SlideShare a Scribd company logo
Investigating Using the Dark Web
Chad Los Schumacher, Team Lead, iThreat Cyber Group
Introduction
• About Chad Los Schumacher
• Project manager and DNS investigator at iThreat Cyber Group
• MS in Intelligence Analysis from Mercyhurst University
• Has trained international LE, at conferences, and more
• About iThreat Cyber Group
• Assist clients in with intelligence programs
• Provide tech enhanced services, enhanced data services, and SaaS
• Founded in 1997 in Princeton, New Jersey
Have you used Tor/the Dark Web?
a. Yes, and I’m familiar.
b. Yes, a few times.
c. No, but I’ve seen it used.
d. No, and I have no experience.
Quick Poll
Session Objectives
• Define what the dark web is
• Locate common hubs and key resources
• Introduce tools/methods for unmasking dark web sites
Warning…
• The dark web is filled with some awful things that cannot be
unseen
• Ask yourself if this is really the job for you before starting
• Review the risk/reward as it may create other headaches
Understanding the
Parts of the Web
Deep web:
Information that
is more hidden
or restricted,
such as
academic
databases,
newspaper
archives, etc.
Surface web:
Where most of
your day-to-day
activity takes
place, sites visible
to search engines.
Dark web: Internet
within an internet,
designed to be
anonymous and
obfuscated
Key Differences
• Requires special software to access, an Internet within an
Internet
• Resistant to indexing, not easily searched
• Indices are similar to Yahoo! in 1995 (Directories vs. Search
Engine)
• Communications within the network are always encrypted
Uses for the Dark Web
For better…
• To circumvent government
censorship
• To provide whistleblowers
protection
• To avoid monitoring
For worse…
• Enables sales of illegal
firearms, drugs, counterfeits,
etc.
• Human exploitation (porn,
trafficking, etc).
• Hire hitmen, hackers, etc.
Three Major Dark Webs
• The Onion Router (Tor) - Focus for this presentation
• The biggest, most well known dark web.
• Most Internet-like
• Invisible Internet Project (I2P)
• Up and coming
• Focuses on services (ie: instant messaging, email, websites, etc).
• Freenet
• Distributed file sharing
• Offers communications
How Tor Works
About .onion Sites
• Can only be accessed when using Tor
• No master database of all .onion sites
• Use of Tor allows for the creation of .onion sites
• Domains are randomly generated, either 16 or 56 characters
long
Challenges with Tor
Investigations
• The network was designed to provide anonymity
• Best chance at unmasking means finding a clear web
connections
• They don’t take PayPal, so be ready for Bitcoin
• Accounts need to be anonymized and not tied to your person
• There’s no Google, so you may not find what you’re after
• Cultural distrust of others
WHERE TO BEGIN
Locating Starting Points & Accessing
Google It!
• Using Google/Bing provide excellent
list of starting points
• Reddit, Twitter discuss dark web
markets in open (r/deepweb)
• Dedicated sites in open web help
new users find dark web markets
(deepdotweb.com,
darkwebnews.com)
• May have to get into deep web to
find other markets
Deepdotweb.com
Searching the “Search
Engines”
• Several Tor “search engines”
exist that claim to scan/index Tor
sites
• Each use their own techniques
• Nowhere near the
power/sophistication of Google,
Yahoo, etc
• Typically unreliable – data can be
stale
• Biggest names: ahmia.fi and
Torch Tor Search Engine
Other Lists/Resources
• Hunchly Daily Hidden Service
• New .onions found daily by Justin Seitz at Hunchly –
darkweb.hunch.ly
• Reddit
• https://www.reddit.com/r/onions/search?q=url%3A.onion&
sort=new&restrict_sr=on
Two Fast Ways to Access
Tor Browser
• Developed by Tor Project
• Custom version of Firefox
• Provides plugins and tips to
keep you anonymous
• This is the best/safest
option
Tor2Web Gateways
• Add .to, .casa, .direct, or .rip
to access Onion sites directly
• These are often run by
individuals or organizations
• It is unclear what some are
doing with the data
(especially .link)
• Use with caution!
• Ex:
facebookcorewwwi.onion.to
BRINGING THE DARK TO THE
LIGHT
Techniques and Tools
Find Clear Web Mentions
• Do you see any of the following referenced?
• A clear web domain (example.com, example.net, etc)
• A social media account like Facebook or Twitter
• A clear web email (Gmail, Hotmail, or other custom domain)
• Payment methods like PayPal, Venmo, Zelle, etc.
• Right click on the page and select “View Page Source”
• Search the page for .com, .net, @gmail.com, etc for potential hidden
links
• Webmasters may make mistakes and point to a clear web domain
instead of a .onion
These data points are present more often than you
think!
Examples of Clear
Connections
psychonaut3z5aoz.onion a9a19b3635191ebe97b9d3f61addc93a.endcha
n5doxvprs5.onion
Do Not Underestimate This!
• Ross Ulbricht advertised Silk Road on a bitcoin forum – a
breakthrough discovered by a tax investigator using Google
• Vanity Jones, a major player on Silk Road, was ousted as Thomas
Clark when his identity discovered on an old cannabis forum
• David Ryan Burchard attempted to trademark his brand of marijuana
sold on the dark web in his name
Leaking IP Address with
Censys.io
• Service scans IP address space for running services and makes it
searchable by domain or IP address
• Entering a .onion can return an IP if a server is misconfigured
Example of Leaking .onion
Check for Sites on the Same
Server
• Only works for sites running Apache web server
• Visiting example.onion/server-status can reveal:
• Server information (operating system, uptime status,
creation date)
• Other domains using the same server
• IP addresses accessing the server
• What resources (pages, images, etc) are being accessed
Example Apache Server Status
Page
In Conclusion
• Covered definitions of the dark web, how Tor works
• Reviewed where to find dark web sites and resources
• Provided resources and ways to potentially de-anonymize a .onion
Thank you for participating
Contact Chad Los Schumacher
cls@icginc.com / inquiries@icginc.com
@itisjustchad
https://www.linkedin.com/in/chadls/
Contact i-Sight
j.gerard@i-sight.com
Find more free webinars:
http://www.i-sight.com/resources/webinars
@isightsoftware

More Related Content

PDF
What is Open Source Intelligence (OSINT)
PDF
Dark Web Forensics
PPTX
The Dark Web : Hidden Services
PDF
dark-web-and-cybercrime.pdf
PPTX
Dark net
PDF
OSINT with Practical: Real Life Examples
PDF
PPTX
Dark web
What is Open Source Intelligence (OSINT)
Dark Web Forensics
The Dark Web : Hidden Services
dark-web-and-cybercrime.pdf
Dark net
OSINT with Practical: Real Life Examples
Dark web

What's hot (20)

ODP
The Deep and Dark Web
PPTX
The dark web
PPTX
The Dark Web
PPTX
Journey To The Dark Web
PPTX
Deepweb and darkweb vinodkumar ancha
PPTX
Dark web by Claudine Impas
PPTX
Deep Web - what to do and what not to do
PPTX
Dark Web and Privacy
PPTX
The Dark side of the Web
PPTX
The Dark Web
PPTX
The Deep Web, TOR Network and Internet Anonymity
PPTX
Dark web presentation
PPTX
Illuminating the dark web
PPTX
Guide to dark web
PPTX
osint - open source Intelligence
PPTX
Cyber-Espionage: Understanding the Advanced Threat Landscape
PPTX
Osint {open source intelligence }
PPTX
Social Media Cyber Security Awareness Briefing
PDF
The Deep and Dark Web
The dark web
The Dark Web
Journey To The Dark Web
Deepweb and darkweb vinodkumar ancha
Dark web by Claudine Impas
Deep Web - what to do and what not to do
Dark Web and Privacy
The Dark side of the Web
The Dark Web
The Deep Web, TOR Network and Internet Anonymity
Dark web presentation
Illuminating the dark web
Guide to dark web
osint - open source Intelligence
Cyber-Espionage: Understanding the Advanced Threat Landscape
Osint {open source intelligence }
Social Media Cyber Security Awareness Briefing
Ad

Similar to Investigating Using the Dark Web (20)

PPTX
Dark web technology based ppt for power pt
PDF
Deeplight Intelliagg
PPTX
Dark Web
PPTX
Osint - Dark side of Internet
PPTX
Deep Web
PPTX
Getting started with using the Dark Web for OSINT investigations
PDF
Introduction to Deep Web
PPTX
Cyber crime- a case study
PDF
Understanding the Tor Network and Exploring the Deep Web
PPTX
Dark Web.pptx
PPTX
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
PPTX
Research in the deep web
PPTX
PPTX
The Hidden Web
PPTX
Introduction to DARK WEB_students 2023.pptx
PPTX
Deep web (amatuer level)
PPT
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
PPTX
Introduction To Dark Web
PPTX
Invisible Web
PDF
ABOUT DARK WEB
Dark web technology based ppt for power pt
Deeplight Intelliagg
Dark Web
Osint - Dark side of Internet
Deep Web
Getting started with using the Dark Web for OSINT investigations
Introduction to Deep Web
Cyber crime- a case study
Understanding the Tor Network and Exploring the Deep Web
Dark Web.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Research in the deep web
The Hidden Web
Introduction to DARK WEB_students 2023.pptx
Deep web (amatuer level)
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Introduction To Dark Web
Invisible Web
ABOUT DARK WEB
Ad

More from Case IQ (20)

PPTX
How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
PPTX
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
PPTX
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
PPTX
Protecting the Mental Wellbeing of Corporate Investigators
PPTX
Meric Bloc_Webinar Nov22.pptx
PPTX
5 Steps to Creating an Ethical Work Culture
PPTX
How to Assess, Level Up, and Leverage Your Culture of Compliance
PPTX
Everything You Need to Get E&C Investigations Right (According to the DOJ)
PPTX
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
PPTX
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
PPTX
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
PPTX
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
PPTX
What is Psychological Safety in the Workplace?
PPTX
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
PPTX
Building Effective Sexual Harassment Prevention Policies and Training
PPTX
How to recognize and minimize unconscious bias in the workplace
PPTX
Search Engine Skills for Workplace Investigators
PPTX
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
PPTX
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
PPTX
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Protecting the Mental Wellbeing of Corporate Investigators
Meric Bloc_Webinar Nov22.pptx
5 Steps to Creating an Ethical Work Culture
How to Assess, Level Up, and Leverage Your Culture of Compliance
Everything You Need to Get E&C Investigations Right (According to the DOJ)
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
What is Psychological Safety in the Workplace?
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Building Effective Sexual Harassment Prevention Policies and Training
How to recognize and minimize unconscious bias in the workplace
Search Engine Skills for Workplace Investigators
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PDF
KodekX | Application Modernization Development
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Chapter 3 Spatial Domain Image Processing.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
NewMind AI Weekly Chronicles - August'25 Week I
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
Empathic Computing: Creating Shared Understanding
Digital-Transformation-Roadmap-for-Companies.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
KodekX | Application Modernization Development
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...

Investigating Using the Dark Web

  • 1. Investigating Using the Dark Web Chad Los Schumacher, Team Lead, iThreat Cyber Group
  • 2. Introduction • About Chad Los Schumacher • Project manager and DNS investigator at iThreat Cyber Group • MS in Intelligence Analysis from Mercyhurst University • Has trained international LE, at conferences, and more • About iThreat Cyber Group • Assist clients in with intelligence programs • Provide tech enhanced services, enhanced data services, and SaaS • Founded in 1997 in Princeton, New Jersey
  • 3. Have you used Tor/the Dark Web? a. Yes, and I’m familiar. b. Yes, a few times. c. No, but I’ve seen it used. d. No, and I have no experience. Quick Poll
  • 4. Session Objectives • Define what the dark web is • Locate common hubs and key resources • Introduce tools/methods for unmasking dark web sites
  • 5. Warning… • The dark web is filled with some awful things that cannot be unseen • Ask yourself if this is really the job for you before starting • Review the risk/reward as it may create other headaches
  • 6. Understanding the Parts of the Web Deep web: Information that is more hidden or restricted, such as academic databases, newspaper archives, etc. Surface web: Where most of your day-to-day activity takes place, sites visible to search engines. Dark web: Internet within an internet, designed to be anonymous and obfuscated
  • 7. Key Differences • Requires special software to access, an Internet within an Internet • Resistant to indexing, not easily searched • Indices are similar to Yahoo! in 1995 (Directories vs. Search Engine) • Communications within the network are always encrypted
  • 8. Uses for the Dark Web For better… • To circumvent government censorship • To provide whistleblowers protection • To avoid monitoring For worse… • Enables sales of illegal firearms, drugs, counterfeits, etc. • Human exploitation (porn, trafficking, etc). • Hire hitmen, hackers, etc.
  • 9. Three Major Dark Webs • The Onion Router (Tor) - Focus for this presentation • The biggest, most well known dark web. • Most Internet-like • Invisible Internet Project (I2P) • Up and coming • Focuses on services (ie: instant messaging, email, websites, etc). • Freenet • Distributed file sharing • Offers communications
  • 11. About .onion Sites • Can only be accessed when using Tor • No master database of all .onion sites • Use of Tor allows for the creation of .onion sites • Domains are randomly generated, either 16 or 56 characters long
  • 12. Challenges with Tor Investigations • The network was designed to provide anonymity • Best chance at unmasking means finding a clear web connections • They don’t take PayPal, so be ready for Bitcoin • Accounts need to be anonymized and not tied to your person • There’s no Google, so you may not find what you’re after • Cultural distrust of others
  • 13. WHERE TO BEGIN Locating Starting Points & Accessing
  • 14. Google It! • Using Google/Bing provide excellent list of starting points • Reddit, Twitter discuss dark web markets in open (r/deepweb) • Dedicated sites in open web help new users find dark web markets (deepdotweb.com, darkwebnews.com) • May have to get into deep web to find other markets Deepdotweb.com
  • 15. Searching the “Search Engines” • Several Tor “search engines” exist that claim to scan/index Tor sites • Each use their own techniques • Nowhere near the power/sophistication of Google, Yahoo, etc • Typically unreliable – data can be stale • Biggest names: ahmia.fi and Torch Tor Search Engine
  • 16. Other Lists/Resources • Hunchly Daily Hidden Service • New .onions found daily by Justin Seitz at Hunchly – darkweb.hunch.ly • Reddit • https://www.reddit.com/r/onions/search?q=url%3A.onion& sort=new&restrict_sr=on
  • 17. Two Fast Ways to Access Tor Browser • Developed by Tor Project • Custom version of Firefox • Provides plugins and tips to keep you anonymous • This is the best/safest option Tor2Web Gateways • Add .to, .casa, .direct, or .rip to access Onion sites directly • These are often run by individuals or organizations • It is unclear what some are doing with the data (especially .link) • Use with caution! • Ex: facebookcorewwwi.onion.to
  • 18. BRINGING THE DARK TO THE LIGHT Techniques and Tools
  • 19. Find Clear Web Mentions • Do you see any of the following referenced? • A clear web domain (example.com, example.net, etc) • A social media account like Facebook or Twitter • A clear web email (Gmail, Hotmail, or other custom domain) • Payment methods like PayPal, Venmo, Zelle, etc. • Right click on the page and select “View Page Source” • Search the page for .com, .net, @gmail.com, etc for potential hidden links • Webmasters may make mistakes and point to a clear web domain instead of a .onion These data points are present more often than you think!
  • 20. Examples of Clear Connections psychonaut3z5aoz.onion a9a19b3635191ebe97b9d3f61addc93a.endcha n5doxvprs5.onion
  • 21. Do Not Underestimate This! • Ross Ulbricht advertised Silk Road on a bitcoin forum – a breakthrough discovered by a tax investigator using Google • Vanity Jones, a major player on Silk Road, was ousted as Thomas Clark when his identity discovered on an old cannabis forum • David Ryan Burchard attempted to trademark his brand of marijuana sold on the dark web in his name
  • 22. Leaking IP Address with Censys.io • Service scans IP address space for running services and makes it searchable by domain or IP address • Entering a .onion can return an IP if a server is misconfigured
  • 24. Check for Sites on the Same Server • Only works for sites running Apache web server • Visiting example.onion/server-status can reveal: • Server information (operating system, uptime status, creation date) • Other domains using the same server • IP addresses accessing the server • What resources (pages, images, etc) are being accessed
  • 25. Example Apache Server Status Page
  • 26. In Conclusion • Covered definitions of the dark web, how Tor works • Reviewed where to find dark web sites and resources • Provided resources and ways to potentially de-anonymize a .onion
  • 27. Thank you for participating Contact Chad Los Schumacher cls@icginc.com / inquiries@icginc.com @itisjustchad https://www.linkedin.com/in/chadls/ Contact i-Sight j.gerard@i-sight.com Find more free webinars: http://www.i-sight.com/resources/webinars @isightsoftware

Editor's Notes

  • #3: Introduction of myself and iThreat. Overview for iThreat: We assist companies in their intelligence programs no matter where they are in their program. We do everything from supplying data and alerts to embedding analysts part or full time and have software that can make the management of data easier. Our key services with this include monitoring and investigations.
  • #7: Graphic: https://i1.wp.com/techlog360.com/wp-content/uploads/2017/04/Darknet-vs-Dark-Web-vs-Deep-Web-vs-Surface-Web.jpg?fit=900%2C500&ssl=1 Discuss what the dark web is, some of the software used (Tor being the biggest), and show how it fits into the iceberg image. Freenet is a peer-to-peer platform for censorship-resistant communication and publishing. I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review.
  • #11: Quick overview of how Tor works. Traffic entering and within the network is encrypted Traffic exiting the network is unencrypted, but is meaningless to the operator of the exit node The same route is never taken twice