SlideShare a Scribd company logo
1 of 30
The Darknet 
The layer of the internet nobody wants you to see… 
Presented by: 
Dan Weis
Who’s this guy? 
 Lead Pentester 
 Certified Ethical Hacker, Licensed Penetration Tester, 23+ 
other certs 
 Trainer/Mentor upcoming Ethical Hackers 
 Underground Researcher 
 Been in IT since 1995 in various roles both here and 
internationally. 
 5+ years in security providing consulting, 3 years+ as a 
pentester. 
 Major Nerd
The Internet 
 6th August 1991 the internet was born (became publicly available) 
 These days, 2.5 billion people inhabit the internet 
 Most people think the internet is just this: 
And occasionally this:
Disclaimer 
 The sites presented here are underground 
illegal sites 
 It is not recommended you visit these 
 Some are monitored by the feds (all are 
monitored by the CIA  ) 
 Nor do I support any of these sites or 
activities 
 They ARE dangerous sites 
 Seriously…know what you are doing.. 
Sandboxie, Java disablement, VM’s etc..
What is it? 
 The ‘Darknet’ is the hidden underground of the internet 
 It’s where Hackers, criminals, organised crime, political activists and 
whistleblowers operate 
 Usually only accessible through the Tor anonymizing software 
 Normally where blackmarket transactions are conducted 
 Had no search engine of any sort…. Until earlier this year….
Grams 
 Meet Grams, the Darknet’s first Search Engine 
 It indexes 8 of the Darknet’s markets 
 Keep’s track of the latest rate for bitcoin 
currency, and allows you to filter items to 
display in bitcoins, USD, EUR, GBP 
 Sorts by relevance, similar indexing to Google 
 So what can you buy?
Demo 
A visit to the underground……
Hacking sites
HACKBB
Hacker hiring
THERE ARE LOTS MORE…
Thehiddenwiki.net
Deepweb link directory
Doxbin 
Pastebin for 
Personally 
Identifiable 
information
IT’S NOT ALL BAD…. 
For whistleblowers
Leakdirectory.org
The New Yorker
You don’t need tor to visit all sites 
 A lot of sites operate on the standard web 
 But are located in countries that have laws that are…. 
lacking… 
 Yes they are still watched by the Feds 
 They go up and down often and change url’s frequently 
 Require you to have anonymous currencies, such as bitcoin 
and paid a fee just to browse 
 Is where a lot of the stolen data ends up….
Indexeus 
 Indexeus.org 
 200 million identities+ and expanding 
 Indexes user account information 
acquired from more than 100 recent 
data breaches 
 Including Adobe, Yahoo etc 
 Lists things like email addresses, 
usernames, passwords, Internet 
address, physical addresses, 
birthdays and other information that 
may be associated with those 
accounts.
Trade in stolen credit 
cards & dumps
Verifiedaccts.com 
You name it…they sell it….
Pastebin...
So why are you showing us this? 
To make you aware that there is more than what you 
realise….
Why... 
And to ensure you don’t become a victim! 
 Change your passwords regularly 
 Use strong passwords 
 Don’t use the same password for everything! 
 Use a current browser 
 Ensure you are using an up-to-date, patched workstation 
 Ensure you are using an adequate endpoint protection 
 Stop clicking on things!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
If you do this…
Thanks!

More Related Content

What's hot (20)

The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Deep and Dark web
Deep and Dark webDeep and Dark web
Deep and Dark web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Darknet
DarknetDarknet
Darknet
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
The dark web
The dark webThe dark web
The dark web
 
Deep web
Deep webDeep web
Deep web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Deep Web
Deep WebDeep Web
Deep Web
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 

Viewers also liked

Darknet: We Are Not Alone
Darknet: We Are Not AloneDarknet: We Are Not Alone
Darknet: We Are Not AlonemeJ_madayag
 
The DarkNet
The DarkNetThe DarkNet
The DarkNetboorog
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileraevenroxas
 
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi ChapterAndroid "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi ChapterAbhinav Mishra
 
Darknet - Jerv Marquez
Darknet - Jerv MarquezDarknet - Jerv Marquez
Darknet - Jerv MarquezJerv Marquez
 
Tor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden SitesTor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden Sitesagora_url
 
Android reverse engineering: understanding third-party applications. OWASP EU...
Android reverse engineering: understanding third-party applications. OWASP EU...Android reverse engineering: understanding third-party applications. OWASP EU...
Android reverse engineering: understanding third-party applications. OWASP EU...Internet Security Auditors
 

Viewers also liked (11)

Darknet: We Are Not Alone
Darknet: We Are Not AloneDarknet: We Are Not Alone
Darknet: We Are Not Alone
 
The DarkNet
The DarkNetThe DarkNet
The DarkNet
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
 
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi ChapterAndroid "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
 
Darknet - Jerv Marquez
Darknet - Jerv MarquezDarknet - Jerv Marquez
Darknet - Jerv Marquez
 
Mobile Apps Security Testing -3
Mobile Apps Security Testing -3Mobile Apps Security Testing -3
Mobile Apps Security Testing -3
 
Tor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden SitesTor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden Sites
 
Darknet
DarknetDarknet
Darknet
 
Android reverse engineering: understanding third-party applications. OWASP EU...
Android reverse engineering: understanding third-party applications. OWASP EU...Android reverse engineering: understanding third-party applications. OWASP EU...
Android reverse engineering: understanding third-party applications. OWASP EU...
 
Darknet
DarknetDarknet
Darknet
 
Android sandbox
Android sandboxAndroid sandbox
Android sandbox
 

Similar to A visit to the darknet

Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudInternet Law Center
 
Dark Web Sites.pdf
Dark Web Sites.pdfDark Web Sites.pdf
Dark Web Sites.pdfVograce
 
3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise
3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise
3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove WiseCrypto Currency Focus
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Crypto Quantum Leap book
Crypto Quantum Leap bookCrypto Quantum Leap book
Crypto Quantum Leap bookRaguvaran22
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.Kalpesh Doru
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroJared Broker
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...anupriti
 
I'm All Up in Your Blockchain - Hunting Down the Nazis
I'm All Up in Your Blockchain - Hunting Down the NazisI'm All Up in Your Blockchain - Hunting Down the Nazis
I'm All Up in Your Blockchain - Hunting Down the NazisJohn Bambenek
 

Similar to A visit to the darknet (20)

Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 
Dark Web Sites.pdf
Dark Web Sites.pdfDark Web Sites.pdf
Dark Web Sites.pdf
 
3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise
3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise
3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Crypto Future
Crypto FutureCrypto Future
Crypto Future
 
Crypto Quantum Leap book
Crypto Quantum Leap bookCrypto Quantum Leap book
Crypto Quantum Leap book
 
Godfather 2.0
Godfather 2.0Godfather 2.0
Godfather 2.0
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
 
C 7
C 7C 7
C 7
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Darknet
DarknetDarknet
Darknet
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBro
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
 
I'm All Up in Your Blockchain - Hunting Down the Nazis
I'm All Up in Your Blockchain - Hunting Down the NazisI'm All Up in Your Blockchain - Hunting Down the Nazis
I'm All Up in Your Blockchain - Hunting Down the Nazis
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

A visit to the darknet

  • 1. The Darknet The layer of the internet nobody wants you to see… Presented by: Dan Weis
  • 2. Who’s this guy?  Lead Pentester  Certified Ethical Hacker, Licensed Penetration Tester, 23+ other certs  Trainer/Mentor upcoming Ethical Hackers  Underground Researcher  Been in IT since 1995 in various roles both here and internationally.  5+ years in security providing consulting, 3 years+ as a pentester.  Major Nerd
  • 3. The Internet  6th August 1991 the internet was born (became publicly available)  These days, 2.5 billion people inhabit the internet  Most people think the internet is just this: And occasionally this:
  • 4. Disclaimer  The sites presented here are underground illegal sites  It is not recommended you visit these  Some are monitored by the feds (all are monitored by the CIA  )  Nor do I support any of these sites or activities  They ARE dangerous sites  Seriously…know what you are doing.. Sandboxie, Java disablement, VM’s etc..
  • 5. What is it?  The ‘Darknet’ is the hidden underground of the internet  It’s where Hackers, criminals, organised crime, political activists and whistleblowers operate  Usually only accessible through the Tor anonymizing software  Normally where blackmarket transactions are conducted  Had no search engine of any sort…. Until earlier this year….
  • 6. Grams  Meet Grams, the Darknet’s first Search Engine  It indexes 8 of the Darknet’s markets  Keep’s track of the latest rate for bitcoin currency, and allows you to filter items to display in bitcoins, USD, EUR, GBP  Sorts by relevance, similar indexing to Google  So what can you buy?
  • 7. Demo A visit to the underground……
  • 11. THERE ARE LOTS MORE…
  • 14. Doxbin Pastebin for Personally Identifiable information
  • 15. IT’S NOT ALL BAD…. For whistleblowers
  • 17.
  • 19. You don’t need tor to visit all sites  A lot of sites operate on the standard web  But are located in countries that have laws that are…. lacking…  Yes they are still watched by the Feds  They go up and down often and change url’s frequently  Require you to have anonymous currencies, such as bitcoin and paid a fee just to browse  Is where a lot of the stolen data ends up….
  • 20. Indexeus  Indexeus.org  200 million identities+ and expanding  Indexes user account information acquired from more than 100 recent data breaches  Including Adobe, Yahoo etc  Lists things like email addresses, usernames, passwords, Internet address, physical addresses, birthdays and other information that may be associated with those accounts.
  • 21.
  • 22. Trade in stolen credit cards & dumps
  • 23. Verifiedaccts.com You name it…they sell it….
  • 25.
  • 26. So why are you showing us this? To make you aware that there is more than what you realise….
  • 27. Why... And to ensure you don’t become a victim!  Change your passwords regularly  Use strong passwords  Don’t use the same password for everything!  Use a current browser  Ensure you are using an up-to-date, patched workstation  Ensure you are using an adequate endpoint protection  Stop clicking on things!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
  • 28.
  • 29. If you do this…

Editor's Notes

  1. 2.5 billion: http://www.one.org/us/2013/10/14/this-map-of-the-worlds-internet-usage-may-shock-and-surprise-you/
  2. Meet grams,
  3. Site: http://jv7aqstbyhd5hqki.onion/ (HackBB)