SlideShare a Scribd company logo
1 of 20
DARK WEB
P R E S E N T E D B Y :
U S M A N S H A B B I R
1 7 5 8 1 5 5 6 - 1 1 1
P R E S E N T E D T O :
S I R I K R A M - U L - H A Q
CONTEXT
 What is Dark Web ?
 History
 How big is the Dark Web?
 Tor web.
 Web sites.
 Tor Browser
 What can be seen in the Dark Web ?
 Positive aspects of Dark Web
 Users
 Domain handling
WHAT IS DARK WEB ?
The dark web, also known as the deep
web, makes up a large portion of the
internet. The dark web contains
information not searchable by traditional
search engines such as Google because
the websites contained in the dark web
are not indexed and are therefore not
easily traceable.
HISTORY
HOW BIG IS THE DARK WEB?
TOR WEB
 Free domain at dark
web.
 Local hosting.
 No one can block your
website.
 Sponsored by Google ,
USA etc.
 .onion for tor websites
WEB SITES
 The same site of surface web you can
access with dark web but some differences
are there.
 In surface web you can access Facebook
with www.facebook.com
 But in Dark web you have to use this
address facebookcorewwwi.onion for
accessing Facebook.
 Special protocols used to access same
Facebook with different address.
 Dangerous(Risk to lose important data like
user name & password etc.).
TOR BROWSER
Onion/Tor Browser
 The Onion Router (Tor) is an open-source software program that allows users to protect their privacy
and security against a common form of Internet surveillance known as traffic analysis. Tor was
originally developed for the U.S. Navy in an effort to protect government communications
 Onion routing is a method developed where the transparency of what is getting transferred was removed
and messages and communication was done in a encrypted form.
Why Do we Need Anonymity?
 To hide user identity from the website we visit
 To hide our Internet usage from hacker
 To hide browsing pattern from ISP’s
 To hide data packets even if they get captured.
EXAMPLE
WHAT CAN BE SEEN IN THE DARK WEB ?
Since the content found in the dark web is anonymous and not easily traced,
most of the websites offer illegal services.
These include,
• Drugs dealing
• Online black market
• Human experiments
• illegal purchase of firearms
CONT..
 Breaking the law
 Suspicious links
 Law enforcement
 Hacking groups and services
 Fraud services
 Terrorism
POSITIVE ASPECTS OF DARK WEB
 Blind amount of information
 Powerful
 Secure
 Free of surveillance
 You can get anything
USERS OF DARK WEB
 High profile government officials
 Corporate officials
 Military
 Journalists
 Politicians
 Hackers
 Criminals
DOMAIN HANDLING
D O W N L O A D T O R I N S T A L L T O R
CONT..
J U S T C L I C K C O N N E C T
I N S T A L L X A M P P F O R H O S T I N G
S I T E P L A C E Y O U R S I T E I N
X A M P P .
CONT..
 Follow this path
 This pc > C >Tor > Tor
browser > Data > Tor.
 Open torrc file.
CONT..
 Just add some new lines
of coding
 Save and close.
CODE
1. #Hidden Service
2. HiddenServiceDir C:usersNametor_service
3. HiddenServicePort 80 127.0.0.1:80
 ‘C:usersNametor_service’ this is path where your new domain address is saved after restarting
tor browser
 ‘C:usersNametor_service’ Go to this path and open a file named as hostname.
 Domain name is saved.
 Anyone can access your site
CONT..
I M M D Q K N H X B B A 2 P N 6 . O N I O N C H E C K I N G
Understanding the Dark Web

More Related Content

What's hot

The dark web
The dark webThe dark web
The dark webBella M
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesLearningwithRayYT
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark webJisc
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Bich (Evelyn) Chu
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep webKhaled Sany
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTIONumme ayesha
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth YuKenny Yu
 

What's hot (20)

The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The dark web
The dark webThe dark web
The dark web
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Ethical Hacking Tools
Ethical Hacking ToolsEthical Hacking Tools
Ethical Hacking Tools
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
 
Darkweb
DarkwebDarkweb
Darkweb
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 
Deep web
Deep webDeep web
Deep web
 
Dark wed
Dark wedDark wed
Dark wed
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 

Similar to Understanding the Dark Web

Secrets of the Dark Web and How to Access it Safely.pdf
Secrets of the Dark Web and How to Access it Safely.pdfSecrets of the Dark Web and How to Access it Safely.pdf
Secrets of the Dark Web and How to Access it Safely.pdfAdityaChawan4
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Web or Dark Web (Aryan Singh)
Web or Dark Web (Aryan Singh)Web or Dark Web (Aryan Singh)
Web or Dark Web (Aryan Singh)KNIPSS
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxhelzerpatrina
 
Osint - Dark side of Internet
Osint - Dark side of InternetOsint - Dark side of Internet
Osint - Dark side of InternetRaghav Bisht
 
Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxJamalAmzil6
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep WebIRJET Journal
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) WebJeroen Baert
 

Similar to Understanding the Dark Web (20)

Secrets of the Dark Web and How to Access it Safely.pdf
Secrets of the Dark Web and How to Access it Safely.pdfSecrets of the Dark Web and How to Access it Safely.pdf
Secrets of the Dark Web and How to Access it Safely.pdf
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Darknet
DarknetDarknet
Darknet
 
Web or Dark Web (Aryan Singh)
Web or Dark Web (Aryan Singh)Web or Dark Web (Aryan Singh)
Web or Dark Web (Aryan Singh)
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Osint - Dark side of Internet
Osint - Dark side of InternetOsint - Dark side of Internet
Osint - Dark side of Internet
 
Deep web
Deep webDeep web
Deep web
 
Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptx
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Deep Web
Deep WebDeep Web
Deep Web
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Dark web (2)
Dark web (2)Dark web (2)
Dark web (2)
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
.Onion
.Onion.Onion
.Onion
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
Dark net
Dark netDark net
Dark net
 

More from university of Gujrat, pakistan

More from university of Gujrat, pakistan (20)

Change management
Change management Change management
Change management
 
Latest Trends in Digital Marketing
Latest Trends in Digital MarketingLatest Trends in Digital Marketing
Latest Trends in Digital Marketing
 
Code of ethics and professional conduct (1)
Code of ethics and professional conduct (1)Code of ethics and professional conduct (1)
Code of ethics and professional conduct (1)
 
Certification accreditation and licensure (1)
Certification accreditation and licensure (1)Certification accreditation and licensure (1)
Certification accreditation and licensure (1)
 
biggest technology trends
biggest technology trendsbiggest technology trends
biggest technology trends
 
Freedom of information (1)
Freedom of information (1)Freedom of information (1)
Freedom of information (1)
 
Individual cognition ppt (1)
Individual cognition ppt (1)Individual cognition ppt (1)
Individual cognition ppt (1)
 
Top 10 highest (1)
Top 10 highest (1)Top 10 highest (1)
Top 10 highest (1)
 
creativity and imagination
creativity and imagination creativity and imagination
creativity and imagination
 
Brainstorming 078 (1)
Brainstorming 078 (1)Brainstorming 078 (1)
Brainstorming 078 (1)
 
speeh-artificial intelligemce
speeh-artificial intelligemce speeh-artificial intelligemce
speeh-artificial intelligemce
 
Pp dealing with problem complexity (1)
Pp dealing with problem complexity (1)Pp dealing with problem complexity (1)
Pp dealing with problem complexity (1)
 
Motivation
MotivationMotivation
Motivation
 
Vision of artificial intelligence (1)
Vision of artificial intelligence (1)Vision of artificial intelligence (1)
Vision of artificial intelligence (1)
 
Entrepreneurship (1)
Entrepreneurship (1)Entrepreneurship (1)
Entrepreneurship (1)
 
Role of professional societies
Role of professional societiesRole of professional societies
Role of professional societies
 
Dealing with culticultural environment (1)
Dealing with culticultural environment (1)Dealing with culticultural environment (1)
Dealing with culticultural environment (1)
 
Dealing with problem complexity (1)
Dealing with problem complexity (1)Dealing with problem complexity (1)
Dealing with problem complexity (1)
 
cyber security and cyber crime
cyber security and cyber crime cyber security and cyber crime
cyber security and cyber crime
 
Resume writing and interview techniques (1)
Resume writing and interview techniques (1)Resume writing and interview techniques (1)
Resume writing and interview techniques (1)
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Understanding the Dark Web

  • 1. DARK WEB P R E S E N T E D B Y : U S M A N S H A B B I R 1 7 5 8 1 5 5 6 - 1 1 1 P R E S E N T E D T O : S I R I K R A M - U L - H A Q
  • 2. CONTEXT  What is Dark Web ?  History  How big is the Dark Web?  Tor web.  Web sites.  Tor Browser  What can be seen in the Dark Web ?  Positive aspects of Dark Web  Users  Domain handling
  • 3. WHAT IS DARK WEB ? The dark web, also known as the deep web, makes up a large portion of the internet. The dark web contains information not searchable by traditional search engines such as Google because the websites contained in the dark web are not indexed and are therefore not easily traceable.
  • 5. HOW BIG IS THE DARK WEB?
  • 6. TOR WEB  Free domain at dark web.  Local hosting.  No one can block your website.  Sponsored by Google , USA etc.  .onion for tor websites
  • 7. WEB SITES  The same site of surface web you can access with dark web but some differences are there.  In surface web you can access Facebook with www.facebook.com  But in Dark web you have to use this address facebookcorewwwi.onion for accessing Facebook.  Special protocols used to access same Facebook with different address.  Dangerous(Risk to lose important data like user name & password etc.).
  • 8. TOR BROWSER Onion/Tor Browser  The Onion Router (Tor) is an open-source software program that allows users to protect their privacy and security against a common form of Internet surveillance known as traffic analysis. Tor was originally developed for the U.S. Navy in an effort to protect government communications  Onion routing is a method developed where the transparency of what is getting transferred was removed and messages and communication was done in a encrypted form. Why Do we Need Anonymity?  To hide user identity from the website we visit  To hide our Internet usage from hacker  To hide browsing pattern from ISP’s  To hide data packets even if they get captured.
  • 10. WHAT CAN BE SEEN IN THE DARK WEB ? Since the content found in the dark web is anonymous and not easily traced, most of the websites offer illegal services. These include, • Drugs dealing • Online black market • Human experiments • illegal purchase of firearms
  • 11. CONT..  Breaking the law  Suspicious links  Law enforcement  Hacking groups and services  Fraud services  Terrorism
  • 12. POSITIVE ASPECTS OF DARK WEB  Blind amount of information  Powerful  Secure  Free of surveillance  You can get anything
  • 13. USERS OF DARK WEB  High profile government officials  Corporate officials  Military  Journalists  Politicians  Hackers  Criminals
  • 14. DOMAIN HANDLING D O W N L O A D T O R I N S T A L L T O R
  • 15. CONT.. J U S T C L I C K C O N N E C T I N S T A L L X A M P P F O R H O S T I N G S I T E P L A C E Y O U R S I T E I N X A M P P .
  • 16. CONT..  Follow this path  This pc > C >Tor > Tor browser > Data > Tor.  Open torrc file.
  • 17. CONT..  Just add some new lines of coding  Save and close.
  • 18. CODE 1. #Hidden Service 2. HiddenServiceDir C:usersNametor_service 3. HiddenServicePort 80 127.0.0.1:80  ‘C:usersNametor_service’ this is path where your new domain address is saved after restarting tor browser  ‘C:usersNametor_service’ Go to this path and open a file named as hostname.  Domain name is saved.  Anyone can access your site
  • 19. CONT.. I M M D Q K N H X B B A 2 P N 6 . O N I O N C H E C K I N G