+ All Categories
Home > Documents > The Deep Web -- From Spooky to Creepy

The Deep Web -- From Spooky to Creepy

Date post: 17-Jun-2015
Category:
Upload: nicholas-davis
View: 434 times
Download: 0 times
Share this document with a friend
Description:
A spooky presentation about the Deep Web. Deep Web (also called the Deepnet,Invisible Web, or Hidden Web) is World Wide Web content that is not part of the Surface Web, which is indexed by standard search engines. It should not be confused with the dark Internet, the computers that can no longer be reached via the Internet, or with a Darknet distributed filesharing network, which could be classified as a smaller part of the Deep Web. Some prosecutors and government agencies think that the Deep Web is a haven for serious criminality.[4]
Popular Tags:
49
Wisconsin Union Directorate The Deep Web—From Spooky to Creepy Presented by Nicholas Davis, CISSP, CISA
Transcript
Page 1: The Deep Web -- From Spooky to Creepy

Wisconsin Union DirectorateThe Deep Web—From Spooky to

CreepyPresented by Nicholas Davis, CISSP,

CISA

Page 2: The Deep Web -- From Spooky to Creepy

This presentation contains explicit content, which some people may find

offensive.The examples shown do not represent

my views or opinions, and are used for demonstration only.

I do not endorse the use of the Deep Web for unethical or illicit activities.

04/13/23 UNIVERSITY OF WISCONSIN 2

Page 3: The Deep Web -- From Spooky to Creepy

Session OverviewSession OverviewIntroduction and WarningThe Deep Web DefinedDynamic ContentUnlinked ContentPrivate WebContextual WebLimited Access ContentScripted ContentNon-HTML ContentDeep Web Search Engines & Tor ClientExamples of what can found on the Deep WebExciting Documentary VideoQuestion and Answer session

04/13/23 UNIVERSITY OF WISCONSIN 3

Page 4: The Deep Web -- From Spooky to Creepy

Some DefinitionsSome DefinitionsDeep Web, Deep Net, Invisible Web, or Hidden Web is not part of the Surface Web (that which is normally accessed).Do not confuse it with the Dark Internet, which refers to computers which can no longer be reached over the InternetSome people think that the Deep Web is a haven for serious criminality, and I agree with them

04/13/23 UNIVERSITY OF WISCONSIN 4

Page 5: The Deep Web -- From Spooky to Creepy

Normal Web SearchNormal Web Searchvs. Deep Web Searchvs. Deep Web Search

Searching on the Internet today can be compared to dragging a net across the surface of the ocean: a great deal may be caught in the net, but there is a wealth of information that is deep and therefore missed

04/13/23 UNIVERSITY OF WISCONSIN 5

Page 6: The Deep Web -- From Spooky to Creepy

Normal Web SearchNormal Web Searchvs. Deep Web Searchvs. Deep Web Search

Traditional search engines cannot see or retrieve content in the deep Web—those pages do not exist until they are created dynamically as the result of a specific search. As of 2001, the deep Web was several orders of magnitude larger than the surface Web

04/13/23 UNIVERSITY OF WISCONSIN 6

Page 7: The Deep Web -- From Spooky to Creepy

Deep Web SizeDeep Web SizeIt is impossible to measure or put estimates onto the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 4,000 to 5,000 times larger than the surface web04/13/23 UNIVERSITY OF WISCONSIN 7

Page 8: The Deep Web -- From Spooky to Creepy

Deep Web ResourcesDeep Web ResourcesDynamic ContentDynamic Content

Dynamic pages which are returned in response to a submitted query or accessed only through a form, especially if open-domain input elements (such as text fields) are used; such fields are hard to navigate without domain knowledge.

04/13/23 UNIVERSITY OF WISCONSIN 8

Page 9: The Deep Web -- From Spooky to Creepy

Deep Web ResourcesDeep Web ResourcesUnlinked ContentUnlinked Content

Unlinked content: pages which are not linked to by other pages, which may prevent Web crawling programs from accessing the content. This content is referred to as pages without backlinks (or inlinks).

04/13/23 UNIVERSITY OF WISCONSIN 9

Page 10: The Deep Web -- From Spooky to Creepy

Deep Web ResourcesDeep Web ResourcesPrivate WebPrivate Web

Private Web: sites that require registration and login (password-protected resources).

04/13/23 UNIVERSITY OF WISCONSIN 10

Page 11: The Deep Web -- From Spooky to Creepy

Deep Web ResourcesDeep Web ResourcesContextual WebContextual Web

Contextual Web: pages with content varying for different access contexts (e.g., ranges of client IP addresses or previous navigation sequence).

04/13/23 UNIVERSITY OF WISCONSIN 11

Page 12: The Deep Web -- From Spooky to Creepy

Deep Web ResourcesDeep Web ResourcesLimited Access ContentLimited Access ContentLimited access content: sites that limit access to their pages in a technical way (e.g., using the Robots Exclusion Standard or CAPTCHAs, or no-store directive which prohibit search engines from browsing them and creating cached copies

04/13/23 UNIVERSITY OF WISCONSIN 12

Page 13: The Deep Web -- From Spooky to Creepy

Deep Web ResourcesDeep Web ResourcesScripted ContentScripted Content

Scripted content: pages that are only accessible through links produced by JavaScript as well as content dynamically downloaded from Web servers via Flash or Ajax solutions.

04/13/23 UNIVERSITY OF WISCONSIN 13

Page 14: The Deep Web -- From Spooky to Creepy

Deep Web ResourcesDeep Web ResourcesNon HTML ContentNon HTML Content

Non-HTML/text content: textual content encoded in multimedia (image or video) files or specific file formats not handled by search engines.

04/13/23 UNIVERSITY OF WISCONSIN 14

Page 15: The Deep Web -- From Spooky to Creepy

Accessing the Deep WebAccessing the Deep Web

While it is not always possible to discover a specific web server's external IP address, theoretically almost any site can be accessed via its IP address, regardless of whether or not it has been indexed.

04/13/23 UNIVERSITY OF WISCONSIN 15

Page 16: The Deep Web -- From Spooky to Creepy

Accessing the Deep WebAccessing the Deep WebCertain content is intentionally hidden from the regular internet, accessible only with special software, such as Tor. Tor allows users to access websites using the .onion host suffix anonymously, hiding their IP address. Other such software includes I2P and Freenet.

04/13/23 UNIVERSITY OF WISCONSIN 16

Page 17: The Deep Web -- From Spooky to Creepy

The Onion Router (Tor)The Onion Router (Tor)Tool For the Deep WebTool For the Deep WebTor is software that installs into your browser and sets up the specific connections you need to access dark Web sites. Critically, Tor is an encrypted technology that helps people maintain anonymity online. It does this in part by routing connections through servers around the world, making them much harder to track.

04/13/23 UNIVERSITY OF WISCONSIN 17

Page 18: The Deep Web -- From Spooky to Creepy

Who Invented Tor?Who Invented Tor?Oddly enough, Tor is the result of research done by the U.S. Naval Research Laboratory, which created Tor for political dissidents and whistleblowers, allowing them to communicate without fear of reprisal.

04/13/23 UNIVERSITY OF WISCONSIN 18

Page 19: The Deep Web -- From Spooky to Creepy

Tor Client AvailableTor Client AvailableFor DownloadFor Download

04/13/23 UNIVERSITY OF WISCONSIN 19

Page 20: The Deep Web -- From Spooky to Creepy

Accessing the Deep WebAccessing the Deep Web.onion.onion

.onion is a pseudo-top-level domain host suffix designating an anonymous hidden service reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as Web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. 04/13/23 UNIVERSITY OF WISCONSIN 20

Page 21: The Deep Web -- From Spooky to Creepy

Accessing the Deep WebAccessing the Deep WebTor2web

04/13/23 UNIVERSITY OF WISCONSIN 21

Page 22: The Deep Web -- From Spooky to Creepy

What Deep Web LinksWhat Deep Web LinksLook LikeLook Like

Deep Web links appear as a random string of letters followed by the .onion TLD. For example, http://xmh57jrzrnw6insl followed by .onion, links to TORCH, the Tor search engine web page.

04/13/23 UNIVERSITY OF WISCONSIN 22

Page 23: The Deep Web -- From Spooky to Creepy

Searching the Deep WebSearching the Deep WebTo discover content on the Web, search engines use web crawlers that follow hyperlinks through known protocol virtual port numbers. This technique is ideal for discovering resources on the surface Web but is often ineffective at finding Deep Web resources.

04/13/23 UNIVERSITY OF WISCONSIN 23

Page 24: The Deep Web -- From Spooky to Creepy

Give the People What TheyGive the People What TheyCame Here For, Tonight!Came Here For, Tonight!

Just like general web search, searching the Invisible Web is also about looking for the needle in the haystack. Only here, the haystack is much bigger. The Invisible Web is definitely not for the casual searcher. It is a deep but not dark because if you know what you are searching for, enlightenment is a few keywords away.

04/13/23 UNIVERSITY OF WISCONSIN 24

Page 25: The Deep Web -- From Spooky to Creepy

Deep Web SearchDeep Web SearchEnginesEngines

04/13/23 UNIVERSITY OF WISCONSIN 25

Page 26: The Deep Web -- From Spooky to Creepy

Deep Web SearchDeep Web Searchinfomineinfomine

http://infomine.ucr.edu/Infomine has been built by a pool of libraries in the United States. Some of them are University of California, Wake Forest University, California State University, and the University of Detroit. Infomine ‘mines’ information from databases, electronic journals, electronic books, bulletin boards, mailing lists, online library card catalogs, articles, directories of researchers, and many other resources.

04/13/23 UNIVERSITY OF WISCONSIN 26

Page 27: The Deep Web -- From Spooky to Creepy

Deep Web SearchDeep Web SearchThe WWW Virtual LibraryThe WWW Virtual Library

http://vlib.org/This is considered to be the oldest catalog on the web and was started by started by Tim Berners-Lee, the creator of the web. So, isn’t it strange that it finds a place in the list of Invisible Web resources? Maybe, but the WWW Virtual Library lists quite a lot of relevant resources on quite a lot of subjects.

04/13/23 UNIVERSITY OF WISCONSIN 27

Page 28: The Deep Web -- From Spooky to Creepy

Deep Web SearchDeep Web SearchComplete PlanetComplete Planet

http://aip.completeplanet.com/Complete Planet calls itself the ‘front door to the Deep Web’. This free and well designed directory resource makes it easy to access the mass of dynamic databases that are cloaked from a general purpose search. The databases indexed by Complete Planet number around 70,000 and range from Agriculture to Weather. Also thrown in are databases like Food & Drink and Military.For a really effective Deep Web search, try out the Advanced Search options where among other things, you can set a date range.04/13/23 UNIVERSITY OF WISCONSIN 28

Page 29: The Deep Web -- From Spooky to Creepy

Deep Web SearchDeep Web SearchDeepPeepDeepPeep

http://www.deeppeep.org/DeepPeep aims to enter the Invisible Web through forms that query databases and web services for information. Typed queries open up dynamic but short lived results which cannot be indexed by normal search engines. By indexing databases, DeepPeep hopes to track 45,000 forms across 7 domains.The domains covered by DeepPeep (Beta) are Auto, Airfare, Biology, Book, Hotel, Job, and Rental. Being a beta service, there are occasional glitches as some results don’t load in the browser.

04/13/23 UNIVERSITY OF WISCONSIN 29

Page 30: The Deep Web -- From Spooky to Creepy

Deep Web SearchDeep Web SearchIncyWincyIncyWincy

http://www.incywincy.com/IncyWincy is an Invisible Web search engine and it behaves as a meta-search engine by tapping into other search engines and filtering the results. It searches the web, directory, forms, and images. With a free registration, you can track search results with alerts.

04/13/23 UNIVERSITY OF WISCONSIN 30

Page 31: The Deep Web -- From Spooky to Creepy

Deep Web SearchDeep Web SearchDeepWebTechDeepWebTech

http://www.deepwebtech.com/DeepWebTech gives you five search engines (and browser plugins) for specific topics. The search engines cover science, medicine, and business. Using these topic specific search engines, you can query the underlying databases in the Deep Web.

04/13/23 UNIVERSITY OF WISCONSIN 31

Page 32: The Deep Web -- From Spooky to Creepy

Deep Web SearchDeep Web SearchScirusScirus

http://www.scirus.com/srsapp/Scirus has a pure scientific focus. It is a far reaching research engine that can scour journals, scientists’ homepages, courseware, pre-print server material, patents and institutional intranets.

04/13/23 UNIVERSITY OF WISCONSIN 32

Page 33: The Deep Web -- From Spooky to Creepy

Deep Web SearchDeep Web SearchTechXtraTechXtra

http://www.techxtra.ac.uk/index.htmlTechXtra concentrates on engineering, mathematics and computing. It gives you industry news, job announcements, technical reports, technical data, full text eprints, teaching and learning resources along with articles and relevant website information.

04/13/23 UNIVERSITY OF WISCONSIN 33

Page 34: The Deep Web -- From Spooky to Creepy

Bitcoin, The Currency of theBitcoin, The Currency of theDeep WebDeep Web

• While not completely anonymous, when used correctly, it is very difficult to track down the true owner/identity

• Not regulated by any government or corporate entity

04/13/23 UNIVERSITY OF WISCONSIN 34

Page 35: The Deep Web -- From Spooky to Creepy

Be Careful of What YouBe Careful of What YouSearch For, You Might Just Search For, You Might Just

Find ItFind It

04/13/23 UNIVERSITY OF WISCONSIN 35

Page 36: The Deep Web -- From Spooky to Creepy

Deep WebDeep WebDangerous WebDangerous Web

04/13/23 UNIVERSITY OF WISCONSIN 36

Page 37: The Deep Web -- From Spooky to Creepy

Deep WebDeep WebDangerous WebDangerous Web

04/13/23 UNIVERSITY OF WISCONSIN 37

Page 38: The Deep Web -- From Spooky to Creepy

Deep Web, Dangerous WebDeep Web, Dangerous WebSteganographySteganography

(ste-g&n-o´gr&-fē) (n.) The art and science of hiding information by embedding messages within other, seemingly harmless messages

04/13/23 UNIVERSITY OF WISCONSIN 38

Page 39: The Deep Web -- From Spooky to Creepy

Deep WebDeep WebDangerous WebDangerous Web

04/13/23 UNIVERSITY OF WISCONSIN 39

Page 40: The Deep Web -- From Spooky to Creepy

Deep WebDeep WebDangerous WebDangerous Web

04/13/23 UNIVERSITY OF WISCONSIN 40

Page 41: The Deep Web -- From Spooky to Creepy

Deep WebDeep WebDangerous WebDangerous Web

04/13/23 UNIVERSITY OF WISCONSIN 41

Page 42: The Deep Web -- From Spooky to Creepy

Deep WebDeep WebDangerous WebDangerous Web

04/13/23 UNIVERSITY OF WISCONSIN 42

Page 43: The Deep Web -- From Spooky to Creepy

Deep WebDeep WebDangerous WebDangerous Web

04/13/23 UNIVERSITY OF WISCONSIN 43

Page 44: The Deep Web -- From Spooky to Creepy

Deep WebDeep WebDangerous WebDangerous Web

04/13/23 UNIVERSITY OF WISCONSIN 44

Page 45: The Deep Web -- From Spooky to Creepy

Deep WebDeep WebDangerous WebDangerous Web

04/13/23 UNIVERSITY OF WISCONSIN 45

Page 46: The Deep Web -- From Spooky to Creepy

Deep WebDeep WebDangerous WebDangerous Web

04/13/23 UNIVERSITY OF WISCONSIN 46

Page 47: The Deep Web -- From Spooky to Creepy

Deep Web Short Deep Web Short DocumentaryDocumentary

https://www.youtube.com/watch?v=HJOSm9Bg7WY

04/13/23 UNIVERSITY OF WISCONSIN 47

Page 48: The Deep Web -- From Spooky to Creepy

Question and AnswerQuestion and AnswerSessionSession

Happy Halloween!Please Make it Fun and Please

Make it Safe!

I can be reached by email:[email protected], on Facebookhttps://www.facebook.com/nicholas.a.davis

04/13/23 UNIVERSITY OF WISCONSIN 48

Page 49: The Deep Web -- From Spooky to Creepy

04/13/23 UNIVERSITY OF WISCONSIN 49


Recommended