SlideShare a Scribd company logo
DEEP WEB
WHAT TO DO ‘N’ WHAT NOT TO DO
root@topdeepweb:$> cat whoami.txt
[+] AJAY KUMAR [+]
[+] INDEPENDENT SECURITY RESEARCHER [+]
[+] DEEP WEB ENTHUISIAT AND RESEARCHER [+]
[+] YET TO BE AN ENGINEER [+]
[+] Find my research works on 0xmalweb.online [+]
WHAT IS DEEP WEB ?
The deep web or invisible web or hidden
webare parts of the World Wide
Web whose contents are not indexed by
standard search engines for any reason
WONDER WHAT IT IS ?
• Deep web contains 75% of the total world wide web
• Only remaining 25% is Surface web (which includes Facebook ,
Twitter , Google etc)
• The most popular search engine GOOGLE can search only 18% of
the SURFACE WEB
• In the sense , only 18% of the surface web is indexed by google
Levels Of web
SURFACE WEB: The web that the vast majority of internet users are
connected to. Accessible in any nation that does not block internet
access.
E.g: Social media sites like Facebook, informational websites like
Wikipedia, general websites, etc.
BERGIE WEB: The layer of the Surface Web that is blocked in some
nations. Some other information is only accessible through illegal
means.
E.g: Google locked results, recently web crawled old content, pirated
media, pornography etc
Levels Of Web (contd…)
DEEPWEB: Requires special software or proxy to access
(TOR).Contains most of the archived web pages of the 1990s Web
that did not renew their domain names and such.E.g:
Government/Business Research, Hackers, ScriptKiddies, Virus
Information, Illegal and Obscene Content (CP, Gore, Suicides, etc…)
CHARTER WEB: It is like the regular deep web, but harder to get into
and more illegal content.
Advanced covert government research, most of the internet black
market (run on bitcoins), Human/Arms/Drug/Rare Animal Trafficking,
Assassination Networks , illegal game hunting, line of blood locations,
more banned obscene content like CP, Gore, etc.
Levels Of Web (contd…)
• MARIANAS WEB:
Lowest known level of the Deep Web. Named after the Spanish
Technician who created it. It is extremely difficult to access, users say
it is the safest part of the internet due to the privacy.
Julian Assange and other top-level Wikileaks members are believed to
have access.
Do Deep Web Is Really Illegal?
If So what actually the Deep Web contains to call it Illegal
SPAMMERS / SOCIAL ENGINEERERS / DOXERS
SECURE YOURSELF
RED ROOMS / SUICIDAL FORUMS
FBI / GOVERNMENT
TERRORISM
HITMAN / CONTRACT KILLERS
Deep Web - what to do and what not to do
HACKERS
ILLEGAL DRUGS
GOVERNMENT DATA
But Not Everything In Deep Web Is Illegal
Researchers from Terbium Labs claim to have found
evidence that 50% of the deep web contents are legal
50%
13%
11%
9%
4%
3%
3%
2%2%1%1%1%
Deep Web
legal
Drugs
Multiple other categories (illicit)
Site Down
Other illicit activity
Explicit
Fraud
Pharmaceuticals
Hacking & Exploits
Downloadable
Exploitation
Extremisum
What Legal Things Do Deep Web Contains ??
Galaxy 2
Freedom Of Press
Sigaint Mail Services
Forums
Ebooks / Tutorials
History Archives
0 Day Exploits and Data Dumps
Secure Yourself While Accessing Deep Web
• Manual settings For Tor Browser
go for about:config and make sure javascript.enabled and
geo.enabled is set to false
• Disable Javascript using No script addon too
• Disable or Uninstall all addons except HTTPS Everywhere
• Try to change tor circuit and network over a period of time manually
• Donot download any files directly from the Deep Web
• Donot open any links directly from Deep Web in surface web
• Use PGP to chat or mail with someone on Deep Web
• Use unique username for each and every forums you visit
• Don’t use same usernames while using IRC or on surface web
• Avoid using .to and .link (tor2web services)
• Try to use tor in a dedicated system (tail live os )
“Anonymity does not mean criminality”
Privacy Matters In Deep Web , Don’t loose it to morons
QUESTIONS ?
Thank you

More Related Content

PPTX
The dark web
PPTX
Dark web by Pranesh Kulkarni
PPTX
The Dark side of the Web
PPTX
Introduction To Dark Web
PPT
Open source intelligence
PPTX
Journey To The Dark Web
PPTX
Illuminating the dark web
PPTX
Dark web
The dark web
Dark web by Pranesh Kulkarni
The Dark side of the Web
Introduction To Dark Web
Open source intelligence
Journey To The Dark Web
Illuminating the dark web
Dark web

What's hot (20)

ODP
The Deep and Dark Web
PPTX
Deep web
PPTX
The Deep Web, TOR Network and Internet Anonymity
PPTX
Dark and Deep web
PPTX
Dark web
PPTX
Guide to dark web
PPTX
Cybersecurity and the DarkNet
PPTX
Deep web and Dark web
PPTX
The dark web
PPTX
Deep web Seminar
PPTX
Dark wed
PPTX
The Dark Web
PPTX
The Dark Web : Hidden Services
PPTX
Deepweb and darkweb vinodkumar ancha
PPTX
Dark web presentation
PPTX
Deep web & Darknet Präsentation
PPTX
Dark Web and Privacy
PPTX
The Dark Web
PPTX
Deep web power point presentation
PPTX
The Dark Web
The Deep and Dark Web
Deep web
The Deep Web, TOR Network and Internet Anonymity
Dark and Deep web
Dark web
Guide to dark web
Cybersecurity and the DarkNet
Deep web and Dark web
The dark web
Deep web Seminar
Dark wed
The Dark Web
The Dark Web : Hidden Services
Deepweb and darkweb vinodkumar ancha
Dark web presentation
Deep web & Darknet Präsentation
Dark Web and Privacy
The Dark Web
Deep web power point presentation
The Dark Web
Ad

Viewers also liked (20)

PPT
Impossible Is Nothing
ODP
Impossible is Nothing?
PPTX
10 facts about japan
PPT
Nobel prize
PPSX
Presentation on Medicated Chewing Gums
PDF
Dos and Don'ts of an Engineering Statement of Purpose
PPTX
Data made out of functions
PDF
The Deep Web - How the Deep Web Works
PDF
Human Body
PPT
Bubble gum
PPTX
Deep Web
PPTX
Japan - An Emerging Civilization
PPTX
Deep web
PPSX
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
PDF
Sustainable Innovation Day
PDF
Clean and green hydrocarbons ignite publish
PDF
10 Practical Ways to Be More Efficient at Work
PDF
iOS Scroll Performance
PDF
Testing at Spotify
Impossible Is Nothing
Impossible is Nothing?
10 facts about japan
Nobel prize
Presentation on Medicated Chewing Gums
Dos and Don'ts of an Engineering Statement of Purpose
Data made out of functions
The Deep Web - How the Deep Web Works
Human Body
Bubble gum
Deep Web
Japan - An Emerging Civilization
Deep web
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
Sustainable Innovation Day
Clean and green hydrocarbons ignite publish
10 Practical Ways to Be More Efficient at Work
iOS Scroll Performance
Testing at Spotify
Ad

Similar to Deep Web - what to do and what not to do (20)

PPTX
Deep web
PPTX
The Deep Web.pptx
PPTX
Pichman privacy, the dark web, & hacker devices i school (1)
PPTX
Deep Web
PPTX
Ali shahbazi khojasteh - deep web
PPTX
Invisible Web
PPTX
The Deep Web
PPTX
Deep and Dark Web
PPTX
2260_1.pptx554646465456454545454545554554545545
PPTX
PptDW.pptxvbbbvvvxxfjjrtuhvcfhhjddffcvjjgg
PPTX
Deep_Web_Risks_Designed.pptx deep web ppt
PPTX
Cyber crime- a case study
PPTX
Research in the deep web
PDF
[Bucharest] #DontTrustTheDarkSide
PPTX
PPTX
Dark Web
PPTX
Overview of Deep web
PPTX
https://www.slideshare.net/slideshow/chapter-1-ob-38248150/38248150
PDF
darkeeb_royida-alhayali darkeebf.ppt.pdf
PPTX
Investigating Using the Dark Web
Deep web
The Deep Web.pptx
Pichman privacy, the dark web, & hacker devices i school (1)
Deep Web
Ali shahbazi khojasteh - deep web
Invisible Web
The Deep Web
Deep and Dark Web
2260_1.pptx554646465456454545454545554554545545
PptDW.pptxvbbbvvvxxfjjrtuhvcfhhjddffcvjjgg
Deep_Web_Risks_Designed.pptx deep web ppt
Cyber crime- a case study
Research in the deep web
[Bucharest] #DontTrustTheDarkSide
Dark Web
Overview of Deep web
https://www.slideshare.net/slideshow/chapter-1-ob-38248150/38248150
darkeeb_royida-alhayali darkeebf.ppt.pdf
Investigating Using the Dark Web

More from Cysinfo Cyber Security Community (20)

PDF
Understanding Malware Persistence Techniques by Monnappa K A
PDF
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
PDF
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
PPTX
Emerging Trends in Cybersecurity by Amar Prusty
PDF
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
PDF
Closer look at PHP Unserialization by Ashwin Shenoi
PDF
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
PDF
The Art of Executing JavaScript by Akhil Mahendra
PDF
Reversing and Decrypting Malware Communications by Monnappa
PPTX
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
PPTX
Analysis of android apk using adhrit by Abhishek J.M
PDF
Understanding evasive hollow process injection techniques monnappa k a
PPTX
Security challenges in d2d communication by ajithkumar vyasarao
PPTX
S2 e (selective symbolic execution) -shivkrishna a
PPTX
Dynamic binary analysis using angr siddharth muralee
PPTX
Bit flipping attack on aes cbc - ashutosh ahelleya
PDF
Security Analytics using ELK stack
PDF
Linux Malware Analysis
ODP
Introduction to Binary Exploitation
PDF
ATM Malware: Understanding the threat
Understanding Malware Persistence Techniques by Monnappa K A
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Emerging Trends in Cybersecurity by Amar Prusty
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
Closer look at PHP Unserialization by Ashwin Shenoi
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
The Art of Executing JavaScript by Akhil Mahendra
Reversing and Decrypting Malware Communications by Monnappa
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
Analysis of android apk using adhrit by Abhishek J.M
Understanding evasive hollow process injection techniques monnappa k a
Security challenges in d2d communication by ajithkumar vyasarao
S2 e (selective symbolic execution) -shivkrishna a
Dynamic binary analysis using angr siddharth muralee
Bit flipping attack on aes cbc - ashutosh ahelleya
Security Analytics using ELK stack
Linux Malware Analysis
Introduction to Binary Exploitation
ATM Malware: Understanding the threat

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Machine learning based COVID-19 study performance prediction
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Cloud computing and distributed systems.
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Per capita expenditure prediction using model stacking based on satellite ima...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Electronic commerce courselecture one. Pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
Machine learning based COVID-19 study performance prediction
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Cloud computing and distributed systems.

Deep Web - what to do and what not to do

  • 1. DEEP WEB WHAT TO DO ‘N’ WHAT NOT TO DO
  • 2. root@topdeepweb:$> cat whoami.txt [+] AJAY KUMAR [+] [+] INDEPENDENT SECURITY RESEARCHER [+] [+] DEEP WEB ENTHUISIAT AND RESEARCHER [+] [+] YET TO BE AN ENGINEER [+] [+] Find my research works on 0xmalweb.online [+]
  • 3. WHAT IS DEEP WEB ?
  • 4. The deep web or invisible web or hidden webare parts of the World Wide Web whose contents are not indexed by standard search engines for any reason
  • 5. WONDER WHAT IT IS ? • Deep web contains 75% of the total world wide web • Only remaining 25% is Surface web (which includes Facebook , Twitter , Google etc) • The most popular search engine GOOGLE can search only 18% of the SURFACE WEB • In the sense , only 18% of the surface web is indexed by google
  • 6. Levels Of web SURFACE WEB: The web that the vast majority of internet users are connected to. Accessible in any nation that does not block internet access. E.g: Social media sites like Facebook, informational websites like Wikipedia, general websites, etc. BERGIE WEB: The layer of the Surface Web that is blocked in some nations. Some other information is only accessible through illegal means. E.g: Google locked results, recently web crawled old content, pirated media, pornography etc
  • 7. Levels Of Web (contd…) DEEPWEB: Requires special software or proxy to access (TOR).Contains most of the archived web pages of the 1990s Web that did not renew their domain names and such.E.g: Government/Business Research, Hackers, ScriptKiddies, Virus Information, Illegal and Obscene Content (CP, Gore, Suicides, etc…) CHARTER WEB: It is like the regular deep web, but harder to get into and more illegal content. Advanced covert government research, most of the internet black market (run on bitcoins), Human/Arms/Drug/Rare Animal Trafficking, Assassination Networks , illegal game hunting, line of blood locations, more banned obscene content like CP, Gore, etc.
  • 8. Levels Of Web (contd…) • MARIANAS WEB: Lowest known level of the Deep Web. Named after the Spanish Technician who created it. It is extremely difficult to access, users say it is the safest part of the internet due to the privacy. Julian Assange and other top-level Wikileaks members are believed to have access.
  • 9. Do Deep Web Is Really Illegal? If So what actually the Deep Web contains to call it Illegal
  • 10. SPAMMERS / SOCIAL ENGINEERERS / DOXERS
  • 11. SECURE YOURSELF RED ROOMS / SUICIDAL FORUMS
  • 14. HITMAN / CONTRACT KILLERS
  • 19. But Not Everything In Deep Web Is Illegal
  • 20. Researchers from Terbium Labs claim to have found evidence that 50% of the deep web contents are legal
  • 21. 50% 13% 11% 9% 4% 3% 3% 2%2%1%1%1% Deep Web legal Drugs Multiple other categories (illicit) Site Down Other illicit activity Explicit Fraud Pharmaceuticals Hacking & Exploits Downloadable Exploitation Extremisum
  • 22. What Legal Things Do Deep Web Contains ??
  • 29. 0 Day Exploits and Data Dumps
  • 30. Secure Yourself While Accessing Deep Web
  • 31. • Manual settings For Tor Browser go for about:config and make sure javascript.enabled and geo.enabled is set to false
  • 32. • Disable Javascript using No script addon too • Disable or Uninstall all addons except HTTPS Everywhere • Try to change tor circuit and network over a period of time manually • Donot download any files directly from the Deep Web • Donot open any links directly from Deep Web in surface web • Use PGP to chat or mail with someone on Deep Web • Use unique username for each and every forums you visit • Don’t use same usernames while using IRC or on surface web • Avoid using .to and .link (tor2web services) • Try to use tor in a dedicated system (tail live os )
  • 33. “Anonymity does not mean criminality” Privacy Matters In Deep Web , Don’t loose it to morons