Many dark web constructs. The most notorious/popular is Tor/Onion.

Slides:



Advertisements
Similar presentations
Network Security.
Advertisements

Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Networks. ProtocolMeaningApplication DNSDomain Name System (Server)Translates domain names such as ocr.org.uk into IP Addresses TLS/SSLTransport Layer.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
TCP/IP (Transmission Control Protocol / Internet Protocol)
SSL. Why Is Security Important ●Security is important on E-Commerce because it makes sure that your information gets from your computer to their server.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
How Information Flows via the Internet By: Lee Farrell.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
FOOTPRINTING PROXY A proxy server is essentially a middle computer that sits between the attacker and the Victim. To mask your ip under a proxy server.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Network System Security - Task 2. Russell Johnston.
Presented by Martin Šimek Ransomware, Internet of Things and Botnets vs. Control.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
VCE IT Theory Slideshows
Instructor Materials Chapter 5 Providing Network Services
Hotspot Shield Protect Your Online Identity
Computer Networks.
SSL Certificates for Secure Websites
Level 2 Diploma Unit 11 IT Security
Chapter 8 Building the Transaction Database
Anonymous Communication
Security Fundamentals
CONTRA Camouflage of Network Traffic to Resist Attack (Intrusion Tolerance Using Masking, Redundancy and Dispersion) DARPA OASIS PI Meeting – Hilton Head.
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Virtual Private Networks
Networking for Home and Small Businesses – Chapter 6
ICT Communications Lesson 1: Using the Internet and the World Wide Web
Networking for Home and Small Businesses – Chapter 6
Man-in-the-Middle Attacks
Fix All Your Issues at Trezor Support Phone Number
Exercise ?: TOR.
Network Security: IP Spoofing and Firewall
Digital Pacman: Firewall Edition
Topic 5: Communication and the Internet
Privacy Through Anonymous Connection and Browsing
PPPoE Internet Point to Point Protocol over Ethernet
OCR GCSE Computing © Hodder Education 2013 Slide 1
Anonymous Communication
The Internet The World Wide Web and everything
Web Servers / Deployment
Chapter 3: Protecting Your Data and Privacy
Cengage Learning: Computer Networking from LANs to WANs
Networking for Home and Small Businesses – Chapter 6
The Internet: Encryption & Public Keys
Protocol Application TCP/IP Layer Model
was not invented by Al Gore…
Advanced Computer Networks
INFORMATION FLOW ACROSS THE INTERNET
Wireless Spoofing Attacks on Mobile Devices
Q/ Compare between HTTP & HTTPS? HTTP HTTPS
Anonymous Communication
Presentation transcript:

Many dark web constructs. The most notorious/popular is Tor/Onion. Built for anonymity. The home of criminals, black hat hackers… Trading Post for illicit software— Ransomware, hijacking, DDOS, phishing. Trading in stolen SS#s, credit card numbers, drugs, weapons, and people Visible web Deep web Dark web 9/24/2018

Phishing Expeditions Accumulate email addresses of website managers Send malware with key loggers Gain control of website – Install malware for ransomware ware aaomojomolo1979 aaomojomolo@hotmail.co.uk absolutezero641950 absolutezero64@hotmail.com achardt1966 achardt@outlook.com alexandraboies11976 alexandraboies1@hotmail.com allen.kong1964 allen.kong@hotmail.com altheapaul1981 altheapaul@hotmail.com andersonah5201994 andersonah520@hotmail.com andilila911995 andilila91@yahoo.co.id andreacohen42005 andreacohen4@hotmail.com andreacuyun231986 andreacuyun23@hotmail.com andrew.281957 andrew.28@live.co.uk andy.bt1985 andy.bt@live.com annlouiseberg2000 annlouiseberg@hotmail.com antalon2pbs1962 antalon2pbs@hotmail.com antoniod372000 antoniod37@hotmail.com ashley_m_mason1995 ashley_m_mason@hotmail.com bshepard8271969 bshepard827@msn.com bucketless581962 bucketless58@hotmail.com bzindler_881962 bzindler_88@hotmail.com 9/24/2018

http://lanetharp.com/?716=UAWDHGBuYKV1mQHTRQGZCQi emails 9/24/2018

http://cosmicregistry.org/?5d16r=UAWDHGBuYKV1mQHTRQGZCQi 9/24/2018

http://www. bluedot. co. za/l5afva/getnum. php http://www.bluedot.co.za/l5afva/getnum.php?id=ODA2NGtlbmdhYmVsbWFuQHNvZnRzdGQuY29tNTgyOA== 9/24/2018

http://cadillaclouisville.com/?8Si7jR=UAWDHGBuYKV1mQHTRQGZCQi 9/24/2018

http://jeffbigcountrycaldwell.org/?0KhP=UAWDHGBuYKV1mQHTRQGZCQi 9/24/2018

http://greatharvestbirmingham.com/?28G4gW=UAWDHGBuYKV1mQHTRQGZCQi 9/24/2018

http://www. bluedot. co. za/l5afva/getnum. php http://www.bluedot.co.za/l5afva/getnum.php?id=ODA2NGtlbmdhYmVsbWFuQHNvZnRzdGQuY29tNTgyOA== http://cadillaclouisville.com/?8Si7jR=UAWDHGBuYKV1mQHTRQGZCQi http://jeffbigcountrycaldwell.org/?0KhP=UAWDHGBuYKV1mQHTRQGZCQi http://volvolouisville.com/?04=UAWDHGBuYKV1mQHTRQGZCQi http://sanfordshuttles.com/?048m05=UAWDHGBuYKV1mQHTRQGZCQi http://cryptocurrencypaperwalletcertificate.info/?76=UAWDHGBuYKV1mQHTRQGZCQi http://xyz123web.com/?2A3=UAWDHGBuYKV1mQHTRQGZCQi http://titanapplied.com/?41Awq=UAWDHGBuYKV1mQHTRQGZCQi http://marketexposures.photos/?5aIR=UAWDHGBuYKV1mQHTRQGZCQi http://hostnana.com/?1UA=UAWDHGBuYKV1mQHTRQGZCQi http://www.ceobusiness.com.br/29hevlu/64fngu.php?a2VuZ2FiZWxtYW5Ac29mdHN0ZC5jb20 http://mahboobasif.com/?7u5g6K=UAWDHGBuYKV1mQHTRQGZCQi http://exumaanimalhospital.com/?0SEAU=UAWDHGBuYKV1mQHTRQGZCQi http://civicleagueyouth.com/?207=UAWDHGBuYKV1mQHTRQGZCQi http://wellnesscenterofnashville.com/?3O4382=UAWDHGBuYKV1mQHTRQGZCQi http://keithharenda.com/?68Tdyk=UAWDHGBuYKV1mQHTRQGZCQi http://greatharvestbirmingham.com/?28G4gW=UAWDHGBuYKV1mQHTRQGZCQi http://716chopshop.com/?43=UAWDHGBuYKV1mQHTRQGZCQi http://businessplanbenchmark.com/?0w2HE=UAWDHGBuYKV1mQHTRQGZCQi 9/24/2018

Pay Ransom With Bitcoin Wallet is a randomized ID holding private key. Blockchain is history of every transaction segmented by checksum- difficult to calculate, easy to verify. Two parties construct a transaction. Transaction could take hours to appear in blockchain. Your Bitcoin holdings is the sum of your transactions in the blockchain. 9/24/2018

How you can be Identified and surveilled ISP DHCP server assigns you a unique IP number 72.135.35.66 mfg MAC address is required by ISP 2C7E81CBDA43 MAC used in 802 Wi-Fi protocols ISP assigns users a DNS server Authorities can tap the user connection at the switch 9/24/2018

Overcoming ID and Surveillance HTTPS Origin/destination are exposed vulnerable to man-in-the-middle attacks (third party DNS server) VPN protocol minimum destination header – origin protected transport and application layer protected Proxy server varying levels of protection destination usually informed of proxy in progress Public Internet-Wi-Fi passwords are simple to break ID usually limited to physical signal boosting techniques Ghosting a MAC address MAC address as a fingerprint 9/24/2018

MS .NET RNGenerator Distribution Test Standard deviation 100K 06.248 150K 07.442 200K 08.621 250K 09.704 300K 10.466 350K 11.258 400K 12.021 450K 12.785 500K 13.661 3C703E596F7520636F756C642074656C6C20616C6C206F6620796F757220667269656E647320616E642066616D696C792 9/24/2018

Tor/Onion http://nql7pv7k32nnqor2.onion Most popular of several dark constructs version of Firefox/Chrome roots back to Mosaic Any ability to ID user or activity is stripped out. Multiple levels of encryption Proprietary “DNS” service Google cannot/will not index it. Not quite HTML/HTTP Packets are sent through at least 3 relays before the destination. Surveillance won’t see final destination http://nql7pv7k32nnqor2.onion 9/24/2018

Secure eMail Addresses To register on most onion sites require a secure email address Unlike surface web – these providers promote anonymity ProtonMail Torbox Mail2Tor 9/24/2018