SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
GETTING STARTED WITH
USING THE DARK WEB FOR
OSINT INVESTIGATIONS.
OLAKANMI OLUWOLE
20-03-2021
Our mission
To monitor and alert users of immediate risk using a tactical approach,
research, analyze and monitor the technical developments of various
cyber trends and threat-actors in the following fields:
How we are doing it
We gather massive amounts of data using various sources such as
publicly available web references, social media channels and the deep
dark web using a wide range of honey-pot techniques.
Cyber Threat Intelligence tailored for Africa
Global standards,
Local expertise.
OSINT
Opensource Intelligence. It’s the process of fetching and analyzing
publicly available data.
WHO USES OSINT?
Law enforcement, Cyber criminals, OSINT investigators, Private
investigators, Human Resource managers, etc.
We're investigating a missing person's case. The image missing.png
was the last image uploaded by the missing person. We're looking for the
location the person took and uploaded the picture and also the name of
Wi-Fi SSID the person posted from
CHALLENGE 01
https://docs.google.com/uc?export=download&id=1ob0uiTj45clIJIMcrDHVBkoMkfn5RQui
CLEARNET/SURFACE WEB
The Surface Web also called the Visible Web, Indexed Web, Indexable
Web or Lightnet, etc. is the portion of the internet that is readily available
to the general public and searchable with standard web search engines.
DEEP WEB
The deep web consist of a website or any page on the website which are
not indexed by search engines. It can only be access by authorized
personal Deep web is used to store most personal information like (Cloud
storages, any organization personal data and military data etc)
DARK WEB
The dark web forms a small part of the deep web, the part of the Web
not indexed by web search engines, although sometimes the term deep web is
mistakenly used to refer specifically to the dark web. Legal to access but any
illegal activity can be prosecuted.
TOR
Tor is free and open-source software for enabling anonymous communication
by directing Internet traffic through a free, worldwide, volunteer overlay network
consisting of more than seven thousand relays in order to conceal a user's
location and usage from anyone conducting network surveillance or traffic
analysis. To access the darknet, you need the Tor Browser.
REASONS TO USE THE DARKWEB
• Avoid internet censorship
• Anonymity
• Illegal Operations
• Investigations
JUST BEFORE YOU GET STARTED
• Tor network is automatically encrypted
• Domains on the dark web are randomly generated
• Transactions are mostly done using cryptocurrency, perfect money, etc.
• You can also access onion sites using Tor2web
• You won’t always find what you’re looking for
• A lot of sock puppets so real identification is tougher
RESOURCES TO GET STARTED - Clearnet
• https://onion.live/
• DeepDotWeb.com - Now seized by US DoJ
• Dark Search - https://darksearch.io/
• Hunchly daily dark web reports
• r/onion
RESOURCES TO GET STARTED – Dark Web
• Ahmia - http://msydqstlz2kzerdg.onion
• Dark Search - http://darkschn4iw2hxvpv2vy2uoxwkvs2padb56t3h4wqztre6upoc5qwgid.onion
• NotEvil - http://hss3uro2hsxfogfq.onion
• Quo - http://quosl6t6c64mnn7d.onion
• OnionLand - http://3bbad7fauom4d6sgppalyqddsqbf5u5p56b5k5uk2zxsy3d6ey2jobad.onion
• Tor66 Onions - http://tor66sewebgixwhcqfnp5inzp5x5uohhdy3kvtnyfxc2e5mxiuh34iid.onion/fresh
To Find Location:
- Look up wafflesncream '18 skateboard as seen on the image
- Results shows wafflesncream website
- Using any Exif tool, creating date of image is 2018
- Visit wafflencream website and search for 2018
- Results shows there was an event held at upbeat center and same picture is seen on the
website
To Find Wi-Fi SSID
- Now we know location is “Upbeat Center”
- Look up upbeat address
- Go to wigle.net and search for upbeat address area or long and lat
- Filter result to contain the year 2018
- Search for SSIDs in the area
- SSID "UpBeat" is seen with mac address seen in the image exif data
CHALLENGE
FLAG.
Tweet was seen regarding a breach but with little information. We need to
know where it was posted, user who posted, verify breach.
CHALLENGE 02
ADDITIONAL RESOURCES
• Server status – example.onion/server-status
• Censys.io - 443.https.tls.certificate.parsed.names: onion
• Shodan- ssl:“.onion”, “.onion”
• ExoneraTor - https://metrics.torproject.org/exonerator.html
• OnionScan - https://onionscan.org/
Getting started with using the Dark Web for OSINT investigations

Contenu connexe

Tendances

Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligencebalakumaran779
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)festival ICT 2016
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesSyedAmoz
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINTAdam Compton
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }AkshayJha40
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and futureChristian Martorella
 
OSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligenceOSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligencePhilippe Lin
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniAdam Nurudini
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINTChandrapal Badshah
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printingleminhvuong
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic pptSuchita Rawat
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 

Tendances (20)

OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
OSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligenceOSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source Intelligence
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Osint
OsintOsint
Osint
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
 
OSINT
OSINTOSINT
OSINT
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
Incident response process
Incident response processIncident response process
Incident response process
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 

Similaire à Getting started with using the Dark Web for OSINT investigations

The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
ABOUT DARK WEB
ABOUT DARK WEB ABOUT DARK WEB
ABOUT DARK WEB VenkatVs7
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) WebJeroen Baert
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight IntelliaggGavin O'Toole
 

Similaire à Getting started with using the Dark Web for OSINT investigations (20)

ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Dark Web
Dark WebDark Web
Dark Web
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
ABOUT DARK WEB
ABOUT DARK WEB ABOUT DARK WEB
ABOUT DARK WEB
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Dark web
Dark webDark web
Dark web
 
Dark Net
Dark NetDark Net
Dark Net
 
Deep web
Deep webDeep web
Deep web
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 

Dernier

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 

Dernier (9)

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 

Getting started with using the Dark Web for OSINT investigations

  • 1. GETTING STARTED WITH USING THE DARK WEB FOR OSINT INVESTIGATIONS. OLAKANMI OLUWOLE 20-03-2021
  • 2. Our mission To monitor and alert users of immediate risk using a tactical approach, research, analyze and monitor the technical developments of various cyber trends and threat-actors in the following fields:
  • 3. How we are doing it We gather massive amounts of data using various sources such as publicly available web references, social media channels and the deep dark web using a wide range of honey-pot techniques.
  • 4. Cyber Threat Intelligence tailored for Africa
  • 5.
  • 6.
  • 8. OSINT Opensource Intelligence. It’s the process of fetching and analyzing publicly available data. WHO USES OSINT? Law enforcement, Cyber criminals, OSINT investigators, Private investigators, Human Resource managers, etc.
  • 9. We're investigating a missing person's case. The image missing.png was the last image uploaded by the missing person. We're looking for the location the person took and uploaded the picture and also the name of Wi-Fi SSID the person posted from CHALLENGE 01 https://docs.google.com/uc?export=download&id=1ob0uiTj45clIJIMcrDHVBkoMkfn5RQui
  • 10. CLEARNET/SURFACE WEB The Surface Web also called the Visible Web, Indexed Web, Indexable Web or Lightnet, etc. is the portion of the internet that is readily available to the general public and searchable with standard web search engines. DEEP WEB The deep web consist of a website or any page on the website which are not indexed by search engines. It can only be access by authorized personal Deep web is used to store most personal information like (Cloud storages, any organization personal data and military data etc)
  • 11. DARK WEB The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web. Legal to access but any illegal activity can be prosecuted. TOR Tor is free and open-source software for enabling anonymous communication by directing Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays in order to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. To access the darknet, you need the Tor Browser.
  • 12. REASONS TO USE THE DARKWEB • Avoid internet censorship • Anonymity • Illegal Operations • Investigations
  • 13. JUST BEFORE YOU GET STARTED • Tor network is automatically encrypted • Domains on the dark web are randomly generated • Transactions are mostly done using cryptocurrency, perfect money, etc. • You can also access onion sites using Tor2web • You won’t always find what you’re looking for • A lot of sock puppets so real identification is tougher
  • 14. RESOURCES TO GET STARTED - Clearnet • https://onion.live/ • DeepDotWeb.com - Now seized by US DoJ • Dark Search - https://darksearch.io/ • Hunchly daily dark web reports • r/onion
  • 15. RESOURCES TO GET STARTED – Dark Web • Ahmia - http://msydqstlz2kzerdg.onion • Dark Search - http://darkschn4iw2hxvpv2vy2uoxwkvs2padb56t3h4wqztre6upoc5qwgid.onion • NotEvil - http://hss3uro2hsxfogfq.onion • Quo - http://quosl6t6c64mnn7d.onion • OnionLand - http://3bbad7fauom4d6sgppalyqddsqbf5u5p56b5k5uk2zxsy3d6ey2jobad.onion • Tor66 Onions - http://tor66sewebgixwhcqfnp5inzp5x5uohhdy3kvtnyfxc2e5mxiuh34iid.onion/fresh
  • 16. To Find Location: - Look up wafflesncream '18 skateboard as seen on the image - Results shows wafflesncream website - Using any Exif tool, creating date of image is 2018 - Visit wafflencream website and search for 2018 - Results shows there was an event held at upbeat center and same picture is seen on the website To Find Wi-Fi SSID - Now we know location is “Upbeat Center” - Look up upbeat address - Go to wigle.net and search for upbeat address area or long and lat - Filter result to contain the year 2018 - Search for SSIDs in the area - SSID "UpBeat" is seen with mac address seen in the image exif data CHALLENGE FLAG.
  • 17. Tweet was seen regarding a breach but with little information. We need to know where it was posted, user who posted, verify breach. CHALLENGE 02
  • 18. ADDITIONAL RESOURCES • Server status – example.onion/server-status • Censys.io - 443.https.tls.certificate.parsed.names: onion • Shodan- ssl:“.onion”, “.onion” • ExoneraTor - https://metrics.torproject.org/exonerator.html • OnionScan - https://onionscan.org/