2. Contents
• Internet
• Types of Internet
• Introduction to hacking
• Types of hackers
• Classification of hackers
• Steps performed by a hacker
• IP address ranges
• Tracing of IP address
• Email Protocol
• Proxy Servers
• Security
• Conclusion
3. To catch a thief, think like a thief similarly
To catch a hacker think like a hacker
4. What is Internet?
The internet, sometimes simply called the net, is a worldwide
system of interconnected computer networks and electronic
devices that communicate with each other using an
established set of protocols.
Types of Internet
The Internet is generally divided into three layers based on
accessibility and visibility:
i. Surface Web
ii. Deep Web
iii. Dark Web
5. Surface Web(Public & Indexed)
• The Surface Web is the visible part of the internet that is
indexed by search engines like Google, Bing, and Yahoo.
• It includes websites that anyone can access without special
permissions or tools.
• This layer makes up only 4-5% of the total internet.
• Examples of Surface Web
• News websites (BBC, CNN, The New York Times)Social media
platforms (Facebook, Twitter, LinkedIn)E-commerce sites
(Amazon, eBay, AliExpress)Online educational platforms
(Wikipedia, Coursera, Udemy)
6. Deep Web (Hidden but Legal)
i. The Deep Web consists of web pages that are not indexed by search engines.
ii. These pages require login credentials or special permissions to access.
iii. The Deep Web is much larger than the Surface Web, making up around 90-95%
of the internet.
iv. It includes private and confidential data that is hidden for security reasons.
Examples of Deep Web:
v. Online banking portals
vi. Private databases (hospital records, legal documents, academic research)
vii. Password-protected websites
viii. Email accounts (Gmail, Yahoo Mail)
ix. Corporate and government intranets
7. Dark Web (Encrypted & Anonymous)
The Dark Web is a small portion of the Deep Web that is intentionally hidden and requires special software like Tor (The
Onion Router) or I2P to access.
• It is encrypted and allows users to browse anonymously, making it both useful and risky.
• The Dark Web is not illegal itself, but it is often associated with illegal activities.
Examples of Dark Web Usage:
✅ Legal Uses:
• Anonymous communication for journalists and activists.
• Secure browsing in countries with internet censorship.
• Private forums for cybersecurity experts.
❌ Illegal Uses:
• Black markets for drugs, weapons, and stolen data.
• Hiring hackers or cybercriminal activities.
8. Comparison Table: Surface Web vs. Deep Web vs.
Dark Web
Feature Surface Web Deep Web Dark Web
Indexed by Search
Engines
✅ Yes ❌ No ❌ No
Access
Requirements
Open to all Requires
login/permissions
Requires
Tor/I2P
Size of the
Internet
~4-5% ~90-95% <1%
Legal to Access ✅ Yes ✅ Yes ✅ Yes, but some activities are
illegal
Examples Google, YouTube, Amazon
Emails, Medical Records,
Bank Accounts
Darknet Markets,
Whistleblower
Platforms
9. Introduction to Hacking
What is Hacking?
Hacking is the process of gaining unauthorized access to
computer systems, networks, or data. It can be done for both
ethical and malicious purposes. Hackers use their skills to
exploit vulnerabilities in software, hardware, or human
behavior.
Positiv
e
Negativ
e
10. Types of Hackers
• White Hat Hacker
• Black Hat Hacker
• Grey Hat Hacker
11. White Hat Hacker
• Perform Ethical Hacking
• Have knowledge of hacking and hacker toolset
• Locate security weaknesses and implement
countermeasures
• Also known as Penetration Tester
• Focus on securing and protecting IT systems
12. Black Hat Hacker
• Perform unethical hacking
• Are criminal hackers or crackers
• Use their skills for illegal or malicious purposes
• Focus on Security Cracking and Data Stealing
13. Grey Hat Hacker
• Sometimes acts legally and sometimes not
• Do not hack for personal gain
• Do not have malicious intentions
• May occasionally commit crimes
• Are hybrid between White Hat and Black Hat Hackers
14. Classification of hackers
• Have ability to find unique vulnerability
• Have deep understanding of OSI Layer
Model and TCP/IP Stacks
Coders
• Have experience with OS
• Exploit existing vulnerabilities
Admin
• Use scripts and programs developed by
others
• Can cause serious problems
Script
Kiddies
15. Steps Performed by a Hacker
Reconnai
ssance
Scanning
Gaining
access
Maintainin
g access
Clearing
tracks
16. Reconnaissance
• Google
• Sam spade
• Email tracker and visual route
•Scanning
• War dialing and pingers
• Port scanning
• Enumeration
17. Password Cracking
• Dictionary Cracking
• Brute Force Cracking
• Hybrid Cracking
• Social Engineering
• Metasploit
• Man in the middle attack