SlideShare a Scribd company logo
Dark Net
- Kunal Das
Abstract
In recent years, the Darknet has become one of the most discussed
topics in cyber security circles.
Current academic studies and media reports tend to highlight how the
anonymous nature of the Darknet is used to facilitate criminal activities.
The dark web is a hidden part of the world wide web that can only be
accessed using a special browser known as Tor
Parts of Web
To understand what the dark web is, we need to understand its
terminology. The internet is often described as consisting of three
parts:
i. The surface web,
ii. The deep web
iii. The dark web.
Surface Web
It is the part of the internet most of us use every day , activities like social
networking and reading news on the Common Web
It’s accessible through regular browsers such as Google Chrome, Safari, or
Firefox.
You can access it anywhere and at any time, as long as you have an internet
connection and a browser.
Don’t forget that it's because of the surface web that giants like Facebook and
Google know almost everything about you.
Deep Web
The term “deep web” refers to the part of the internet that’s behind
closed doors.
Most of the deep web consists of pages and databases that are only
meant for a certain group of people within an organization.
Your work database might be on this part of the Deep web.
Most of us won’t have access to this part of web and the required login
credentials and this information can’t be found on search engines
Dark web
The dark web is the part of the deep web that’s only accessible
through a special browser: the Tor browser.
Also called the “darknet,” this collection of sites refers to the
unregulated part of the internet.
No organization, business, or government is in charge of the
dark web or is able to enforce rules.
Dark Web
Tor (The Onion Routing project)
The Tor project is a non-profit organization that conducts research and
development into online privacy and anonymity.
It is intended to prevent anybody from tracking your browsing history or
discovering where you are, including businesses and the government.
The Tor network is a secure, encrypted protocol that can ensure privacy for
data and communications on the web.
Tor is legal to use but Tor is not designed nor intended for Tor users or Tor
network operators to break the law
Who created Tor?
Onion routing,The original technology behind Tor was developed by the
United States Naval Research Laboratory in 1990s.
The Onion Routing project (which later simply became "Tor), was
launched on 20 September 2002
The US Navy used tor with the specific purpose of insuring the
anonymity of communications over the Internet.
With the help of tor the US Navy protects the identity of US Navy
intelligence agents
Question you may ask
But the Navy is government!! Who made TOR
Fair. But only relevant because that’s where Dr. Syverson worked at the time (and
(and works still).
He said “Create anonymity software that the US Navy can run so our warfighters
can securely communicate in the field”
Even if Tor aligned with the official ones, that does not mean Tor is "owned and
operated" by the US government
How Tor works?
Tor is a network of virtual tunnels
Tor works by sending your traffic through three
random servers (also known as relays) in the
Tor network
The last relay in the circuit (the “exit relay”) then
sends the traffic out onto the public Internet.
Thus, it creates multi-layered encryption (layers
like an onion) and a hard-to-follow path
There are over 7,000 of these servers, which
mostly belong to volunteers.
When and Why Was the Dark
Web Created?
The dark web is known to have begun in 2000
The thesis project of University of Edinburgh student , who
set out to create a "Distributed Decentralized Information
Storage and Retrieval System.
He aimed to create a new way to anonymously communicate
and share files online
Is the Dark Web Safe?
Like most things, it depends. Here are some cybersecurity issues you should consider:
◦ Remote administration tools can be auto downloaded
◦ Malware Like Spyware / Ransomware
◦ Hackers may
◦ Phishing scams
◦ Suspicious links
◦ Criminal element
It’s dangerous to buy or download anything from illegal marketplaces it
may contain malware.
Legal Uses of the Dark Web
While using the dark web may seem suspect on the surface, it is perfectly
legal, and there are many legitimate uses of Tor and anonymous
browsing
For example,
In countries where government surveillance may be used to spy on and
oppress political dissidents, the dark web is often a place for
communication that avoids government censorship and scrutiny
Harmful contents of darkweb
Due to the dark web's encryption, websites cannot track geolocation or IP address of
users. This allows users to talk, blog, transact and share files confidentially.
Some contents of Dark web.
I. Stolen Information
II. Drugs and Stolen Goods
III. Disturbing Content
IV. Bitcoin Lottery Tickets
V. Terrorist Content
VI. Hacking Services
What You Can Find on the Dark
Web?
1) Black markets
Black markets have flourished since the birth of the internet. The dark web is
home to many black marketplaces, where all sorts of goods can be sold and
bought, from cheap Netflix accounts to credit card numbers, weapons, and
drugs.
2) Email services
Email services on the dark web almost always require you to use Tor and only
allow you to send emails to others who are also using Tor.
What You Can Find on the Dark
Web?
3) File uploads and transfers
Secure file uploads and transfers are widespread on the dark web, as the onion
network provides several layers of encryption on both your files and connection.
Similar to whistleblowing websites, file transfer services are used by journalists
and informants to share files with sensitive information.
4) Forums and chat boards
There are several message boards and chatrooms on the dark web, often
dedicated to topics that aren’t safe to discuss in other parts of the internet.
What You Can Find on the Dark
Web?
5) Whistleblowing websites
Whistleblowers and journalists use the dark web to leak or find sensitive
information. People who want to report a company or their government for illegal
acts can use Tor to try and stay anonymous.
6) Link directories
to access a specific dark website, you need to know the exact URL of that
page. And it’s not like these URLs are easy to remember either: they’re strings
of random numbers, letters, and special characters there are dedicated pages
that can help you find what you’re looking for.
The Dark Side of the Dark Web
Hackers use the dark web as their playground to sell their services and earn a living.
One can hire a hacker or hire an assassin
Drug marketplace where drugs are been sold
Weapons
Child Pornography
Red Rooms
Human Flesh
Disturbing contents and a lot more
The Red Room
A Red Room is basically a livestream on the deep/dark web where dark web criminals will take
people that they have kidnapped and kill them on camera.
The human parts are cut out instead of money. The transaction of money on these websites are
through Bitcoins.
The people also take membership fee to access these Red Rooms.
Most of these types of websites are banned by Cyber Police
The silk road
The first modern dark web market, known for selling drugs created by Ross Ulbricht who was
only 31.
Ulbricht’s website had more than $1.2 billion in sales for illegal drugs and other products,
using cryptocurrency to make the exchanges.
Police arrested Ulbricht on Oct. 1, 2013, in the science fiction section of the San Francisco
public library.
Agents who made the arrest said the young man was literally working on the site when they
arrested him.
The FBI tracked Ulbricht by tracing some of his early requests to others to help him build the
site.
How to visit dark web
The safest way to get on the dark web is through the Tor network which is a browser support
Tor network also known as Tor Browser.
Then you will have to get the onion links with .onion extension links because dark websites
are not indexed publicly.
The easiest way to search for the link are https://onion.live/
Tor supports duckduck go search engine which does not store IP addresses or user
information
While visiting .onion links or the darkweb one should turn off his/her javascript of the Tor
browser.
Live Example
Open Tor browser and connect to Tor
network
Search for https://onion.live/
You can see lots of # each # contains
onion sites of that particular topic
For example I clicked #drugs
Live Example
After opening the subtopic name DRUGS there are sub sub topics
colored in red and green
Red ones are dead and green ones are still alive
Let us explore the 9th sub-subtopic i.e, ARCHETYP
After clicking we will get a brief summary of the site.
Live Example
After opening the summery we can see
they provided with the onion link
Its green that means its live so opened it in
a new tab
Live Example
First the site asks for a captcha
Most of the darkweb captchas are not easy to solve, though this
was easy hence after solving the captcha I entered the site
There I was asked to login, So I created a account with temp mail
Then again, I solved the captcha and entered the site.
Live
Example
After entering the site I went to the
marketplace
We can see the screenshot that there
are lots of drugs that are been sold.
Conclusion
Navigating the darkweb can be quite interesting yet you must
exercise safety as you ride the dark tunnel. First block web
cam, second don’t download anything from the darknet, and
lastly don't maximize the tor browser screen. Enjoy surfing!
Thank you

More Related Content

PDF
ABOUT DARK WEB
PDF
dark-web-and-cybercrime.pdf
PPTX
Introduction To Dark Web
PPTX
The Dark Web
PPTX
The dark web
PPTX
Dark web presentation
PPTX
Illuminating the dark web
PPTX
Indiginous system of medicine
ABOUT DARK WEB
dark-web-and-cybercrime.pdf
Introduction To Dark Web
The Dark Web
The dark web
Dark web presentation
Illuminating the dark web
Indiginous system of medicine

What's hot (20)

ODP
The Deep and Dark Web
PPTX
Dark wed
PPTX
The Dark Web : Hidden Services
PPTX
Journey To The Dark Web
PPTX
Deep and Dark Web
PPTX
Deep web and dark web
PPTX
Dark web
PPTX
The dark web
PPTX
The Dark Web
PPTX
Dark and Deep web
PPTX
Deepweb and darkweb vinodkumar ancha
PPTX
Dark web
PPTX
The Dark side of the Web
PPTX
Dark web by Claudine Impas
PPTX
The Dark Web
PPTX
The Dark Web
PPTX
Deep web and Dark web
PPTX
PPTX
Cybersecurity and the DarkNet
PPTX
The Deep and Dark Web
Dark wed
The Dark Web : Hidden Services
Journey To The Dark Web
Deep and Dark Web
Deep web and dark web
Dark web
The dark web
The Dark Web
Dark and Deep web
Deepweb and darkweb vinodkumar ancha
Dark web
The Dark side of the Web
Dark web by Claudine Impas
The Dark Web
The Dark Web
Deep web and Dark web
Cybersecurity and the DarkNet
Ad

Similar to Dark Web (20)

PPTX
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
PPTX
Dark Web.pptx
PPTX
Ali shahbazi khojasteh - deep web
PPTX
Cyber crime- a case study
PPTX
Case Study on Dark Web:Insights, Risks & Security Measures
PDF
Mensworldhq.com what happens on the dark web
PPT
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
PPTX
Tor Project and The Darknet
PPTX
Invisible Web
PDF
Understanding the Tor Network and Exploring the Deep Web
PDF
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
PDF
darkeeb_royida-alhayali darkeebf.ppt.pdf
PPTX
Tor: The Second Generation Onion Router
PDF
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
DOCX
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
PPTX
The Internet and World Wide Web
PDF
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
DOCX
Dark Web Kristin Finklea Specialist in Domestic Se
PDF
Deeplight Intelliagg
PDF
Dw communication
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Dark Web.pptx
Ali shahbazi khojasteh - deep web
Cyber crime- a case study
Case Study on Dark Web:Insights, Risks & Security Measures
Mensworldhq.com what happens on the dark web
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Tor Project and The Darknet
Invisible Web
Understanding the Tor Network and Exploring the Deep Web
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
darkeeb_royida-alhayali darkeebf.ppt.pdf
Tor: The Second Generation Onion Router
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
The Internet and World Wide Web
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark Web Kristin Finklea Specialist in Domestic Se
Deeplight Intelliagg
Dw communication
Ad

Recently uploaded (20)

PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Classroom Observation Tools for Teachers
PDF
Business Ethics Teaching Materials for college
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Cell Types and Its function , kingdom of life
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
STATICS OF THE RIGID BODIES Hibbelers.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
O7-L3 Supply Chain Operations - ICLT Program
Classroom Observation Tools for Teachers
Business Ethics Teaching Materials for college
Microbial disease of the cardiovascular and lymphatic systems
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pre independence Education in Inndia.pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Cell Types and Its function , kingdom of life
Complications of Minimal Access Surgery at WLH
Pharma ospi slides which help in ospi learning
Final Presentation General Medicine 03-08-2024.pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
2.FourierTransform-ShortQuestionswithAnswers.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?

Dark Web

  • 2. Abstract In recent years, the Darknet has become one of the most discussed topics in cyber security circles. Current academic studies and media reports tend to highlight how the anonymous nature of the Darknet is used to facilitate criminal activities. The dark web is a hidden part of the world wide web that can only be accessed using a special browser known as Tor
  • 3. Parts of Web To understand what the dark web is, we need to understand its terminology. The internet is often described as consisting of three parts: i. The surface web, ii. The deep web iii. The dark web.
  • 4. Surface Web It is the part of the internet most of us use every day , activities like social networking and reading news on the Common Web It’s accessible through regular browsers such as Google Chrome, Safari, or Firefox. You can access it anywhere and at any time, as long as you have an internet connection and a browser. Don’t forget that it's because of the surface web that giants like Facebook and Google know almost everything about you.
  • 5. Deep Web The term “deep web” refers to the part of the internet that’s behind closed doors. Most of the deep web consists of pages and databases that are only meant for a certain group of people within an organization. Your work database might be on this part of the Deep web. Most of us won’t have access to this part of web and the required login credentials and this information can’t be found on search engines
  • 6. Dark web The dark web is the part of the deep web that’s only accessible through a special browser: the Tor browser. Also called the “darknet,” this collection of sites refers to the unregulated part of the internet. No organization, business, or government is in charge of the dark web or is able to enforce rules.
  • 8. Tor (The Onion Routing project) The Tor project is a non-profit organization that conducts research and development into online privacy and anonymity. It is intended to prevent anybody from tracking your browsing history or discovering where you are, including businesses and the government. The Tor network is a secure, encrypted protocol that can ensure privacy for data and communications on the web. Tor is legal to use but Tor is not designed nor intended for Tor users or Tor network operators to break the law
  • 9. Who created Tor? Onion routing,The original technology behind Tor was developed by the United States Naval Research Laboratory in 1990s. The Onion Routing project (which later simply became "Tor), was launched on 20 September 2002 The US Navy used tor with the specific purpose of insuring the anonymity of communications over the Internet. With the help of tor the US Navy protects the identity of US Navy intelligence agents
  • 10. Question you may ask But the Navy is government!! Who made TOR Fair. But only relevant because that’s where Dr. Syverson worked at the time (and (and works still). He said “Create anonymity software that the US Navy can run so our warfighters can securely communicate in the field” Even if Tor aligned with the official ones, that does not mean Tor is "owned and operated" by the US government
  • 11. How Tor works? Tor is a network of virtual tunnels Tor works by sending your traffic through three random servers (also known as relays) in the Tor network The last relay in the circuit (the “exit relay”) then sends the traffic out onto the public Internet. Thus, it creates multi-layered encryption (layers like an onion) and a hard-to-follow path There are over 7,000 of these servers, which mostly belong to volunteers.
  • 12. When and Why Was the Dark Web Created? The dark web is known to have begun in 2000 The thesis project of University of Edinburgh student , who set out to create a "Distributed Decentralized Information Storage and Retrieval System. He aimed to create a new way to anonymously communicate and share files online
  • 13. Is the Dark Web Safe? Like most things, it depends. Here are some cybersecurity issues you should consider: ◦ Remote administration tools can be auto downloaded ◦ Malware Like Spyware / Ransomware ◦ Hackers may ◦ Phishing scams ◦ Suspicious links ◦ Criminal element It’s dangerous to buy or download anything from illegal marketplaces it may contain malware.
  • 14. Legal Uses of the Dark Web While using the dark web may seem suspect on the surface, it is perfectly legal, and there are many legitimate uses of Tor and anonymous browsing For example, In countries where government surveillance may be used to spy on and oppress political dissidents, the dark web is often a place for communication that avoids government censorship and scrutiny
  • 15. Harmful contents of darkweb Due to the dark web's encryption, websites cannot track geolocation or IP address of users. This allows users to talk, blog, transact and share files confidentially. Some contents of Dark web. I. Stolen Information II. Drugs and Stolen Goods III. Disturbing Content IV. Bitcoin Lottery Tickets V. Terrorist Content VI. Hacking Services
  • 16. What You Can Find on the Dark Web? 1) Black markets Black markets have flourished since the birth of the internet. The dark web is home to many black marketplaces, where all sorts of goods can be sold and bought, from cheap Netflix accounts to credit card numbers, weapons, and drugs. 2) Email services Email services on the dark web almost always require you to use Tor and only allow you to send emails to others who are also using Tor.
  • 17. What You Can Find on the Dark Web? 3) File uploads and transfers Secure file uploads and transfers are widespread on the dark web, as the onion network provides several layers of encryption on both your files and connection. Similar to whistleblowing websites, file transfer services are used by journalists and informants to share files with sensitive information. 4) Forums and chat boards There are several message boards and chatrooms on the dark web, often dedicated to topics that aren’t safe to discuss in other parts of the internet.
  • 18. What You Can Find on the Dark Web? 5) Whistleblowing websites Whistleblowers and journalists use the dark web to leak or find sensitive information. People who want to report a company or their government for illegal acts can use Tor to try and stay anonymous. 6) Link directories to access a specific dark website, you need to know the exact URL of that page. And it’s not like these URLs are easy to remember either: they’re strings of random numbers, letters, and special characters there are dedicated pages that can help you find what you’re looking for.
  • 19. The Dark Side of the Dark Web Hackers use the dark web as their playground to sell their services and earn a living. One can hire a hacker or hire an assassin Drug marketplace where drugs are been sold Weapons Child Pornography Red Rooms Human Flesh Disturbing contents and a lot more
  • 20. The Red Room A Red Room is basically a livestream on the deep/dark web where dark web criminals will take people that they have kidnapped and kill them on camera. The human parts are cut out instead of money. The transaction of money on these websites are through Bitcoins. The people also take membership fee to access these Red Rooms. Most of these types of websites are banned by Cyber Police
  • 21. The silk road The first modern dark web market, known for selling drugs created by Ross Ulbricht who was only 31. Ulbricht’s website had more than $1.2 billion in sales for illegal drugs and other products, using cryptocurrency to make the exchanges. Police arrested Ulbricht on Oct. 1, 2013, in the science fiction section of the San Francisco public library. Agents who made the arrest said the young man was literally working on the site when they arrested him. The FBI tracked Ulbricht by tracing some of his early requests to others to help him build the site.
  • 22. How to visit dark web The safest way to get on the dark web is through the Tor network which is a browser support Tor network also known as Tor Browser. Then you will have to get the onion links with .onion extension links because dark websites are not indexed publicly. The easiest way to search for the link are https://onion.live/ Tor supports duckduck go search engine which does not store IP addresses or user information While visiting .onion links or the darkweb one should turn off his/her javascript of the Tor browser.
  • 23. Live Example Open Tor browser and connect to Tor network Search for https://onion.live/ You can see lots of # each # contains onion sites of that particular topic For example I clicked #drugs
  • 24. Live Example After opening the subtopic name DRUGS there are sub sub topics colored in red and green Red ones are dead and green ones are still alive Let us explore the 9th sub-subtopic i.e, ARCHETYP After clicking we will get a brief summary of the site.
  • 25. Live Example After opening the summery we can see they provided with the onion link Its green that means its live so opened it in a new tab
  • 26. Live Example First the site asks for a captcha Most of the darkweb captchas are not easy to solve, though this was easy hence after solving the captcha I entered the site There I was asked to login, So I created a account with temp mail Then again, I solved the captcha and entered the site.
  • 27. Live Example After entering the site I went to the marketplace We can see the screenshot that there are lots of drugs that are been sold.
  • 28. Conclusion Navigating the darkweb can be quite interesting yet you must exercise safety as you ride the dark tunnel. First block web cam, second don’t download anything from the darknet, and lastly don't maximize the tor browser screen. Enjoy surfing!