#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda

Slides:



Advertisements
Similar presentations
SOCIAL WEB MEDIA privacy and data mining part 2 4/12/2010.
Advertisements

A look into Bullet Proof Hosting November DefCamp 5 Silviu Sofronie – Head of Forensics
DARKNET.
What is the invisible web?  All information that cannot be indexed using general web search engines  Also known as the deep internet, deepnet, or the.
Dark net . . Invisible Web . . Hidden Web . .
Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED
INTERNET A collection of networks. History ARPANet – developed for security of sending in case of a nuclear attack IDEA – the system would not go down.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
4/19/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Anonymity and the Internet Nathan Owens. Overview Regular Internet anonymity Non-standard implementations Benefits Negatives Legal changes Future Ideas.
Project Proposal Interface Design Website Coding Website Testing & Launching Website Maintenance.
Adrian Crenshaw. Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption.
Security Testing Case Study 360logica Software Testing Services.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Microsoft MVP (Enterprise Security) Microsoft Certified Trainer (18 years) Founder: Cybercrime Security Forum! Winner: Microsoft Speaker Idol 2006 Author:
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
1 World Wide Web Concepts (Chapter 18) 인공지능연구실. 2 목 차  Elements of the Web  Web Browsers  Keeping Tracking of your Favorite Web sites  Security and.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors.
The Silk Road: An Online Marketplace
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Tor Bruce Maggs relying on materials from
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Information Assurance Club Collin Donaldson. What is it? World Wide Web content that is not part of the Surface Web and is indexed by search engines.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Tor Bruce Maggs relying on materials from
Hiding in the Dark: The Internet You Cannot See Marc Visnick
NETWORK SECURITY HERD: A SCALABLE, TRAFFIC ANALYSIS RESISTANT ANONYMITY NETWORK FOR VOIP SYSTEMS JINGTAO YAO JIAJUN LI ACM HORNORED CLASS.
Anonymous Internet Protocols
Hotspot Shield Protect Your Online Identity
Cryptocurrencies by.
The Onion Router Hao-Lun Hsu
RCS v7 Infection Vectors
TECHNOLOGY GUIDE THREE
The Hidden face of the Darknet
Deep and Dark on the Web By: Todd Careless.
Dark Web – the modern threat for the Internet Security
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
The quieter you become, the more you are able to hear By: Ben Knapic
Drugs & The Dark Net Tim Bingham
Deep and Dark on the Web By: Jim Martin.
Exercise ?: TOR.
Dark Web, I2P, and Deep Web Team 5
By: Jonathan Cardwell, Mark Fredricks, Ryan Vina and Jake Leiper
Computer Security.
Kharavets Dmitriy, group №641301
Many dark web constructs. The most notorious/popular is Tor/Onion.
The dark web By Riley. Sampare.
Bruce Maggs relying on materials from
Presentation On Bit-Coins.
The Internet: Encryption & Public Keys
Unit 8 Network Security.
WJEC GCSE Computer Science
How does the deep web work?
Bruce Maggs relying on materials from
Bruce Maggs relying on materials from
Presentation transcript:

#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda

#ABATECHSHOW The Surface Web 2

#ABATECHSHOW Indexed vs. Non-Indexed 3 Crawl Robot.txt Index

#ABATECHSHOW Deep Web Contents 4 Private web Dynamic content Unlinked content Scripted content Limited access content Databases

#ABATECHSHOW Searching the Deep Web

#ABATECHSHOW Finding Information Databases Government sites

#ABATECHSHOW Government Public Records

#ABATECHSHOW Government Public Records

#ABATECHSHOW Actionable Intelligence Define the information that revolves around the individual: Friends Family Neighbors Job Activities Social Platforms

#ABATECHSHOW Social Media Algorithms & software Open Source Intelligence (OSINT)

#ABATECHSHOW Facial Recognition

#ABATECHSHOW Boolean Searches “” quotes around subject matter Run correct search patterns on addresses, phone numbers, addresses and usernames Filetype/site specific searching

#ABATECHSHOW Dark Web Myths 13 X Full of only terrible, terrible things X Automatically on a watch list X Tor will completely protect your online privacy

#ABATECHSHOW Is the Dark Web legal? YES!

#ABATECHSHOW Dark Web Realities Only accessible using special browser software Protects anonymity and privacy

#ABATECHSHOW BitTorrent vs. Dark Web P2P File sharing Searchable Internet data distribution Not anonymous File “chunks”

#ABATECHSHOW Connecting to the Darknet Tor I2P Freenet

#ABATECHSHOW Tor Browser

#ABATECHSHOW Tor T – The O – Onion R – Router Application layer encryption Relays decrypt next hop in circuit Final relay decrypts data

#ABATECHSHOW How Tor Works

#ABATECHSHOW Tor Circuit Randomized

#ABATECHSHOW Tor Metrics Relays and bridges Direct users by country Hidden-service traffic Data flow Unique.onion addresses

#ABATECHSHOW Unique.onion addresses

#ABATECHSHOW Onions & Getting to Sites

#ABATECHSHOW Pros of the Dark Web Anonymity Protection for: –Journalists –Dissidents –Whistleblowers

#ABATECHSHOW Risks of the Dark Web Discovery Malicious code Entrance/exit nodes

#ABATECHSHOW Entrance/Exit Nodes

#ABATECHSHOW Illegal Activity Gun sales Drugs Sex trafficking Hit for hire

#ABATECHSHOW Silk Road

#ABATECHSHOW Darknet

#ABATECHSHOW Hidden Links

#ABATECHSHOW Stolen Credit Cards

#ABATECHSHOW Drugs

#ABATECHSHOW FBI & Carnegie Mellon

#ABATECHSHOW Best Practices Cookies JavaScript Privacy settings

#ABATECHSHOW Best Practices Filesharing/downloading Printing

#ABATECHSHOW Extra Layers of Protection Virtual Private Networks Spoofing MAC address Proxy Encryption

#ABATECHSHOW Bitcoin and the Dark Web

#ABATECHSHOW How It Works Blockchain Mining

#ABATECHSHOW Digital Wallets Desktop Mobile Online Hardware Paper Multi-sig

#ABATECHSHOW Bitcoin Currency conversion Buy/sell Volatility Legality

#ABATECHSHOW Bitcoin Tumbling

#ABATECHSHOW SAVE THE DATE! March 17-19, 2016