SlideShare a Scribd company logo
1 of 36
The Deep Web
Presented by: Dr. Shawn P. Murray, C|CISO, CISSP, CRISC, FITSP-A
For ISSA 7th Annual Cyber Security & Technology Days – Fort Carson on 28 October 2015
The Surface Web is that part of the Internet that has been categorized
and indexed by the most popular search engines and web crawlers.
(Google, Yahoo, Bing, Ask etc…)
The Deep Web is that part of the Internet (estimated at 90 - 96%) that is
not indexed or categorized. This means you need a specific way to rout
to get access to the content that resides here.
• Content here can belong to corporations or private users that do not
subscribe to any type of internet services.
• Most often times, the content here is obfuscated so that you need a
specific access mechanism and authentication procedure as well as
a special type of onion browser to get access.
The Dark Net is sometimes confused with the Deep Web but it is not
the same.
• “A darknet (or dark net) is an overlay network that can only be
accessed with specific software, configurations, or authorization,
often using non-standard communications protocols and ports.”
• “Two typical darknet types are friend-to-friend networks (usually
used for file sharing with a peer-to-peer connection) and anonymity
networks such as Tor via an anonymized series of connections.”
• “Originally coined in the 1970s to designate networks which were
isolated from ARPANET (which evolved into the Internet) for security
purposes, darknets were able to receive data from ARPANET but
had addresses which did not appear in the network lists and would
not answer pings or other inquiries.”
https://en.wikipedia.org/wiki/Darknet
You access the Deep Web using the ToR Browser. ToR is an acronym for “The
Onion Router”, a free and open source web browsing application that allows
you to relay your internet web browser connection anonymously over many
(around 20) different connections through a forward relay.
• Each Relay only has the IP address of the receiving connection and the
forwarding connection. The end point of the established relay connection is
where the user “appears” to be.
• The ToR Browser is configured to prevent active web content from loading
(Java, Adobe, etc…)
“After the NSA spying scandal, concerns have been growing over internet
privacy. This has led people to flock to TOR for its ability to let users browse the
web in true anonymity.”
• http://www.news.com.au/technology/online/what-is-the-deep-web-and-anonymous-browser-tor/story-fnjwnfzw-1226844901718
Deep Web at "Android"
You can enter the Deep Web using a mobile phone or tablet
with Android operating system to access unknown web pages
in a hidden world.
• Two applications that will help to gain access to these
pages.
o Orbot is a free software project to provide anonymity on the
Internet from a Google Android smartphone. It acts as an
instance of the Tor network on such mobile devices and allows
traffic routing from a device's web browser, e-mail client, map
program, etc., through the Tor network, providing anonymity for
the user.
o This tool is being used to keep communications on
smartphones secure from the governments that may be
monitoring their communications, e.g. by political dissidents
around the world.
• You can download the free Google Play Store at no charge
as they were released for a good cause, which is to allow
anonymous surfing from our mobile devices without any
cost, good sling the editors no ?
Deep Web Advertising
OnionDir - Deep Web Link Directory
dirnxxdraygbifgc.onion - Your copy and paste friendly .onion link list. Feel free to copy this list to forums, pastebins etc so people can find hidden service links that actually
work!
You can add new links here, please check if the site is up before you add it, i will delete not working sites on a regular basis.
Categories:
Hidden Service lists and search engines
• http://3g2upl4pq6kufc4m.onion/ - DuckDuckGo Search Engine
• http://xmh57jrzrnw6insl.onion/ - TORCH - Tor Search Engine
• http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page - Uncensored Hidden Wiki
• http://32rfckwuorlf4dlv.onion/ - Onion URL Repository
• http://e266al32vpuorbyg.onion/bookmarks.php - Dark Nexus
• http://5plvrsgydwy2sgce.onion/ - Seeks Search
• http://2vlqpcqpjlhmd5r2.onion/ - Gateway to Freenet
• http://nlmymchrmnlmbnii.onion/ - Is It Up?
• http://kpynyvym6xqi7wz2.onion/links.html - ParaZite
• http://wiki5kauuihowqi5.onion/ - Onion Wiki
• http://torwikignoueupfm.onion/index.php?title=Main_Page - Tor Wiki
• http://kpvz7ki2v5agwt35.onion - The Hidden Wiki
• http://idnxcnkne4qt76tg.onion/ - Tor Project: Anonymity Online
• http://torlinkbgs6aabns.onion/ - TorLinks
• http://jh32yv5zgayyyts3.onion/ - Hidden Wiki .Onion Urls
• http://wikitjerrta4qgz4.onion/ - Hidden Wiki - Tor Wiki
• http://xdagknwjc7aaytzh.onion/ - Anonet Webproxy
• http://3fyb44wdhnd2ghhl.onion/wiki/index.php?title=Main_Page - All You're Wiki - clone of the clean hidden wiki that went down with freedom hosting
• http://3fyb44wdhnd2ghhl.onion/ - All You're Base
• http://j6im4v42ur6dpic3.onion/ - TorProject Archive
• http://p3igkncehackjtib.onion/ - TorProject Media
• http://kbhpodhnfxl3clb4.onion - Tor Search
• http://cipollatnumrrahd.onion/ - Cipolla 2.0 (Italian)
• http://dppmfxaacucguzpc.onion/ - TorDir - One of the oldest link lists on Tor
OnionDir - Deep Web Link Directory
dirnxxdraygbifgc.onion - Your copy and paste friendly .onion link list. Feel free to copy this list to forums, pastebins etc
so people can find hidden service links that actually work!
You can add new links here, please check if the site is up before you add it, i will delete not working sites on a regular
basis.
Categories:
Marketplace Financial
• http://torbrokerge7zxgq.onion/ - TorBroker - Trade securities anonymously with bitcoin, currently supports nearly
1000 stocks and ETFs
• http://fogcore5n3ov3tui.onion/ - Bitcoin Fog - Bitcoin Laundry
• http://2vx63nyktk4kxbxb.onion/ - AUTOMATED PAYPAL AND CREDIT CARD STORE
• http://samsgdtwz6hvjyu4.onion - Safe, Anonymous, Fast, Easy escrow service.
• http://easycoinsayj7p5l.onion/ - EasyCoin - Bitcoin Wallet with free Bitcoin Mixer
• http://jzn5w5pac26sqef4.onion/ - WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal
and more
• http://ow24et3tetp6tvmk.onion/ - OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry
• http://qc7ilonwpv77qibm.onion/ - Western Union Exploit
• http://3dbr5t4pygahedms.onion/ - ccPal Store
• http://y3fpieiezy2sin4a.onion/ - HQER - High Quality Euro Replicas
• http://qkj4drtgvpm7eecl.onion/ - Counterfeit USD
• http://nr6juudpp4as4gjg.onion/pptobtc.html - PayPal to BitCoins
• http://nr6juudpp4as4gjg.onion/doublecoins.html - Double Your BitCoins
• http://lw4ipk5choakk5ze.onion/raw/4588/ - High Quality Tutorials
OnionDir - Deep Web Link Directory
dirnxxdraygbifgc.onion - Your copy and paste friendly .onion link list. Feel free to copy this list to forums, pastebins etc so people can find hidden service links that actually
work!
You can add new links here, please check if the site is up before you add it, i will delete not working sites on a regular basis.
Categories:
• Marketplace Commercial Services
• http://6w6vcynl6dumn67c.onion/ - Tor Market Board - Anonymous Marketplace Forums
• http://wvk32thojln4gpp4.onion/ - Project Evil
• http://5mvm7cg6bgklfjtp.onion/ - Discounted electronics goods
• http://lw4ipk5choakk5ze.onion/raw/evbLewgkDSVkifzv8zAo/ - Unfriendlysolution - Legit hitman service
• http://nr6juudpp4as4gjg.onion/torgirls.html - Tor Girls
• http://tuu66yxvrnn3of7l.onion/ - UK Guns and Ammo
• http://nr6juudpp4as4gjg.onion/torguns.htm - Used Tor Guns
• http://ucx7bkbi2dtia36r.onion/ - Amazon Business
• http://nr6juudpp4as4gjg.onion/tor.html - Tor Technology
• http://hbetshipq5yhhrsd.onion/ - Hidden BetCoin
• http://cstoreav7i44h2lr.onion/ - CStore Carded Store
• http://tfwdi3izigxllure.onion/ - Apples 4 Bitcoin
• http://e2qizoerj4d6ldif.onion/ - Carded Store
• http://jvrnuue4bvbftiby.onion/ - Data-Bay
• http://bgkitnugq5ef2cpi.onion/ - Hackintosh
• http://vlp4uw5ui22ljlg7.onion/ - EuroArms
• http://b4vqxw2j36wf2bqa.onion/ - Advantage Products
• http://ybp4oezfhk24hxmb.onion/ - Hitman Network
• http://mts7hqqqeogujc5e.onion/ - Marianic Technology Services
• http://mobil7rab6nuf7vx.onion/ - Mobile Store
OnionDir - Deep Web Link Directory
dirnxxdraygbifgc.onion - Your copy and paste friendly .onion link list. Feel free to copy this list to forums, pastebins etc so people can find hidden service links that actually
work!
You can add new links here, please check if the site is up before you add it, i will delete not working sites on a regular basis.
Categories:
• Marketplace Commercial Services
• http://54flq67kqr5wvjqf.onion/ - MSR Shop
• http://yth5q7zdmqlycbcz.onion/ - Old Man Fixer's Fixing Services
• http://matrixtxri745dfw.onion/neo/uploads/MATRIXtxri745dfwONION_130827231336IPA_pc.png - PC Shop
• http://storegsq3o5mfxiz.onion/ - Samsung StorE
• http://sheep5u64fi457aw.onion/ - Sheep Marketplace
• http://nr6juudpp4as4gjg.onion/betcoin.htm - Tor BetCoin
• http://qizriixqwmeq4p5b.onion/ - Tor Web Developer
• http://vfqnd6mieccqyiit.onion/ - UK Passports
• http://en35tuzqmn4lofbk.onion/ - US Fake ID Store
• http://xfnwyig7olypdq5r.onion/ - USA Citizenship
• http://uybu3melulmoljnd.onion/ - iLike Help Guy
• http://dbmv53j45pcv534x.onion/ - Network Consulting and Software Development
• http://lw4ipk5choakk5ze.onion/raw/4585/ - Quick Solution (Hitman)
• http://nr6juudpp4as4gjg.onion/tynermsr.htm - Tyner MSR Store
OnionDir - Deep Web Link Directory
dirnxxdraygbifgc.onion - Your copy and paste friendly .onion link list. Feel free to copy this list to forums, pastebins etc so people can find hidden service links that actually
work!
You can add new links here, please check if the site is up before you add it, i will delete not working sites on a regular basis.
Categories:
Marketplace Drugs
• http://rso4hutlefirefqp.onion/ - EuCanna - Medical Grade Cannabis Buds, Rick Simpson Oil, Ointments and Creams
• http://newpdsuslmzqazvr.onion/ - Peoples Drug Store - The Darkweb's Best Online Drug Supplier!
• http://smoker32pk4qt3mx.onion/ - Smokeables - Finest Organic Cannabis shipped from the USA
• http://fzqnrlcvhkgbdwx5.onion/ - CannabisUK - UK Wholesale Cannabis Supplier
• http://kbvbh4kdddiha2ht.onion/ - DeDope - German Weed and Hash shop. (Bitcoin)
• http://s5q54hfww56ov2xc.onion/ - BitPharma - EU vendor for cocaine, speed, mdma, psychedelics and subscriptions
• http://ll6lardicrvrljvq.onion/ - Brainmagic - Best psychedelics on the darknet
• http://25ffhnaechrbzwf3.onion/ - NLGrowers - Coffee Shop grade Cannabis from the netherlands
• http://fec33nz6mhzd54zj.onion/index.php - Black Market Reloaded Forums
• http://atlmlxbk2mbupwgr.onion/ - Atlantis Marketplace Forums
• http://atlantisrky4es5q.onion/ - Atlantis Marketplace
• http://dkn255hz262ypmii.onion/ - Silk Road Forums
• http://4yjes6zfucnh7vcj.onion/ - Drug Market
• http://k4btcoezc5tlxyaf.onion/ - Kamagra for BitCoins
• http://silkroadvb5piz3r.onion/silkroad/home - Silk Road Marketplace
• http://5onwnspjvuk7cwvk.onion/ - Black Market Reloaded
New Hidden Wiki
“The Hidden Wiki is the name of several censorship-
resistant wikis operating as Tor hidden services that
anyone can anonymously edit after registering on the
site. The main page serves as a directory of links to
other .onion sites.”
“There are other domains in the deepweb with a little
more difficult to access”
https://en.wikipedia.org/wiki/The_Hidden_Wiki
http://www.taringa.net/posts/hazlo-tu-mismo/17997164/Entra-A-La-DeepWeb-Desde-Tu-Celular-Pc-Completo.html
Implications
• Security – Blocking ToR web content at work
• Security – What are you family members doing on your
network?
• ToR Configurations – Good Security Practices
o PKI & Encryption
o Relay Peer to Peer networks
o Reduced Malware
o Faster Browsing (sometimes)
• Citizens want more privacy
http://bresleveloper.blogspot.com/2015_04_01_archive.html
http://www.news.com.au/technology/online/what-is-the-deep-web-and-anonymous-browser-tor/story-
fnjwnfzw-1226844901718
http://i.imgur.com/JhDsS1L.png
http://i.ytimg.com/vi/27CGkYhJkpw/maxresdefault.jpg
http://4.bp.blogspot.com/aPYxZtC4mMo/UABoWpd9WiI/AAAAAAAAAJI/ShcVQMN3BMw/s1600/deep+web+
11.jpeg
http://4.bp.blogspot.com/-
aPYxZtC4mMo/UABoWpd9WiI/AAAAAAAAAJI/ShcVQMN3BMw/s1600/deep+web+11.jpeg
http://2.bp.blogspot.com/-V29A3fJdWj8/UvJeSv6z5JI/AAAAAAAACHs/fPcK12AaWGA/s1600/Deep-Web-para-
links+actualizados.jpg
Resources and References
Questions? Open Conversation
ToR -  Deep Web

More Related Content

What's hot

Deep Web
Deep WebDeep Web
Deep WebSt John
 
The dark web
The dark webThe dark web
The dark webBella M
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentationalbafg55
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 
A presentation on social networking sites
A presentation on social networking sitesA presentation on social networking sites
A presentation on social networking sitesAmit Kundu
 
Analysis of web application penetration testing
Analysis of web application penetration testingAnalysis of web application penetration testing
Analysis of web application penetration testingEngr Md Yusuf Miah
 
Bug Bounty Programs For The Web
Bug Bounty Programs For The WebBug Bounty Programs For The Web
Bug Bounty Programs For The WebMichael Coates
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 

What's hot (20)

Deep Web
Deep WebDeep Web
Deep Web
 
Darkweb
DarkwebDarkweb
Darkweb
 
The dark web
The dark webThe dark web
The dark web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Dark web
Dark webDark web
Dark web
 
Deep web Seminar
Deep web Seminar Deep web Seminar
Deep web Seminar
 
Deep web
Deep webDeep web
Deep web
 
Phishing
PhishingPhishing
Phishing
 
Dark web
Dark webDark web
Dark web
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
A presentation on social networking sites
A presentation on social networking sitesA presentation on social networking sites
A presentation on social networking sites
 
Analysis of web application penetration testing
Analysis of web application penetration testingAnalysis of web application penetration testing
Analysis of web application penetration testing
 
Bug Bounty Programs For The Web
Bug Bounty Programs For The WebBug Bounty Programs For The Web
Bug Bounty Programs For The Web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Ceh v5 module 14 sql injection
Ceh v5 module 14 sql injectionCeh v5 module 14 sql injection
Ceh v5 module 14 sql injection
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 

Similar to ToR - Deep Web

Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetPriyanka Aash
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) WebJeroen Baert
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR BrowserArjith K Raj
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark WebTom Kranz
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...YaJUG
 
Dark Web Presentation.pptx
Dark Web Presentation.pptxDark Web Presentation.pptx
Dark Web Presentation.pptxAbhinavRaj219245
 
Team4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webTeam4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webIkramUlhaq401878
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSideOWASP EEE
 

Similar to ToR - Deep Web (20)

Deep Web
Deep WebDeep Web
Deep Web
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van AmerongenDeep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Deep web
Deep webDeep web
Deep web
 
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
 
Dark Web Presentation.pptx
Dark Web Presentation.pptxDark Web Presentation.pptx
Dark Web Presentation.pptx
 
Privacy in private browsing mode
Privacy in private browsing modePrivacy in private browsing mode
Privacy in private browsing mode
 
Darknet
DarknetDarknet
Darknet
 
Team4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webTeam4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide
 

More from Murray Security Services

More from Murray Security Services (15)

Cybersecurity Maturity Model Certification
Cybersecurity Maturity Model CertificationCybersecurity Maturity Model Certification
Cybersecurity Maturity Model Certification
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
 
Manufacturing Hacks
Manufacturing HacksManufacturing Hacks
Manufacturing Hacks
 
Spectre & Meltdown
Spectre & MeltdownSpectre & Meltdown
Spectre & Meltdown
 
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex IssueGlobal Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
 
Cybersecurity for Small Business
Cybersecurity for Small BusinessCybersecurity for Small Business
Cybersecurity for Small Business
 
Barcode Metadata & Privacy - What is the risk really?
Barcode Metadata & Privacy - What is the risk really?Barcode Metadata & Privacy - What is the risk really?
Barcode Metadata & Privacy - What is the risk really?
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
How to Write Good Policies
How to Write Good PoliciesHow to Write Good Policies
How to Write Good Policies
 
IT Position of Trust Designation
IT Position of Trust DesignationIT Position of Trust Designation
IT Position of Trust Designation
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

ToR - Deep Web

  • 1. The Deep Web Presented by: Dr. Shawn P. Murray, C|CISO, CISSP, CRISC, FITSP-A For ISSA 7th Annual Cyber Security & Technology Days – Fort Carson on 28 October 2015
  • 2. The Surface Web is that part of the Internet that has been categorized and indexed by the most popular search engines and web crawlers. (Google, Yahoo, Bing, Ask etc…) The Deep Web is that part of the Internet (estimated at 90 - 96%) that is not indexed or categorized. This means you need a specific way to rout to get access to the content that resides here. • Content here can belong to corporations or private users that do not subscribe to any type of internet services. • Most often times, the content here is obfuscated so that you need a specific access mechanism and authentication procedure as well as a special type of onion browser to get access.
  • 3. The Dark Net is sometimes confused with the Deep Web but it is not the same. • “A darknet (or dark net) is an overlay network that can only be accessed with specific software, configurations, or authorization, often using non-standard communications protocols and ports.” • “Two typical darknet types are friend-to-friend networks (usually used for file sharing with a peer-to-peer connection) and anonymity networks such as Tor via an anonymized series of connections.” • “Originally coined in the 1970s to designate networks which were isolated from ARPANET (which evolved into the Internet) for security purposes, darknets were able to receive data from ARPANET but had addresses which did not appear in the network lists and would not answer pings or other inquiries.” https://en.wikipedia.org/wiki/Darknet
  • 4. You access the Deep Web using the ToR Browser. ToR is an acronym for “The Onion Router”, a free and open source web browsing application that allows you to relay your internet web browser connection anonymously over many (around 20) different connections through a forward relay. • Each Relay only has the IP address of the receiving connection and the forwarding connection. The end point of the established relay connection is where the user “appears” to be. • The ToR Browser is configured to prevent active web content from loading (Java, Adobe, etc…) “After the NSA spying scandal, concerns have been growing over internet privacy. This has led people to flock to TOR for its ability to let users browse the web in true anonymity.” • http://www.news.com.au/technology/online/what-is-the-deep-web-and-anonymous-browser-tor/story-fnjwnfzw-1226844901718
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Deep Web at "Android" You can enter the Deep Web using a mobile phone or tablet with Android operating system to access unknown web pages in a hidden world. • Two applications that will help to gain access to these pages. o Orbot is a free software project to provide anonymity on the Internet from a Google Android smartphone. It acts as an instance of the Tor network on such mobile devices and allows traffic routing from a device's web browser, e-mail client, map program, etc., through the Tor network, providing anonymity for the user. o This tool is being used to keep communications on smartphones secure from the governments that may be monitoring their communications, e.g. by political dissidents around the world. • You can download the free Google Play Store at no charge as they were released for a good cause, which is to allow anonymous surfing from our mobile devices without any cost, good sling the editors no ?
  • 10.
  • 11.
  • 13.
  • 14. OnionDir - Deep Web Link Directory dirnxxdraygbifgc.onion - Your copy and paste friendly .onion link list. Feel free to copy this list to forums, pastebins etc so people can find hidden service links that actually work! You can add new links here, please check if the site is up before you add it, i will delete not working sites on a regular basis. Categories: Hidden Service lists and search engines • http://3g2upl4pq6kufc4m.onion/ - DuckDuckGo Search Engine • http://xmh57jrzrnw6insl.onion/ - TORCH - Tor Search Engine • http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page - Uncensored Hidden Wiki • http://32rfckwuorlf4dlv.onion/ - Onion URL Repository • http://e266al32vpuorbyg.onion/bookmarks.php - Dark Nexus • http://5plvrsgydwy2sgce.onion/ - Seeks Search • http://2vlqpcqpjlhmd5r2.onion/ - Gateway to Freenet • http://nlmymchrmnlmbnii.onion/ - Is It Up? • http://kpynyvym6xqi7wz2.onion/links.html - ParaZite • http://wiki5kauuihowqi5.onion/ - Onion Wiki • http://torwikignoueupfm.onion/index.php?title=Main_Page - Tor Wiki • http://kpvz7ki2v5agwt35.onion - The Hidden Wiki • http://idnxcnkne4qt76tg.onion/ - Tor Project: Anonymity Online • http://torlinkbgs6aabns.onion/ - TorLinks • http://jh32yv5zgayyyts3.onion/ - Hidden Wiki .Onion Urls • http://wikitjerrta4qgz4.onion/ - Hidden Wiki - Tor Wiki • http://xdagknwjc7aaytzh.onion/ - Anonet Webproxy • http://3fyb44wdhnd2ghhl.onion/wiki/index.php?title=Main_Page - All You're Wiki - clone of the clean hidden wiki that went down with freedom hosting • http://3fyb44wdhnd2ghhl.onion/ - All You're Base • http://j6im4v42ur6dpic3.onion/ - TorProject Archive • http://p3igkncehackjtib.onion/ - TorProject Media • http://kbhpodhnfxl3clb4.onion - Tor Search • http://cipollatnumrrahd.onion/ - Cipolla 2.0 (Italian) • http://dppmfxaacucguzpc.onion/ - TorDir - One of the oldest link lists on Tor
  • 15. OnionDir - Deep Web Link Directory dirnxxdraygbifgc.onion - Your copy and paste friendly .onion link list. Feel free to copy this list to forums, pastebins etc so people can find hidden service links that actually work! You can add new links here, please check if the site is up before you add it, i will delete not working sites on a regular basis. Categories: Marketplace Financial • http://torbrokerge7zxgq.onion/ - TorBroker - Trade securities anonymously with bitcoin, currently supports nearly 1000 stocks and ETFs • http://fogcore5n3ov3tui.onion/ - Bitcoin Fog - Bitcoin Laundry • http://2vx63nyktk4kxbxb.onion/ - AUTOMATED PAYPAL AND CREDIT CARD STORE • http://samsgdtwz6hvjyu4.onion - Safe, Anonymous, Fast, Easy escrow service. • http://easycoinsayj7p5l.onion/ - EasyCoin - Bitcoin Wallet with free Bitcoin Mixer • http://jzn5w5pac26sqef4.onion/ - WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more • http://ow24et3tetp6tvmk.onion/ - OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry • http://qc7ilonwpv77qibm.onion/ - Western Union Exploit • http://3dbr5t4pygahedms.onion/ - ccPal Store • http://y3fpieiezy2sin4a.onion/ - HQER - High Quality Euro Replicas • http://qkj4drtgvpm7eecl.onion/ - Counterfeit USD • http://nr6juudpp4as4gjg.onion/pptobtc.html - PayPal to BitCoins • http://nr6juudpp4as4gjg.onion/doublecoins.html - Double Your BitCoins • http://lw4ipk5choakk5ze.onion/raw/4588/ - High Quality Tutorials
  • 16. OnionDir - Deep Web Link Directory dirnxxdraygbifgc.onion - Your copy and paste friendly .onion link list. Feel free to copy this list to forums, pastebins etc so people can find hidden service links that actually work! You can add new links here, please check if the site is up before you add it, i will delete not working sites on a regular basis. Categories: • Marketplace Commercial Services • http://6w6vcynl6dumn67c.onion/ - Tor Market Board - Anonymous Marketplace Forums • http://wvk32thojln4gpp4.onion/ - Project Evil • http://5mvm7cg6bgklfjtp.onion/ - Discounted electronics goods • http://lw4ipk5choakk5ze.onion/raw/evbLewgkDSVkifzv8zAo/ - Unfriendlysolution - Legit hitman service • http://nr6juudpp4as4gjg.onion/torgirls.html - Tor Girls • http://tuu66yxvrnn3of7l.onion/ - UK Guns and Ammo • http://nr6juudpp4as4gjg.onion/torguns.htm - Used Tor Guns • http://ucx7bkbi2dtia36r.onion/ - Amazon Business • http://nr6juudpp4as4gjg.onion/tor.html - Tor Technology • http://hbetshipq5yhhrsd.onion/ - Hidden BetCoin • http://cstoreav7i44h2lr.onion/ - CStore Carded Store • http://tfwdi3izigxllure.onion/ - Apples 4 Bitcoin • http://e2qizoerj4d6ldif.onion/ - Carded Store • http://jvrnuue4bvbftiby.onion/ - Data-Bay • http://bgkitnugq5ef2cpi.onion/ - Hackintosh • http://vlp4uw5ui22ljlg7.onion/ - EuroArms • http://b4vqxw2j36wf2bqa.onion/ - Advantage Products • http://ybp4oezfhk24hxmb.onion/ - Hitman Network • http://mts7hqqqeogujc5e.onion/ - Marianic Technology Services • http://mobil7rab6nuf7vx.onion/ - Mobile Store
  • 17. OnionDir - Deep Web Link Directory dirnxxdraygbifgc.onion - Your copy and paste friendly .onion link list. Feel free to copy this list to forums, pastebins etc so people can find hidden service links that actually work! You can add new links here, please check if the site is up before you add it, i will delete not working sites on a regular basis. Categories: • Marketplace Commercial Services • http://54flq67kqr5wvjqf.onion/ - MSR Shop • http://yth5q7zdmqlycbcz.onion/ - Old Man Fixer's Fixing Services • http://matrixtxri745dfw.onion/neo/uploads/MATRIXtxri745dfwONION_130827231336IPA_pc.png - PC Shop • http://storegsq3o5mfxiz.onion/ - Samsung StorE • http://sheep5u64fi457aw.onion/ - Sheep Marketplace • http://nr6juudpp4as4gjg.onion/betcoin.htm - Tor BetCoin • http://qizriixqwmeq4p5b.onion/ - Tor Web Developer • http://vfqnd6mieccqyiit.onion/ - UK Passports • http://en35tuzqmn4lofbk.onion/ - US Fake ID Store • http://xfnwyig7olypdq5r.onion/ - USA Citizenship • http://uybu3melulmoljnd.onion/ - iLike Help Guy • http://dbmv53j45pcv534x.onion/ - Network Consulting and Software Development • http://lw4ipk5choakk5ze.onion/raw/4585/ - Quick Solution (Hitman) • http://nr6juudpp4as4gjg.onion/tynermsr.htm - Tyner MSR Store
  • 18. OnionDir - Deep Web Link Directory dirnxxdraygbifgc.onion - Your copy and paste friendly .onion link list. Feel free to copy this list to forums, pastebins etc so people can find hidden service links that actually work! You can add new links here, please check if the site is up before you add it, i will delete not working sites on a regular basis. Categories: Marketplace Drugs • http://rso4hutlefirefqp.onion/ - EuCanna - Medical Grade Cannabis Buds, Rick Simpson Oil, Ointments and Creams • http://newpdsuslmzqazvr.onion/ - Peoples Drug Store - The Darkweb's Best Online Drug Supplier! • http://smoker32pk4qt3mx.onion/ - Smokeables - Finest Organic Cannabis shipped from the USA • http://fzqnrlcvhkgbdwx5.onion/ - CannabisUK - UK Wholesale Cannabis Supplier • http://kbvbh4kdddiha2ht.onion/ - DeDope - German Weed and Hash shop. (Bitcoin) • http://s5q54hfww56ov2xc.onion/ - BitPharma - EU vendor for cocaine, speed, mdma, psychedelics and subscriptions • http://ll6lardicrvrljvq.onion/ - Brainmagic - Best psychedelics on the darknet • http://25ffhnaechrbzwf3.onion/ - NLGrowers - Coffee Shop grade Cannabis from the netherlands • http://fec33nz6mhzd54zj.onion/index.php - Black Market Reloaded Forums • http://atlmlxbk2mbupwgr.onion/ - Atlantis Marketplace Forums • http://atlantisrky4es5q.onion/ - Atlantis Marketplace • http://dkn255hz262ypmii.onion/ - Silk Road Forums • http://4yjes6zfucnh7vcj.onion/ - Drug Market • http://k4btcoezc5tlxyaf.onion/ - Kamagra for BitCoins • http://silkroadvb5piz3r.onion/silkroad/home - Silk Road Marketplace • http://5onwnspjvuk7cwvk.onion/ - Black Market Reloaded
  • 19. New Hidden Wiki “The Hidden Wiki is the name of several censorship- resistant wikis operating as Tor hidden services that anyone can anonymously edit after registering on the site. The main page serves as a directory of links to other .onion sites.” “There are other domains in the deepweb with a little more difficult to access” https://en.wikipedia.org/wiki/The_Hidden_Wiki http://www.taringa.net/posts/hazlo-tu-mismo/17997164/Entra-A-La-DeepWeb-Desde-Tu-Celular-Pc-Completo.html
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Implications • Security – Blocking ToR web content at work • Security – What are you family members doing on your network? • ToR Configurations – Good Security Practices o PKI & Encryption o Relay Peer to Peer networks o Reduced Malware o Faster Browsing (sometimes) • Citizens want more privacy