SlideShare une entreprise Scribd logo
1  sur  17
DEEP WEB 
THE HIDDEN INTERNET
CLEARNET 
That Internet, used by billions around the world every day, is sometimes known as the Surface 
Web, or the Clearnet, as coined by Tor and other anonymous online users. The so-called surface 
Web, which all of us use routinely, consists of data that search engines can find and then offer 
up in response to your queries. But in the same way that only the tip of an iceberg is visible to 
observers, a traditional search engine sees only a small amount of the information that's 
available -- a measly 0.03 percent
WHAT IS DEEP WEB ? 
In simple words Everything else Clearnet is DeepWeb. 
The deep Web (also known as the undernet, invisible Web and hidden Web, among 
other monikers) consists of data that you won't locate with a simple Google search. 
It’s made up of tens of billions of sites that are hidden within a universe of code -- 
various estimates have put the Deep Web at anywhere from five to 500,000 times the 
size of the Surface Web.
DARKNET 
Darknets are small niches of the “Deep Web,” which is itself a catch-all term for the assorted 
Net-connected stuff that isn’t discoverable by the major search engines. (BrightPlanet has a 
stellar Deep Web primer.) They cloak themselves in obscurity with specialized software that 
guarantees encryption and anonymity between users, as well as protocols or domains that the 
average webizen will never stumble across.
WHY DARKNET IS IMPORTANT ? 
Many countries lack the equivalent of the United States’ First Amendment. Darknets grant 
everyone the power to speak freely without fear of censorship or persecution. According to the 
Tor Project, anonymizing Hidden Services have been a refuge for dissidents in Lebanon, 
Mauritania, and Arab Spring nations; hosted blogs in countries where the exchange of ideas is 
frowned upon; and served as mirrors for websites that attract governmental or corporate angst, 
such as GlobalLeaks, Indymedia, and Wikileaks.
ANONYMOUS NETWORKS 
TOR 
Tor makes it possible for users to hide their locations while offering various kinds of services, 
such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor 
users can connect to these hidden services, each without knowing the other's network identity.
STEP 1 
A hidden service needs to advertise its 
existence in the Tor network before 
clients will be able to contact it
STEP 2 
the hidden service assembles a hidden 
service descriptor, containing its public 
key and a summary of each introduction 
point, and signs this descriptor with its 
private key.
STEP 3 
A client that wants to contact a hidden 
service needs to learn about its onion 
address first. After that, the client can 
initiate connection establishment by 
downloading the descriptor from the 
distributed hash table
STEP 4 
When the descriptor is present and the 
rendezvous point is ready, the client 
sends this message to one of the 
introduction points, requesting it be 
delivered to the hidden service
STEP 5 
The hidden service decrypts the client's 
introduce message and finds the address 
of the rendezvous point and the one-time 
secret in it. The service creates a circuit to 
the rendezvous point and sends the one-time 
secret to it in a rendezvous message
FINDING A DOOR TO TOR SERVICE 
Some common sites to walk in the tor network. 
1. HiddenWiki 
2. TorDir 
3. deepweblinks.org 
4. http://2vlqpcqpjlhmd5r2.onion/ – Gateway to Freenet 
5. http://wiki5kauuihowqi5.onion/ – Onion Wiki
STEP 6 
In the last step, the rendezvous point 
notifies the client about successful 
connection establishment. After that, 
both client and hidden service can use 
their circuits to the rendezvous point for 
communicating with each other
I2P ANONYMIZING NETWORK 
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can 
use to securely communicate. All data is wrapped with several layers of encryption, and the 
network is both distributed and dynamic, with no trusted parties. Unlike many other 
anonymizing networks, I2P doesn't try to provide anonymity by hiding the originator of some 
communication and not the recipient, or the other way around. I2P is designed to allow peers 
using I2P to communicate with each other anonymously — both sender and recipient are 
unidentifiable to each other as well as to third parties
GARLIC ROUTING STRUCTURE
PRACTICAL SESSION ON TOR AND ONION HOSTING
THANK YOU

Contenu connexe

Tendances

Tendances (20)

The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
The dark web
The dark webThe dark web
The dark web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Dark Web
Dark WebDark Web
Dark Web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Dark web
Dark webDark web
Dark web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
Dark web
Dark webDark web
Dark web
 
Darkweb
DarkwebDarkweb
Darkweb
 

En vedette (20)

AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
 
Darknet
DarknetDarknet
Darknet
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Deep web
Deep webDeep web
Deep web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Darknet
DarknetDarknet
Darknet
 
Deep web
Deep webDeep web
Deep web
 
Darknet
DarknetDarknet
Darknet
 
Darknet
DarknetDarknet
Darknet
 
Deep web (Dark side)
Deep web (Dark side)Deep web (Dark side)
Deep web (Dark side)
 
Deep or dark web
Deep or dark webDeep or dark web
Deep or dark web
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Deep web
Deep webDeep web
Deep web
 
Deep Web & Dark Web
Deep Web & Dark WebDeep Web & Dark Web
Deep Web & Dark Web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Darknet
DarknetDarknet
Darknet
 
Deep web
Deep webDeep web
Deep web
 
Deep web
Deep webDeep web
Deep web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 

Similaire à Deep web

Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknetDvir Barel
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Auto Parts Wholesale Online
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark webJisc
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfTopLinkSeo
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfAuto Parts Wholesale Online
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfAuto Parts Wholesale Online
 
Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxJamalAmzil6
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
 

Similaire à Deep web (20)

Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
.Onion
.Onion.Onion
.Onion
 
Darknet
DarknetDarknet
Darknet
 
Dw communication
Dw communicationDw communication
Dw communication
 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknet
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdf
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Darkweb
DarkwebDarkweb
Darkweb
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptx
 
Deep web
Deep webDeep web
Deep web
 
Darknet
DarknetDarknet
Darknet
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 

Dernier

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Dernier (11)

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 

Deep web

  • 1. DEEP WEB THE HIDDEN INTERNET
  • 2. CLEARNET That Internet, used by billions around the world every day, is sometimes known as the Surface Web, or the Clearnet, as coined by Tor and other anonymous online users. The so-called surface Web, which all of us use routinely, consists of data that search engines can find and then offer up in response to your queries. But in the same way that only the tip of an iceberg is visible to observers, a traditional search engine sees only a small amount of the information that's available -- a measly 0.03 percent
  • 3. WHAT IS DEEP WEB ? In simple words Everything else Clearnet is DeepWeb. The deep Web (also known as the undernet, invisible Web and hidden Web, among other monikers) consists of data that you won't locate with a simple Google search. It’s made up of tens of billions of sites that are hidden within a universe of code -- various estimates have put the Deep Web at anywhere from five to 500,000 times the size of the Surface Web.
  • 4. DARKNET Darknets are small niches of the “Deep Web,” which is itself a catch-all term for the assorted Net-connected stuff that isn’t discoverable by the major search engines. (BrightPlanet has a stellar Deep Web primer.) They cloak themselves in obscurity with specialized software that guarantees encryption and anonymity between users, as well as protocols or domains that the average webizen will never stumble across.
  • 5. WHY DARKNET IS IMPORTANT ? Many countries lack the equivalent of the United States’ First Amendment. Darknets grant everyone the power to speak freely without fear of censorship or persecution. According to the Tor Project, anonymizing Hidden Services have been a refuge for dissidents in Lebanon, Mauritania, and Arab Spring nations; hosted blogs in countries where the exchange of ideas is frowned upon; and served as mirrors for websites that attract governmental or corporate angst, such as GlobalLeaks, Indymedia, and Wikileaks.
  • 6. ANONYMOUS NETWORKS TOR Tor makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor users can connect to these hidden services, each without knowing the other's network identity.
  • 7. STEP 1 A hidden service needs to advertise its existence in the Tor network before clients will be able to contact it
  • 8. STEP 2 the hidden service assembles a hidden service descriptor, containing its public key and a summary of each introduction point, and signs this descriptor with its private key.
  • 9. STEP 3 A client that wants to contact a hidden service needs to learn about its onion address first. After that, the client can initiate connection establishment by downloading the descriptor from the distributed hash table
  • 10. STEP 4 When the descriptor is present and the rendezvous point is ready, the client sends this message to one of the introduction points, requesting it be delivered to the hidden service
  • 11. STEP 5 The hidden service decrypts the client's introduce message and finds the address of the rendezvous point and the one-time secret in it. The service creates a circuit to the rendezvous point and sends the one-time secret to it in a rendezvous message
  • 12. FINDING A DOOR TO TOR SERVICE Some common sites to walk in the tor network. 1. HiddenWiki 2. TorDir 3. deepweblinks.org 4. http://2vlqpcqpjlhmd5r2.onion/ – Gateway to Freenet 5. http://wiki5kauuihowqi5.onion/ – Onion Wiki
  • 13. STEP 6 In the last step, the rendezvous point notifies the client about successful connection establishment. After that, both client and hidden service can use their circuits to the rendezvous point for communicating with each other
  • 14. I2P ANONYMIZING NETWORK I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the originator of some communication and not the recipient, or the other way around. I2P is designed to allow peers using I2P to communicate with each other anonymously — both sender and recipient are unidentifiable to each other as well as to third parties
  • 16. PRACTICAL SESSION ON TOR AND ONION HOSTING