-open mind-web
PublicLeaker
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
OllieShoresna
 
Artificial Intelligence On The Dark Web
Artificial Intelligence On The Dark WebArtificial Intelligence On The Dark Web
Artificial Intelligence On The Dark Web
abraxasdarknetmarket
 

Similar to Web forensics (20)

Godfather 2.0
Godfather 2.0Godfather 2.0
Godfather 2.0
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Cyber security ln
Cyber security lnCyber security ln
Cyber security ln
 
3i mind-open mind-web
3i mind-open mind-web3i mind-open mind-web
3i mind-open mind-web
 
3i mind-open mind-web
3i mind-open mind-web3i mind-open mind-web
3i mind-open mind-web
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Unit-2 ICS.ppt
Unit-2 ICS.pptUnit-2 ICS.ppt
Unit-2 ICS.ppt
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
ALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptx
ALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptxALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptx
ALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
AktaionvWhitePaperBlackHat2016
AktaionvWhitePaperBlackHat2016AktaionvWhitePaperBlackHat2016
AktaionvWhitePaperBlackHat2016
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speed
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
 
Presentation
PresentationPresentation
Presentation
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation tools
 
Data Sources - Digital Shadows
Data Sources - Digital ShadowsData Sources - Digital Shadows
Data Sources - Digital Shadows
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
 
Artificial Intelligence On The Dark Web
Artificial Intelligence On The Dark WebArtificial Intelligence On The Dark Web
Artificial Intelligence On The Dark Web
 

More from Data Source

AI-generated avatars.pptx
AI-generated avatars.pptxAI-generated avatars.pptx
AI-generated avatars.pptx
Data Source
 

More from Data Source (20)

Transforming Retail Communications: The Key to Success
Transforming Retail Communications: The Key to SuccessTransforming Retail Communications: The Key to Success
Transforming Retail Communications: The Key to Success
 
IoT Monitoring: Unleashing the Power of Real-Time Insights for Efficient Oper...
IoT Monitoring: Unleashing the Power of Real-Time Insights for Efficient Oper...IoT Monitoring: Unleashing the Power of Real-Time Insights for Efficient Oper...
IoT Monitoring: Unleashing the Power of Real-Time Insights for Efficient Oper...
 
Fiber converters.pdf
Fiber converters.pdfFiber converters.pdf
Fiber converters.pdf
 
Embracing the Future: Exploring the Power of EW Radar
Embracing the Future: Exploring the Power of EW RadarEmbracing the Future: Exploring the Power of EW Radar
Embracing the Future: Exploring the Power of EW Radar
 
Медикаментозное лечение _ рассеянный склероз.pptx
Медикаментозное лечение _ рассеянный склероз.pptxМедикаментозное лечение _ рассеянный склероз.pptx
Медикаментозное лечение _ рассеянный склероз.pptx
 
AI 小売革命: ショッピング エクスペリエンスを変革する
AI 小売革命: ショッピング エクスペリエンスを変革するAI 小売革命: ショッピング エクスペリエンスを変革する
AI 小売革命: ショッピング エクスペリエンスを変革する
 
Die KI-Revolution: Das Potenzial von KI-Produkten freisetzen
Die KI-Revolution: Das Potenzial von KI-Produkten freisetzenDie KI-Revolution: Das Potenzial von KI-Produkten freisetzen
Die KI-Revolution: Das Potenzial von KI-Produkten freisetzen
 
AI-generated avatars.pptx
AI-generated avatars.pptxAI-generated avatars.pptx
AI-generated avatars.pptx
 
טיפול בסוכרת: גישה מקיפה
טיפול בסוכרת: גישה מקיפהטיפול בסוכרת: גישה מקיפה
טיפול בסוכרת: גישה מקיפה
 
E-Learning Video Maker
E-Learning Video MakerE-Learning Video Maker
E-Learning Video Maker
 
עיצוב מטבחי יוקרה
עיצוב מטבחי יוקרהעיצוב מטבחי יוקרה
עיצוב מטבחי יוקרה
 
טיפול בסכרת
טיפול בסכרתטיפול בסכרת
טיפול בסכרת
 
ai チップ
ai チップai チップ
ai チップ
 
Edge ki
Edge kiEdge ki
Edge ki
 
בחירת משכנתא
בחירת משכנתאבחירת משכנתא
בחירת משכנתא
 
SMS For Ecommerce Banking
SMS For Ecommerce BankingSMS For Ecommerce Banking
SMS For Ecommerce Banking
 
Connected Operational Worker Market
Connected Operational Worker MarketConnected Operational Worker Market
Connected Operational Worker Market
 
Smart Home Technology
Smart Home TechnologySmart Home Technology
Smart Home Technology
 
בנק איגוד למשכנתאות
בנק איגוד למשכנתאותבנק איגוד למשכנתאות
בנק איגוד למשכנתאות
 
אנגלית לכיתה ה
אנגלית לכיתה האנגלית לכיתה ה
אנגלית לכיתה ה
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

Web forensics

  • 2. Under the surface web (accessible by everybody) and the deep web (accessible with a password or code) is the dark web, which accounts for 90% of all web content.
  • 3. This layer of the internet is a great source for digital forensics since criminal elements, hackers, terrorists, members of crime organizations, and other threat actors exchange information, buy and sell stolen data, illicit goods, and hacker tools, plan terrorist attacks, and pay or get paid in cryptocurrency.
  • 4. Law enforcement agencies need to access the dark web to follow the digital footprints of criminals and get insight into their networks, transactions, and co-conspirators.
  • 5. But dark web scanning to collect and process big data is time-consuming and complicated for analyzing these huge amounts of data from dark web marketplaces, forums, blogs, online message boards, and social media. Therefore, Investigators and analysts need OSINT tools for dark web scanning to identify and find links between criminals and various profiles.
  • 6. But dark web scanning to collect and process big data is time-consuming and complicated for analyzing these huge amounts of data from web forensics marketplaces, forums, blogs, online message boards, and social media. Therefore, Investigators and analysts need OSINT tools for dark web scanning to identify and find links between criminals and various profiles.
  • 7. The results of the analyzed OSINT data sources must be presented in graphs and maps for actionable insights. In other words, a best-of-breed dark web scanning service is needed.
  • 8. Dark web monitoring tools help investigators and analysts to identify threat actors, follow the cryptocurrency money trail, map connections between threat actors, their affiliates, and group members to solve and prevent crimes such as cyber threats.
  • 9. Dark web monitoring tools are also useful for detecting and preventing insider threats. Such internet monitoring software can scan for direct mentions of a specific organization (e.g., a bank or a research lab) or specific assets (e.g., research papers, confidential memos, or drafts of patents) that could indicate either being targeted or a potential breach.
  • 10. The best dark web monitoring services use smart algorithms, especially Natural Language Processing (NLP), since a lot of dark web forums and message boards are in various languages, including English, Arabic, Russian, and Chinese.