870 likes | 883 Views
Nitin Pandey - Presentation on "Dark Web
E N D
Здравствуйте Chelyabinsk नमस्ते
WHO AM I ? NITIN PANDEY CYBER SECURITY PROFESSIONAL CHAIRMAN OF NATIONAL INFORMATION SECURITY COUNCIL FOUNDER OF HACKERS DAY CEO & CTO OF CYBERSHRISTI INFOSOLUTIONS
SURFACE WEB The Surface Web (also called the Visible Web, Indexed Web, Indexable Web or Lightnet) is the part of World Wide Web that is readily available to the general public and searchable with standard web search engines. CONTAINS APPROX. 35 TRILLION WEB PAGES
GOOGLE’S THEORY SHOW A LIE 100 TIMES TO THE PERSON , HE/SHE WILL BELIEVE IT’S TRUE !
DEEP WEB THE DEEP WEB OR INVISIBLE WEB OR HIDDEN WEBARE PARTS OF THE WORLD WIDE WEB WHOSE CONTENTS ARE NOT INDEXED BY STANDARD SEARCH ENGINES FOR ANY REASON.
IN DEEP > about:deepweb DEEP WEB CONTAINS AROUND 80% OF THE TOTAL WORLD WIDE WEB REMAINING 20% IS SURFACE WEB (WHICH INCLUDES FACEBOOK , TWITTER , GOOGLE, INSTAGRAM ETC.) THE MOST POPULAR SEARCH ENGINE GOOGLE CAN SEARCH ONLY 15% OF THE SURFACE WEB
DARK WEB DARK WEB IS A PART OF DEEP WEB WHICH ACTUALLY CONTAINS ILLEGAL DRUGS , RED ROOMS , SPAMMERS, PORN, HITMAN AND HACKING SERVICES ETC.
DARK WEB CONTAINS CYBER CRIME SERVICES ILLEGAL CONTENT SUCH AS TERRORIST GROUPS & FORUMS CRYPTOCURRENCY SERVICES ILLEGAL MARKETPLACES
DARK WEB CONTAINS HITMAN / CONTRACT KILLER
DARK WEB ALSO CONTAINS • SPAMMERS / SOCIAL ENGINEERS / DOXERS • RED ROOMS / SUICIDAL FORUMS • PEDO FILMS [CHILD PORN] • HITMAN / CONTRACT KILLERS / GUNS • HACKERS • THE MARKET PLACES • DATA LEAKS / 0 DAY EXPLOITS • DOXED INFORMATION
DARK NET DARK NETS ARE THE SPECIAL SOFTWARES OR PROXIES USED TO CONNECT TO THE DARK WEB.
SOME OF THE DARK NETS WE ARE USING TODAY • TOR (THE ONION ROUTER) • I2P (INVISIBLE INTERNET PROJECT) • FREENET • ZERONET • HORNET (UPCOMING)
DEEP WEB TOR I2P USER DARK WEB FREENET / ZERONET PROXIES DEEP WEB AND DARK WEB DARK NET
I2P THE INVISIBLE INTERNET PROJECT [I2P] IS AN ANONYMOUS NETWORK LAYER THAT ALLOWS FOR CENSORSHIP-RESISTANT, PEER TO PEER COMMUNICATION.
• ZERONET IS AN OPEN SOURCE DECENTRALIZED WEB-LIKE NETWORK OF PEER-TO-PEER USERS. IT IS BUILT IN PYTHON LANGUAGE. INSTEAD OF HAVING AN IP ADDRESS, SITES ARE IDENTIFIED BY A PUBLIC KEY. • IT PROVIDES SO MANY SERVICES SUCH AS ZEROMAIL, ZEROSITES, ZEROBLOGS ETC. • NO PASSWORD IS REQUIRED! • BROWSE THE SITES YOU'RE SEEDING EVEN WITHOUT INTERNET CONNECTION
PEER TO PEER [P2P] IN A P2P [PEER TO PEER] NETWORK, THE "PEERS" ARE COMPUTER SYSTEMS WHICH ARE CONNECTED TO EACH OTHER VIA INTERNET. FILES CAN BE SHARED DIRECTLY BETWEEN SYSTEMS ON THE NETWORK WITHOUT THE NEED OF A CENTRAL SERVER
TOR ( THE ONION ROUTER ) TOR IS FREE SOFTWARE AND AN OPEN NETWORK FOR ENABLING ANONYMOUS COMMUNICATION. TOR WAS ORIGINALLY CALLED "THE ONION ROUTER‖
TOR INSTALLATION NOTE: TOR IS NOT ABOUT BUYING ILLEGAL DRUGS OR WATCHING PEDO FILMS TOR IS ALL ABOUT ANONYMITY AND PRIVACY
TOR FLOW DATA FLOW IN THE TOR NETWORK https://torflow.uncharted.software/?source=post_page----- 1482a44bfe8e----------------------#?ML=- 37.70507812499999,43.26120612479979,3
DISCLAIMER & WARNING I DO NOT ENCOURAGE ACCESSING THE DARK WEB SITES IN ANY WAY. IT’S JUST AN EDUCATIONAL GUIDE TO ENLIGHTEN YOU ON THE FACTS ABOUT IT. TO BROWSE DEEP WEB SAFELY, ALWAYS USE VPN SERVICE. NEVER GO WITH FREE SERVICES SINCE THEY DON’T PROVIDE WHAT THEY EXACTLY CLAIM. I WILL PERSONALLY RECOMMEND TO USE NORDVPN WITH TOR BROWSER. IF YOU ARE THINKING YOU ARE BROWSING TOR THEN YOU ARE SAFE. YOU ARE WRONG ! NO! YOU ARE NOT SAFE!! TOR DOESN’T PROVIDE FULL SECURITY AND ANONYMITY. SO FOR SAFE AND ANONYMOUS BROWSING ALWAYS FIRST RUN VPN THEN START TOR BROWSER THEN START SURFING DARK WEB.
RISKS OF USING TOR • JAVASCRIPT • VOLUNTEERING AS AN EXIT NODE • INTELLIGENCE SERVICES [SUCH AS FBI]
JAVA </SCRIPT> • ATTACKERS AND AGENCIES USE JAVASCRIPT TO INJECT AND FIND USER’S REAL IP ADDRESS • 80% OF THE TOR USERS USE TOR FOR REGULAR INTERNET USAGE • IN THOSE 80% , 60% DON’T KNOW WHAT IS JAVASCRIPT AND NoScript ADDON • SO TARGETTING TOR USERS BECOME SO EASY BECAUSE OF THESE THREAT CAUSERS • THOUGH REAL TOR USERS ARE NOT AFFECTED
VOLUNTEERING AS AN EXIT NODE EXIT NODES ARE THE GATEWAYS WHERE ENCRYPTED TOR TRAFFIC HITS THE INTERNET. THIS MEANS AN EXIT NODE CAN BE ABUSED TO MONITOR TOR TRAFFIC (AFTER IT LEAVES THE ONION NETWORK) THIS IS VERY DANGEROUS TO RUN EXIT NODE FROM YOUR HOME BECAUSE THERE ARE MANY CHANCES TO TAG YOUR IP FOR ALL THE ILLEGAL TRAFFIC RUNNING THROUGH YOUR SERVER SO IT IS MY RECOMMENDATION NOT TO RUN EXIT NODES FROM YOUR HOME IF THEY CAN’T DECRYPT, THEY WILL ARREST YOU !
• MANY CASES REGISTERED BY JUST RUNNING EXIT NODES AND GET CAUGHT FOR OTHERS ACTS • EVENTHOUGH YOU ARE JUST RUNNING EXIT NODE AND NOT MAKING ANY ILLEGAL TRAFFIC • FEDS KNOCKING DOOR AT 6 AM WON’T LISTEN TO YOUR STORIES • OLDAGE JUDGE EVEN DOESN’T UNDERSTAND WHAT THE FISH THIS TOR IS CAN CHARGE YOU WITH FINE AND IMPRISONMENT
WHAT TOR CANNOT DO ?? TOR CANNOT PROTECT YOU FROM ATTACHMENTS 1. TOR WON'T PROTECT YOU , IF YOU RUN EXECUTABLES LIKE FLASH VIDEOS, CODES, BROWSER EXECUTABLES AND EXE’S 2. YOU NEED TO BE SMART ENOUGH TO KNOW WHAT YOU NEED TO EXECUTE AND WHAT NEED NOT TO BE 3. SOME SAYS IT’S OPTIONAL BUT IT IS NOT! BECAUSE LEARNING RUSSIAN IS COMPULSORY IF YOU ARE GOING TO STAY IN RUSSIA
TOR CANNOT CLOAK YOUR IDENTITY 1. TOR PROVIDES ONLY ANONYMITY 2. YOU ARE RESPONSIBLE FOR YOUR OWN PRIVACY 3. USERS SHOULD NOT REVEAL THEIR ORIGINAL IDENTITY ON TOR 4. USERS SHOULD NOT USE SAME USERNAME AND PASSWORDS ON EVERY FORUM OR SITES THEY VISIT 5. USERS SHOULD NOT USE IDENTITY WHICH IS RELATED TO SURFACE WEB ACCOUNTS
LEGAL DARK WEB SERVICES SOCIAL MEDIA LEGAL MARKETS CASE STUDY MATERIALS FOR RESEARCH JOURNALISM
LEGAL DARK WEB SERVICES WIKILEAKS WHICH SHOCKED THE WHOLE WORLD IS AN INTERNATIONAL NON- PROFIT ORGANISATION THAT PUBLISHES NEWS LEAKS AND CLASSIFIED MEDIA PROVIDED BY ANONYMOUS SOURCES. ITS WEBSITE, INITIATED IN 2006 IN ICELAND BY THE ORGANISATION SUNSHINE PRESS, CLAIMED IN 2016 TO HAVE RELEASED ONLINE 10 MILLION DOCUMENTS IN ITS FIRST 10 YEARS.
MEDIA ACCORDING TO MEDIA : DARK WEB IS FULL OF TERRORISM , PEDO FILMS , RED ROOMS AND DRUGS , BUT IN REALITY MAJOR PART OF DARK WEB ARE ―BLANK PAGES‖
REALITY HIDDEN SERVICES TRAFFIC IS ONLY 3% [2016] IMPOSSIBLE THINGS MADE POSSIBLE BY MEDIA BEFORE POSTING SOME RANDOM CONTENTS , THEY SHOULD THINK OF THE TECHNOLOGY BEHIND IT
UNIVERSITY OF CALIFORNIA, 2001 1 PETABYTE=1 MILLION GB