SlideShare a Scribd company logo
DEEP WEB
WHAT TO DO ‘N’ WHAT NOT TO DO
root@topdeepweb:$> cat whoami.txt
[+] AJAY KUMAR [+]
[+] INDEPENDENT SECURITY RESEARCHER [+]
[+] DEEP WEB ENTHUISIAT AND RESEARCHER [+]
[+] YET TO BE AN ENGINEER [+]
[+] Find my research works on 0xmalweb.online [+]
WHAT IS DEEP WEB ?
The deep web or invisible web or hidden
webare parts of the World Wide
Web whose contents are not indexed by
standard search engines for any reason
WONDER WHAT IT IS ?
• Deep web contains 75% of the total world wide web
• Only remaining 25% is Surface web (which includes Facebook ,
Twitter , Google etc)
• The most popular search engine GOOGLE can search only 18% of
the SURFACE WEB
• In the sense , only 18% of the surface web is indexed by google
Levels Of web
SURFACE WEB: The web that the vast majority of internet users are
connected to. Accessible in any nation that does not block internet
access.
E.g: Social media sites like Facebook, informational websites like
Wikipedia, general websites, etc.
BERGIE WEB: The layer of the Surface Web that is blocked in some
nations. Some other information is only accessible through illegal
means.
E.g: Google locked results, recently web crawled old content, pirated
media, pornography etc
Levels Of Web (contd…)
DEEPWEB: Requires special software or proxy to access
(TOR).Contains most of the archived web pages of the 1990s Web
that did not renew their domain names and such.E.g:
Government/Business Research, Hackers, ScriptKiddies, Virus
Information, Illegal and Obscene Content (CP, Gore, Suicides, etc…)
CHARTER WEB: It is like the regular deep web, but harder to get into
and more illegal content.
Advanced covert government research, most of the internet black
market (run on bitcoins), Human/Arms/Drug/Rare Animal Trafficking,
Assassination Networks , illegal game hunting, line of blood locations,
more banned obscene content like CP, Gore, etc.
Levels Of Web (contd…)
• MARIANAS WEB:
Lowest known level of the Deep Web. Named after the Spanish
Technician who created it. It is extremely difficult to access, users say
it is the safest part of the internet due to the privacy.
Julian Assange and other top-level Wikileaks members are believed to
have access.
Do Deep Web Is Really Illegal?
If So what actually the Deep Web contains to call it Illegal
SPAMMERS / SOCIAL ENGINEERERS / DOXERS
SECURE YOURSELF
RED ROOMS / SUICIDAL FORUMS
FBI / GOVERNMENT
TERRORISM
HITMAN / CONTRACT KILLERS
HACKERS
ILLEGAL DRUGS
GOVERNMENT DATA
But Not Everything In Deep Web Is Illegal
Researchers from Terbium Labs claim to have found
evidence that 50% of the deep web contents are legal
50%
13%
11%
9%
4%
3%
3%
2%2%1%1%1%
Deep Web
legal
Drugs
Multiple other categories (illicit)
Site Down
Other illicit activity
Explicit
Fraud
Pharmaceuticals
Hacking & Exploits
Downloadable
Exploitation
Extremisum
What Legal Things Do Deep Web Contains ??
Galaxy 2
Freedom Of Press
Sigaint Mail Services
Forums
Ebooks / Tutorials
History Archives
0 Day Exploits and Data Dumps
Secure Yourself While Accessing Deep Web
• Manual settings For Tor Browser
go for about:config and make sure javascript.enabled and
geo.enabled is set to false
• Disable Javascript using No script addon too
• Disable or Uninstall all addons except HTTPS Everywhere
• Try to change tor circuit and network over a period of time manually
• Donot download any files directly from the Deep Web
• Donot open any links directly from Deep Web in surface web
• Use PGP to chat or mail with someone on Deep Web
• Use unique username for each and every forums you visit
• Don’t use same usernames while using IRC or on surface web
• Avoid using .to and .link (tor2web services)
• Try to use tor in a dedicated system (tail live os )
“Anonymity does not mean criminality”
Privacy Matters In Deep Web , Don’t loose it to morons
QUESTIONS ?
Thank you

More Related Content

What's hot

The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
Abhimanyu Singh
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar
 
Dark web
Dark webDark web
Dark web
Safwan Hashmi
 
Dark wed
Dark wedDark wed
Dark wed
AraVind Pillai
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
Anshu Prateek
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
Khaled Sany
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
albafg55
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
Brian Pichman
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
Case IQ
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
To Mal
 
Deep web
Deep webDeep web
Deep web
ANKIT OJHA
 
Dark web
Dark webDark web
Dark web
aakshidhingra
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
Md. Nazmus Shakib Robin
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
Vaishali Misra
 
PPT dark web
PPT dark webPPT dark web
PPT dark web
jitiyaashwin
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
Ali Shahbazi Khojasteh
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
Kenny Yu
 

What's hot (20)

The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Dark web
Dark webDark web
Dark web
 
Dark wed
Dark wedDark wed
Dark wed
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
 
The dark web
The dark webThe dark web
The dark web
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Deep web
Deep webDeep web
Deep web
 
Dark web
Dark webDark web
Dark web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
PPT dark web
PPT dark webPPT dark web
PPT dark web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 

Viewers also liked

Impossible Is Nothing
Impossible Is NothingImpossible Is Nothing
Impossible Is Nothing
Richard Dedor
 
Impossible is Nothing?
Impossible is Nothing?Impossible is Nothing?
Impossible is Nothing?
Shriram Sivaramakrishnan
 
10 facts about japan
10 facts about japan10 facts about japan
10 facts about japan
AbdAlrahman siyamek
 
Presentation on Medicated Chewing Gums
Presentation on Medicated Chewing GumsPresentation on Medicated Chewing Gums
Presentation on Medicated Chewing Gums
Manoj Kumar Tekuri
 
Dos and Don'ts of an Engineering Statement of Purpose
Dos and Don'ts of an Engineering Statement of PurposeDos and Don'ts of an Engineering Statement of Purpose
Dos and Don'ts of an Engineering Statement of Purpose
SOP Writing
 
Data made out of functions
Data made out of functionsData made out of functions
Data made out of functions
kenbot
 
The Deep Web - How the Deep Web Works
The Deep Web - How the Deep Web WorksThe Deep Web - How the Deep Web Works
The Deep Web - How the Deep Web Works
Omar Samy
 
Deep Web
Deep WebDeep Web
Deep Web
Ahmed Khan
 
Japan - An Emerging Civilization
Japan - An Emerging CivilizationJapan - An Emerging Civilization
Japan - An Emerging Civilization
Eleven
 
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
Nobel Peace Prize 2014: Malala Yousafzai and Kailash SatyarthiNobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthimaditabalnco
 
Sustainable Innovation Day
Sustainable Innovation DaySustainable Innovation Day
Sustainable Innovation Day
Peter Bertels
 
Clean and green hydrocarbons ignite publish
Clean and green hydrocarbons ignite publishClean and green hydrocarbons ignite publish
Clean and green hydrocarbons ignite publish
Krzysztof (Kris) Palka
 
10 Practical Ways to Be More Efficient at Work
10 Practical Ways to Be More Efficient at Work10 Practical Ways to Be More Efficient at Work
10 Practical Ways to Be More Efficient at Work
Weekdone.com
 
iOS Scroll Performance
iOS Scroll PerformanceiOS Scroll Performance
iOS Scroll Performance
Kyle Sherman
 
Testing at Spotify
Testing at SpotifyTesting at Spotify
Testing at Spotify
Andrii Dzynia
 
Stop smoking......
Stop smoking......Stop smoking......
Stop smoking......
Bhanu Vyas
 

Viewers also liked (20)

Impossible Is Nothing
Impossible Is NothingImpossible Is Nothing
Impossible Is Nothing
 
Impossible is Nothing?
Impossible is Nothing?Impossible is Nothing?
Impossible is Nothing?
 
The Journey
The JourneyThe Journey
The Journey
 
10 facts about japan
10 facts about japan10 facts about japan
10 facts about japan
 
Nobel prize
Nobel prizeNobel prize
Nobel prize
 
Presentation on Medicated Chewing Gums
Presentation on Medicated Chewing GumsPresentation on Medicated Chewing Gums
Presentation on Medicated Chewing Gums
 
Dos and Don'ts of an Engineering Statement of Purpose
Dos and Don'ts of an Engineering Statement of PurposeDos and Don'ts of an Engineering Statement of Purpose
Dos and Don'ts of an Engineering Statement of Purpose
 
Data made out of functions
Data made out of functionsData made out of functions
Data made out of functions
 
The Deep Web - How the Deep Web Works
The Deep Web - How the Deep Web WorksThe Deep Web - How the Deep Web Works
The Deep Web - How the Deep Web Works
 
Human Body
Human BodyHuman Body
Human Body
 
Bubble gum
Bubble gumBubble gum
Bubble gum
 
Deep Web
Deep WebDeep Web
Deep Web
 
Japan - An Emerging Civilization
Japan - An Emerging CivilizationJapan - An Emerging Civilization
Japan - An Emerging Civilization
 
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
Nobel Peace Prize 2014: Malala Yousafzai and Kailash SatyarthiNobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
 
Sustainable Innovation Day
Sustainable Innovation DaySustainable Innovation Day
Sustainable Innovation Day
 
Clean and green hydrocarbons ignite publish
Clean and green hydrocarbons ignite publishClean and green hydrocarbons ignite publish
Clean and green hydrocarbons ignite publish
 
10 Practical Ways to Be More Efficient at Work
10 Practical Ways to Be More Efficient at Work10 Practical Ways to Be More Efficient at Work
10 Practical Ways to Be More Efficient at Work
 
iOS Scroll Performance
iOS Scroll PerformanceiOS Scroll Performance
iOS Scroll Performance
 
Testing at Spotify
Testing at SpotifyTesting at Spotify
Testing at Spotify
 
Stop smoking......
Stop smoking......Stop smoking......
Stop smoking......
 

Similar to Deep Web - what to do and what not to do

Deep web
Deep webDeep web
Deep web
GauravPandey319
 
The Deep Web.pptx
The Deep Web.pptxThe Deep Web.pptx
The Deep Web.pptx
ssuser2f3bcd
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
Stephen Abram
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh
 
Deep Web
Deep WebDeep Web
Deep Web
AbishaiDas
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
Muhammad Azeem Mazhar
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
Melody Chiaoco
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
Jspider - Noida
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
Seth Porter, MA, MLIS
 
[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide
OWASP EEE
 
Deep web
Deep webDeep web
Dark Web
Dark WebDark Web
Dark Web
KunalDas889957
 
Overview of Deep web
Overview of Deep webOverview of Deep web
Overview of Deep web
Shubhankar Dutta
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
Nitish Joshi
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
Jack Maynard
 
Deep and Dark web
Deep and Dark webDeep and Dark web
Deep and Dark web
Nihal Ahmed
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
eliofatjon
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
The Deep Web
The Deep WebThe Deep Web
The Deep Webmartinp
 

Similar to Deep Web - what to do and what not to do (20)

Deep web
Deep webDeep web
Deep web
 
The Deep Web.pptx
The Deep Web.pptxThe Deep Web.pptx
The Deep Web.pptx
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Deep Web
Deep WebDeep Web
Deep Web
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide
 
Deep web
Deep webDeep web
Deep web
 
Dark Web
Dark WebDark Web
Dark Web
 
Overview of Deep web
Overview of Deep webOverview of Deep web
Overview of Deep web
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Deep and Dark web
Deep and Dark webDeep and Dark web
Deep and Dark web
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 

More from Cysinfo Cyber Security Community

Understanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K AUnderstanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K A
Cysinfo Cyber Security Community
 
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram KharviUnderstanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Cysinfo Cyber Security Community
 
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TKGetting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Cysinfo Cyber Security Community
 
Emerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar PrustyEmerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar Prusty
Cysinfo Cyber Security Community
 
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
A look into the sanitizer family (ASAN & UBSAN) by Akul PillaiA look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
Cysinfo Cyber Security Community
 
Closer look at PHP Unserialization by Ashwin Shenoi
Closer look at PHP Unserialization by Ashwin ShenoiCloser look at PHP Unserialization by Ashwin Shenoi
Closer look at PHP Unserialization by Ashwin Shenoi
Cysinfo Cyber Security Community
 
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
Unicorn: The Ultimate CPU Emulator by Akshay AjayanUnicorn: The Ultimate CPU Emulator by Akshay Ajayan
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
Cysinfo Cyber Security Community
 
The Art of Executing JavaScript by Akhil Mahendra
The Art of Executing JavaScript by Akhil MahendraThe Art of Executing JavaScript by Akhil Mahendra
The Art of Executing JavaScript by Akhil Mahendra
Cysinfo Cyber Security Community
 
Reversing and Decrypting Malware Communications by Monnappa
Reversing and Decrypting Malware Communications by MonnappaReversing and Decrypting Malware Communications by Monnappa
Reversing and Decrypting Malware Communications by Monnappa
Cysinfo Cyber Security Community
 
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by SreelakshmiDeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
Cysinfo Cyber Security Community
 
Analysis of android apk using adhrit by Abhishek J.M
 Analysis of android apk using adhrit by Abhishek J.M Analysis of android apk using adhrit by Abhishek J.M
Analysis of android apk using adhrit by Abhishek J.M
Cysinfo Cyber Security Community
 
Understanding evasive hollow process injection techniques monnappa k a
Understanding evasive hollow process injection techniques   	monnappa k aUnderstanding evasive hollow process injection techniques   	monnappa k a
Understanding evasive hollow process injection techniques monnappa k a
Cysinfo Cyber Security Community
 
Security challenges in d2d communication by ajithkumar vyasarao
Security challenges in d2d communication  by ajithkumar vyasaraoSecurity challenges in d2d communication  by ajithkumar vyasarao
Security challenges in d2d communication by ajithkumar vyasarao
Cysinfo Cyber Security Community
 
S2 e (selective symbolic execution) -shivkrishna a
S2 e (selective symbolic execution) -shivkrishna aS2 e (selective symbolic execution) -shivkrishna a
S2 e (selective symbolic execution) -shivkrishna a
Cysinfo Cyber Security Community
 
Dynamic binary analysis using angr siddharth muralee
Dynamic binary analysis using angr   siddharth muraleeDynamic binary analysis using angr   siddharth muralee
Dynamic binary analysis using angr siddharth muralee
Cysinfo Cyber Security Community
 
Bit flipping attack on aes cbc - ashutosh ahelleya
Bit flipping attack on aes cbc -	ashutosh ahelleyaBit flipping attack on aes cbc -	ashutosh ahelleya
Bit flipping attack on aes cbc - ashutosh ahelleya
Cysinfo Cyber Security Community
 
Security Analytics using ELK stack
Security Analytics using ELK stack	Security Analytics using ELK stack
Security Analytics using ELK stack
Cysinfo Cyber Security Community
 
Linux Malware Analysis
Linux Malware Analysis	Linux Malware Analysis
Linux Malware Analysis
Cysinfo Cyber Security Community
 
Introduction to Binary Exploitation
Introduction to Binary Exploitation	Introduction to Binary Exploitation
Introduction to Binary Exploitation
Cysinfo Cyber Security Community
 
ATM Malware: Understanding the threat
ATM Malware: Understanding the threat	ATM Malware: Understanding the threat
ATM Malware: Understanding the threat
Cysinfo Cyber Security Community
 

More from Cysinfo Cyber Security Community (20)

Understanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K AUnderstanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K A
 
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram KharviUnderstanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
 
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TKGetting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
 
Emerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar PrustyEmerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar Prusty
 
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
A look into the sanitizer family (ASAN & UBSAN) by Akul PillaiA look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
 
Closer look at PHP Unserialization by Ashwin Shenoi
Closer look at PHP Unserialization by Ashwin ShenoiCloser look at PHP Unserialization by Ashwin Shenoi
Closer look at PHP Unserialization by Ashwin Shenoi
 
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
Unicorn: The Ultimate CPU Emulator by Akshay AjayanUnicorn: The Ultimate CPU Emulator by Akshay Ajayan
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
 
The Art of Executing JavaScript by Akhil Mahendra
The Art of Executing JavaScript by Akhil MahendraThe Art of Executing JavaScript by Akhil Mahendra
The Art of Executing JavaScript by Akhil Mahendra
 
Reversing and Decrypting Malware Communications by Monnappa
Reversing and Decrypting Malware Communications by MonnappaReversing and Decrypting Malware Communications by Monnappa
Reversing and Decrypting Malware Communications by Monnappa
 
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by SreelakshmiDeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
 
Analysis of android apk using adhrit by Abhishek J.M
 Analysis of android apk using adhrit by Abhishek J.M Analysis of android apk using adhrit by Abhishek J.M
Analysis of android apk using adhrit by Abhishek J.M
 
Understanding evasive hollow process injection techniques monnappa k a
Understanding evasive hollow process injection techniques   	monnappa k aUnderstanding evasive hollow process injection techniques   	monnappa k a
Understanding evasive hollow process injection techniques monnappa k a
 
Security challenges in d2d communication by ajithkumar vyasarao
Security challenges in d2d communication  by ajithkumar vyasaraoSecurity challenges in d2d communication  by ajithkumar vyasarao
Security challenges in d2d communication by ajithkumar vyasarao
 
S2 e (selective symbolic execution) -shivkrishna a
S2 e (selective symbolic execution) -shivkrishna aS2 e (selective symbolic execution) -shivkrishna a
S2 e (selective symbolic execution) -shivkrishna a
 
Dynamic binary analysis using angr siddharth muralee
Dynamic binary analysis using angr   siddharth muraleeDynamic binary analysis using angr   siddharth muralee
Dynamic binary analysis using angr siddharth muralee
 
Bit flipping attack on aes cbc - ashutosh ahelleya
Bit flipping attack on aes cbc -	ashutosh ahelleyaBit flipping attack on aes cbc -	ashutosh ahelleya
Bit flipping attack on aes cbc - ashutosh ahelleya
 
Security Analytics using ELK stack
Security Analytics using ELK stack	Security Analytics using ELK stack
Security Analytics using ELK stack
 
Linux Malware Analysis
Linux Malware Analysis	Linux Malware Analysis
Linux Malware Analysis
 
Introduction to Binary Exploitation
Introduction to Binary Exploitation	Introduction to Binary Exploitation
Introduction to Binary Exploitation
 
ATM Malware: Understanding the threat
ATM Malware: Understanding the threat	ATM Malware: Understanding the threat
ATM Malware: Understanding the threat
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Deep Web - what to do and what not to do

  • 1. DEEP WEB WHAT TO DO ‘N’ WHAT NOT TO DO
  • 2. root@topdeepweb:$> cat whoami.txt [+] AJAY KUMAR [+] [+] INDEPENDENT SECURITY RESEARCHER [+] [+] DEEP WEB ENTHUISIAT AND RESEARCHER [+] [+] YET TO BE AN ENGINEER [+] [+] Find my research works on 0xmalweb.online [+]
  • 3. WHAT IS DEEP WEB ?
  • 4. The deep web or invisible web or hidden webare parts of the World Wide Web whose contents are not indexed by standard search engines for any reason
  • 5. WONDER WHAT IT IS ? • Deep web contains 75% of the total world wide web • Only remaining 25% is Surface web (which includes Facebook , Twitter , Google etc) • The most popular search engine GOOGLE can search only 18% of the SURFACE WEB • In the sense , only 18% of the surface web is indexed by google
  • 6. Levels Of web SURFACE WEB: The web that the vast majority of internet users are connected to. Accessible in any nation that does not block internet access. E.g: Social media sites like Facebook, informational websites like Wikipedia, general websites, etc. BERGIE WEB: The layer of the Surface Web that is blocked in some nations. Some other information is only accessible through illegal means. E.g: Google locked results, recently web crawled old content, pirated media, pornography etc
  • 7. Levels Of Web (contd…) DEEPWEB: Requires special software or proxy to access (TOR).Contains most of the archived web pages of the 1990s Web that did not renew their domain names and such.E.g: Government/Business Research, Hackers, ScriptKiddies, Virus Information, Illegal and Obscene Content (CP, Gore, Suicides, etc…) CHARTER WEB: It is like the regular deep web, but harder to get into and more illegal content. Advanced covert government research, most of the internet black market (run on bitcoins), Human/Arms/Drug/Rare Animal Trafficking, Assassination Networks , illegal game hunting, line of blood locations, more banned obscene content like CP, Gore, etc.
  • 8. Levels Of Web (contd…) • MARIANAS WEB: Lowest known level of the Deep Web. Named after the Spanish Technician who created it. It is extremely difficult to access, users say it is the safest part of the internet due to the privacy. Julian Assange and other top-level Wikileaks members are believed to have access.
  • 9. Do Deep Web Is Really Illegal? If So what actually the Deep Web contains to call it Illegal
  • 10. SPAMMERS / SOCIAL ENGINEERERS / DOXERS
  • 11. SECURE YOURSELF RED ROOMS / SUICIDAL FORUMS
  • 14. HITMAN / CONTRACT KILLERS
  • 15.
  • 19. But Not Everything In Deep Web Is Illegal
  • 20. Researchers from Terbium Labs claim to have found evidence that 50% of the deep web contents are legal
  • 21. 50% 13% 11% 9% 4% 3% 3% 2%2%1%1%1% Deep Web legal Drugs Multiple other categories (illicit) Site Down Other illicit activity Explicit Fraud Pharmaceuticals Hacking & Exploits Downloadable Exploitation Extremisum
  • 22. What Legal Things Do Deep Web Contains ??
  • 29. 0 Day Exploits and Data Dumps
  • 30. Secure Yourself While Accessing Deep Web
  • 31. • Manual settings For Tor Browser go for about:config and make sure javascript.enabled and geo.enabled is set to false
  • 32. • Disable Javascript using No script addon too • Disable or Uninstall all addons except HTTPS Everywhere • Try to change tor circuit and network over a period of time manually • Donot download any files directly from the Deep Web • Donot open any links directly from Deep Web in surface web • Use PGP to chat or mail with someone on Deep Web • Use unique username for each and every forums you visit • Don’t use same usernames while using IRC or on surface web • Avoid using .to and .link (tor2web services) • Try to use tor in a dedicated system (tail live os )
  • 33. “Anonymity does not mean criminality” Privacy Matters In Deep Web , Don’t loose it to morons