Download presentation
Presentation is loading. Please wait.
Published byRudolph Evans Modified over 8 years ago
1
www.techshow.com #ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda Sexton: @AmandaLSexton
2
www.techshow.com #ABATECHSHOW The Surface Web 2
3
www.techshow.com #ABATECHSHOW Indexed vs. Non-Indexed 3 Crawl Robot.txt Index
4
www.techshow.com #ABATECHSHOW Deep Web Contents 4 Private web Dynamic content Unlinked content Scripted content Limited access content Databases
5
www.techshow.com #ABATECHSHOW Searching the Deep Web
6
www.techshow.com #ABATECHSHOW Finding Information Databases Government sites
7
www.techshow.com #ABATECHSHOW Government Public Records
8
www.techshow.com #ABATECHSHOW Government Public Records
9
www.techshow.com #ABATECHSHOW Actionable Intelligence Define the information that revolves around the individual: Friends Family Neighbors Job Activities Social Platforms
10
www.techshow.com #ABATECHSHOW Social Media Algorithms & software Open Source Intelligence (OSINT)
11
www.techshow.com #ABATECHSHOW Facial Recognition
12
www.techshow.com #ABATECHSHOW Boolean Searches “” quotes around subject matter Run correct search patterns on addresses, phone numbers, email addresses and usernames Filetype/site specific searching
13
www.techshow.com #ABATECHSHOW Dark Web Myths 13 X Full of only terrible, terrible things X Automatically on a watch list X Tor will completely protect your online privacy
14
www.techshow.com #ABATECHSHOW Is the Dark Web legal? YES!
15
www.techshow.com #ABATECHSHOW Dark Web Realities Only accessible using special browser software Protects anonymity and privacy
16
www.techshow.com #ABATECHSHOW BitTorrent vs. Dark Web P2P File sharing Searchable Internet data distribution Not anonymous File “chunks”
17
www.techshow.com #ABATECHSHOW Connecting to the Darknet Tor I2P Freenet
18
www.techshow.com #ABATECHSHOW Tor Browser
19
www.techshow.com #ABATECHSHOW Tor T – The O – Onion R – Router Application layer encryption Relays decrypt next hop in circuit Final relay decrypts data
20
www.techshow.com #ABATECHSHOW How Tor Works
21
www.techshow.com #ABATECHSHOW Tor Circuit Randomized
22
www.techshow.com #ABATECHSHOW Tor Metrics https://metrics.torproject.org/ Relays and bridges Direct users by country Hidden-service traffic Data flow Unique.onion addresses
23
www.techshow.com #ABATECHSHOW Unique.onion addresses
24
www.techshow.com #ABATECHSHOW Onions & Getting to Sites
25
www.techshow.com #ABATECHSHOW Pros of the Dark Web Anonymity Protection for: –Journalists –Dissidents –Whistleblowers
26
www.techshow.com #ABATECHSHOW Risks of the Dark Web Discovery Malicious code Entrance/exit nodes
27
www.techshow.com #ABATECHSHOW Entrance/Exit Nodes
28
www.techshow.com #ABATECHSHOW Illegal Activity Gun sales Drugs Sex trafficking Hit for hire
29
www.techshow.com #ABATECHSHOW Silk Road
30
www.techshow.com #ABATECHSHOW Darknet E-mail
31
www.techshow.com #ABATECHSHOW Hidden Links
32
www.techshow.com #ABATECHSHOW Stolen Credit Cards
33
www.techshow.com #ABATECHSHOW Drugs
34
www.techshow.com #ABATECHSHOW FBI & Carnegie Mellon
35
www.techshow.com #ABATECHSHOW Best Practices Cookies JavaScript Privacy settings
36
www.techshow.com #ABATECHSHOW Best Practices Filesharing/downloading Printing
37
www.techshow.com #ABATECHSHOW Extra Layers of Protection Virtual Private Networks Spoofing MAC address Proxy Encryption
38
www.techshow.com #ABATECHSHOW Bitcoin and the Dark Web
39
www.techshow.com #ABATECHSHOW How It Works Blockchain Mining
40
www.techshow.com #ABATECHSHOW Digital Wallets Desktop Mobile Online Hardware Paper Multi-sig
41
www.techshow.com #ABATECHSHOW Bitcoin Currency conversion Buy/sell Volatility Legality
42
www.techshow.com #ABATECHSHOW Bitcoin Tumbling
43
www.techshow.com #ABATECHSHOW SAVE THE DATE! March 17-19, 2016
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.