SlideShare a Scribd company logo
1
Illuminating the Dark Web
Simon Bryden
Consulting Systems Engineer, EMEA
2
Introduction to the dark web
The Onion Router and Hidden Services
Dark Web Takedowns
Protecting yourself from the dark web
Illuminating the Dark Web
3
“The iceberg”
Surface Web
Deep Web
Dark Web
4
Protected by authentication layer
or paywall
Not linked from any other pages Not referenced by search engines
Deep Web characteristics
5
Anonymous Special access software Associated with illegal activities
Dark Web characteristics
6
Illegal content Illegal marketplaces Cybercrime services Cryptocurrency services
What can be found on the Dark Web?
7
8
9
10
Journalism Legal markets Social Media Repressed minorities
Legal dark web services
11
The Onion Router
12
• Based on technology developed by the US Naval Research Laboratory in 1990s
• Designed to protect US intelligence communications online
• Tor project launched in 2002, first public release in 2004
• The Tor Project Inc. launched in 2006 as a non-profit organisation
What is Tor?
13
Tor can provide two levels of anonymity:
Anonymous access to surface web services
• The Tor network provides an anonymous access through the Tor network.
• The Tor network “exit node” connects to the surface web server
Anonymous access to hidden services
• The Tor network provides complete end-to-end anonymity
• Hides the identity of both client and server
How muchAnonymity does Tor Provide?
14
15
16
How Anonymous?
“Alice is using the Tor service”
Tor relay nodes are publicly known
“Someone is connecting to Bob
from the Tor network”
“We can see this traffic”
17
How Anonymous?
“Alice is using a VPN service”
HTTPS
VPN Provider
“Someone is connecting to Bob
from the Tor network”
18
Tor Browser
19
Volunteers.
Often universities and other institutions
Most people host Relay or Guard (Entry) nodes
Nodes cannot become guards unless they are stable, and have at least 2Mbytes/s bandwidth
Running an Exit node opens up the potential of receiving abuse complaints
Exit nodes are often blocked by providers or website owners
Who Owns the Tor Nodes?
20
Where are the relays?
Germany
UK
Netherlands
USA
France
21
Tor Hidden Services
22
• Hidden services provide anonymity for the server
• Servers are identified by an onion address such as 4nrvt5xpejyo27zf.onion
• These are not resolved by DNS, rather by the Tor network itself
• Most importantly:
• There is no link between server name and server address
Tor Hidden Services
23
Tor Hidden Service Operation
RP
24
Browsing Hidden Sites
Dark Web Take-Down
26
• It’s more than just Tor!
• Payment methods
• Delivery of goods
• All other system tools and applications must be anonymized
• Ancillary communications (forgotten passwords, tech support)
• Web services platforms (Wordpress, Joomla etc. are full of vulnerabilities)
Perfect anonymity is Difficult
27
In 2013, the FBI managed to infiltrate “Freedom Hosting”,
a hosting operation serving child pornography sites
It inserted an exploit kit which targeted a vulnerability in Firefox 17
(used in Tor browser)
This resulted in the download of a file which would report back the identity of the user
Resulted in the arrests of the owner, and many of the consumers
The Silk Road marketplace was reportedly identified through
a non-anonymized captcha
Freedom Hosting
Silk Road
28
Child sex abuse marketplace
More than 8 terabytes of data
Used bitcoin – 7,300 recorded transactions from
more than 1 million user addresses
UK National Crime Agency used BitCoin
transaction analysis to identify users
Arrests of 337 users made in 38 countries
23 abused children identified and rescued
Abusers found, not by using offensive hacking, but by simply tracing bitcoin transactions
Welcome To Video
29
Dark Web Markets
Silk Road
Data leaked via
CAPTCHA
US DEA and FBI
June 2013
Silk Road 2.0
Bitcoin
Vulnerability
FBI & Europol
Nov 2014
AlphaBay
Email address
leakage
July 2017
Dream Market
Sustained DDoS
Attacks?
March 2019
Wall Street
Market
Careless use of
VPN
Europol
May 2019
Deepdotweb.com
Dark web links site
Taken down because of
links to illegal markets
FBI, Europol, NCA
May 2019
Hansa
Addresses leaked
in IRC logs
Operation
Bayonet
(multinational law
enforcement)
Detection and Protection
31
Case 1: Employees access dark web sites
32
Case 2: Employees hosting dark web sites
33
Case 3: Anonymous external reconnaisance
34
Several sites provide the list in convenient form:
https://check.torproject.org/exit-addresses (exit nodes only)
https://www.dan.me.uk/tornodes (exit only, or all relays)
http://blutmagie.de (exit only, or all relays)
Security vendors often have automatically-updated node lists built in to their solutions.
Tor Detection by RelayAddresses
35
Good news: It is possible to detect the Tor protocol
Not so good news: Tor provides explicit means to avoid being detected
Fortinet has built-in application detection of Tor, I2P, FreeNet, and others, as well as
popular proxy applications such as Psiphon and Ultrasurf.
Tor does makes it possible to use private relay nodes and personalized transport protocols
which can make detection close to impossible.
However, in practice, there are many associated difficulties with these techniques.
Detection by Protocol
36
• Dark web is more about the technology than the content
• Much of the content is legal and legitimate
• Tor is by far the most popular access technology
• It is very difficult to make a site 100% anonymous
• The dark web can present a risk to legitimate users and companies
• Simple security measures can deter all but the most determined attackers
Key Takeaways
Come and see us at stand 14

More Related Content

PPTX
Dark web presentation
PDF
ABOUT DARK WEB
PPTX
Introduction To Dark Web
ODP
The Deep and Dark Web
PPTX
The Dark side of the Web
PPTX
Dark and Deep web
PPTX
The Dark Web
PPTX
Dark web
Dark web presentation
ABOUT DARK WEB
Introduction To Dark Web
The Deep and Dark Web
The Dark side of the Web
Dark and Deep web
The Dark Web
Dark web

What's hot (20)

PPTX
The Dark Web
PPTX
The dark web
PPTX
Journey To The Dark Web
PPTX
Dark Web and Privacy
PPTX
Deep and Dark Web
PPTX
The Deep Web, TOR Network and Internet Anonymity
PPTX
The dark web
PPTX
Dark web by Pranesh Kulkarni
PPTX
Investigating Using the Dark Web
PPTX
Dark web
PPTX
Dark Web
PPTX
Deepweb and darkweb vinodkumar ancha
PPTX
The Dark Web
PPTX
Dark net
PPTX
Dark wed
PPTX
PPT dark web
PPTX
Cybersecurity and the DarkNet
PPTX
Deep Web - what to do and what not to do
PPTX
The surface web, deep web and dark web - Internet resources beyond Google
PPT
All about Hacking
The Dark Web
The dark web
Journey To The Dark Web
Dark Web and Privacy
Deep and Dark Web
The Deep Web, TOR Network and Internet Anonymity
The dark web
Dark web by Pranesh Kulkarni
Investigating Using the Dark Web
Dark web
Dark Web
Deepweb and darkweb vinodkumar ancha
The Dark Web
Dark net
Dark wed
PPT dark web
Cybersecurity and the DarkNet
Deep Web - what to do and what not to do
The surface web, deep web and dark web - Internet resources beyond Google
All about Hacking
Ad

Similar to Illuminating the dark web (20)

PPTX
The Dark Web : Hidden Services
PPT
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
PPTX
Tor: The Second Generation Onion Router
PPTX
Tor Project and The Darknet
PPTX
.Onion
PPTX
Dark Web.pptx
PPTX
Deep web, the unIndexed web
PPTX
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
PPTX
PDF
PPTX
Research in the deep web
PPTX
Introduction to anonymity network tor
PDF
Anonymity Network TOR
PPTX
Deep web (amatuer level)
PDF
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
PDF
Dark Web Presentation - 1.pdf about internet which will help you to get to kn...
PPTX
My darkweb-presentation
PPTX
Анонимность Tor: миф и реальность
PPTX
Tor network seminar by 13504
The Dark Web : Hidden Services
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Tor: The Second Generation Onion Router
Tor Project and The Darknet
.Onion
Dark Web.pptx
Deep web, the unIndexed web
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Research in the deep web
Introduction to anonymity network tor
Anonymity Network TOR
Deep web (amatuer level)
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Dark Web Presentation - 1.pdf about internet which will help you to get to kn...
My darkweb-presentation
Анонимность Tor: миф и реальность
Tor network seminar by 13504
Ad

More from Jisc (20)

PPTX
Strengthening open access through collaboration: building connections with OP...
PPTX
Andrew-Brown-JUSP-showcase-20240730.pptx
PPTX
JUSP Showcase - Rebuilding Data presentation
PPTX
Adobe Express Engagement Webinar (Delegate).pptx
PPTX
FE Accessibility training matrix partnership - information session
PPTX
Procuring a research management system: why is it so hard?
PPTX
Adobe Express Engagement Webinar (Delegate).pptx
PPTX
How libraries can support authors with open access requirements for UKRI fund...
PPTX
Supporting (UKRI) OA monographs at Salford.pptx
PPTX
The approach at University of Liverpool.pptx
PPTX
Jisc's value to HE: the University of Sheffield
PPTX
Towards a code of practice for AI in AT.pptx
PPTX
Jamworks pilot and AI at Jisc (20/03/2024)
PPTX
Wellbeing inclusion and digital dystopias.pptx
PPTX
Accessible Digital Futures project (20/03/2024)
PPTX
Procuring digital preservation CAN be quick and painless with our new dynamic...
PPTX
International students’ digital experience: understanding and mitigating the ...
PPTX
Digital Storytelling Community Launch!.pptx
PPTX
Open Access book publishing understanding your options (1).pptx
PPTX
Scottish Universities Press supporting authors with requirements for open acc...
Strengthening open access through collaboration: building connections with OP...
Andrew-Brown-JUSP-showcase-20240730.pptx
JUSP Showcase - Rebuilding Data presentation
Adobe Express Engagement Webinar (Delegate).pptx
FE Accessibility training matrix partnership - information session
Procuring a research management system: why is it so hard?
Adobe Express Engagement Webinar (Delegate).pptx
How libraries can support authors with open access requirements for UKRI fund...
Supporting (UKRI) OA monographs at Salford.pptx
The approach at University of Liverpool.pptx
Jisc's value to HE: the University of Sheffield
Towards a code of practice for AI in AT.pptx
Jamworks pilot and AI at Jisc (20/03/2024)
Wellbeing inclusion and digital dystopias.pptx
Accessible Digital Futures project (20/03/2024)
Procuring digital preservation CAN be quick and painless with our new dynamic...
International students’ digital experience: understanding and mitigating the ...
Digital Storytelling Community Launch!.pptx
Open Access book publishing understanding your options (1).pptx
Scottish Universities Press supporting authors with requirements for open acc...

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
A Presentation on Artificial Intelligence
PPT
Teaching material agriculture food technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Weekly Chronicles - August'25 Week I
“AI and Expert System Decision Support & Business Intelligence Systems”
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Per capita expenditure prediction using model stacking based on satellite ima...
Big Data Technologies - Introduction.pptx
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A Presentation on Artificial Intelligence
Teaching material agriculture food technology
Dropbox Q2 2025 Financial Results & Investor Presentation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Illuminating the dark web

  • 1. 1 Illuminating the Dark Web Simon Bryden Consulting Systems Engineer, EMEA
  • 2. 2 Introduction to the dark web The Onion Router and Hidden Services Dark Web Takedowns Protecting yourself from the dark web Illuminating the Dark Web
  • 4. 4 Protected by authentication layer or paywall Not linked from any other pages Not referenced by search engines Deep Web characteristics
  • 5. 5 Anonymous Special access software Associated with illegal activities Dark Web characteristics
  • 6. 6 Illegal content Illegal marketplaces Cybercrime services Cryptocurrency services What can be found on the Dark Web?
  • 7. 7
  • 8. 8
  • 9. 9
  • 10. 10 Journalism Legal markets Social Media Repressed minorities Legal dark web services
  • 12. 12 • Based on technology developed by the US Naval Research Laboratory in 1990s • Designed to protect US intelligence communications online • Tor project launched in 2002, first public release in 2004 • The Tor Project Inc. launched in 2006 as a non-profit organisation What is Tor?
  • 13. 13 Tor can provide two levels of anonymity: Anonymous access to surface web services • The Tor network provides an anonymous access through the Tor network. • The Tor network “exit node” connects to the surface web server Anonymous access to hidden services • The Tor network provides complete end-to-end anonymity • Hides the identity of both client and server How muchAnonymity does Tor Provide?
  • 14. 14
  • 15. 15
  • 16. 16 How Anonymous? “Alice is using the Tor service” Tor relay nodes are publicly known “Someone is connecting to Bob from the Tor network” “We can see this traffic”
  • 17. 17 How Anonymous? “Alice is using a VPN service” HTTPS VPN Provider “Someone is connecting to Bob from the Tor network”
  • 19. 19 Volunteers. Often universities and other institutions Most people host Relay or Guard (Entry) nodes Nodes cannot become guards unless they are stable, and have at least 2Mbytes/s bandwidth Running an Exit node opens up the potential of receiving abuse complaints Exit nodes are often blocked by providers or website owners Who Owns the Tor Nodes?
  • 20. 20 Where are the relays? Germany UK Netherlands USA France
  • 22. 22 • Hidden services provide anonymity for the server • Servers are identified by an onion address such as 4nrvt5xpejyo27zf.onion • These are not resolved by DNS, rather by the Tor network itself • Most importantly: • There is no link between server name and server address Tor Hidden Services
  • 23. 23 Tor Hidden Service Operation RP
  • 26. 26 • It’s more than just Tor! • Payment methods • Delivery of goods • All other system tools and applications must be anonymized • Ancillary communications (forgotten passwords, tech support) • Web services platforms (Wordpress, Joomla etc. are full of vulnerabilities) Perfect anonymity is Difficult
  • 27. 27 In 2013, the FBI managed to infiltrate “Freedom Hosting”, a hosting operation serving child pornography sites It inserted an exploit kit which targeted a vulnerability in Firefox 17 (used in Tor browser) This resulted in the download of a file which would report back the identity of the user Resulted in the arrests of the owner, and many of the consumers The Silk Road marketplace was reportedly identified through a non-anonymized captcha Freedom Hosting Silk Road
  • 28. 28 Child sex abuse marketplace More than 8 terabytes of data Used bitcoin – 7,300 recorded transactions from more than 1 million user addresses UK National Crime Agency used BitCoin transaction analysis to identify users Arrests of 337 users made in 38 countries 23 abused children identified and rescued Abusers found, not by using offensive hacking, but by simply tracing bitcoin transactions Welcome To Video
  • 29. 29 Dark Web Markets Silk Road Data leaked via CAPTCHA US DEA and FBI June 2013 Silk Road 2.0 Bitcoin Vulnerability FBI & Europol Nov 2014 AlphaBay Email address leakage July 2017 Dream Market Sustained DDoS Attacks? March 2019 Wall Street Market Careless use of VPN Europol May 2019 Deepdotweb.com Dark web links site Taken down because of links to illegal markets FBI, Europol, NCA May 2019 Hansa Addresses leaked in IRC logs Operation Bayonet (multinational law enforcement)
  • 31. 31 Case 1: Employees access dark web sites
  • 32. 32 Case 2: Employees hosting dark web sites
  • 33. 33 Case 3: Anonymous external reconnaisance
  • 34. 34 Several sites provide the list in convenient form: https://check.torproject.org/exit-addresses (exit nodes only) https://www.dan.me.uk/tornodes (exit only, or all relays) http://blutmagie.de (exit only, or all relays) Security vendors often have automatically-updated node lists built in to their solutions. Tor Detection by RelayAddresses
  • 35. 35 Good news: It is possible to detect the Tor protocol Not so good news: Tor provides explicit means to avoid being detected Fortinet has built-in application detection of Tor, I2P, FreeNet, and others, as well as popular proxy applications such as Psiphon and Ultrasurf. Tor does makes it possible to use private relay nodes and personalized transport protocols which can make detection close to impossible. However, in practice, there are many associated difficulties with these techniques. Detection by Protocol
  • 36. 36 • Dark web is more about the technology than the content • Much of the content is legal and legitimate • Tor is by far the most popular access technology • It is very difficult to make a site 100% anonymous • The dark web can present a risk to legitimate users and companies • Simple security measures can deter all but the most determined attackers Key Takeaways
  • 37. Come and see us at stand 14