SlideShare a Scribd company logo
DEEP WEB
WHAT TO DO ‘N’ WHAT NOT TO DO
root@topdeepweb:$> cat whoami.txt
[+] AJAY KUMAR [+]
[+] INDEPENDENT SECURITY RESEARCHER [+]
[+] DEEP WEB ENTHUISIAT AND RESEARCHER [+]
[+] YET TO BE AN ENGINEER [+]
[+] Find my research works on 0xmalweb.online [+]
WHAT IS DEEP WEB ?
The deep web or invisible web or hidden
webare parts of the World Wide
Web whose contents are not indexed by
standard search engines for any reason
WONDER WHAT IT IS ?
• Deep web contains 75% of the total world wide web
• Only remaining 25% is Surface web (which includes Facebook ,
Twitter , Google etc)
• The most popular search engine GOOGLE can search only 18% of
the SURFACE WEB
• In the sense , only 18% of the surface web is indexed by google
Levels Of web
SURFACE WEB: The web that the vast majority of internet users are
connected to. Accessible in any nation that does not block internet
access.
E.g: Social media sites like Facebook, informational websites like
Wikipedia, general websites, etc.
BERGIE WEB: The layer of the Surface Web that is blocked in some
nations. Some other information is only accessible through illegal
means.
E.g: Google locked results, recently web crawled old content, pirated
media, pornography etc
Levels Of Web (contd…)
DEEPWEB: Requires special software or proxy to access
(TOR).Contains most of the archived web pages of the 1990s Web
that did not renew their domain names and such.E.g:
Government/Business Research, Hackers, ScriptKiddies, Virus
Information, Illegal and Obscene Content (CP, Gore, Suicides, etc…)
CHARTER WEB: It is like the regular deep web, but harder to get into
and more illegal content.
Advanced covert government research, most of the internet black
market (run on bitcoins), Human/Arms/Drug/Rare Animal Trafficking,
Assassination Networks , illegal game hunting, line of blood locations,
more banned obscene content like CP, Gore, etc.
Levels Of Web (contd…)
• MARIANAS WEB:
Lowest known level of the Deep Web. Named after the Spanish
Technician who created it. It is extremely difficult to access, users say
it is the safest part of the internet due to the privacy.
Julian Assange and other top-level Wikileaks members are believed to
have access.
Do Deep Web Is Really Illegal?
If So what actually the Deep Web contains to call it Illegal
SPAMMERS / SOCIAL ENGINEERERS / DOXERS
SECURE YOURSELF
RED ROOMS / SUICIDAL FORUMS
FBI / GOVERNMENT
TERRORISM
HITMAN / CONTRACT KILLERS
Deep Web - what to do and what not to do
HACKERS
ILLEGAL DRUGS
GOVERNMENT DATA
But Not Everything In Deep Web Is Illegal
Researchers from Terbium Labs claim to have found
evidence that 50% of the deep web contents are legal
50%
13%
11%
9%
4%
3%
3%
2%2%1%1%1%
Deep Web
legal
Drugs
Multiple other categories (illicit)
Site Down
Other illicit activity
Explicit
Fraud
Pharmaceuticals
Hacking & Exploits
Downloadable
Exploitation
Extremisum
What Legal Things Do Deep Web Contains ??
Galaxy 2
Freedom Of Press
Sigaint Mail Services
Forums
Ebooks / Tutorials
History Archives
0 Day Exploits and Data Dumps
Secure Yourself While Accessing Deep Web
• Manual settings For Tor Browser
go for about:config and make sure javascript.enabled and
geo.enabled is set to false
• Disable Javascript using No script addon too
• Disable or Uninstall all addons except HTTPS Everywhere
• Try to change tor circuit and network over a period of time manually
• Donot download any files directly from the Deep Web
• Donot open any links directly from Deep Web in surface web
• Use PGP to chat or mail with someone on Deep Web
• Use unique username for each and every forums you visit
• Don’t use same usernames while using IRC or on surface web
• Avoid using .to and .link (tor2web services)
• Try to use tor in a dedicated system (tail live os )
“Anonymity does not mean criminality”
Privacy Matters In Deep Web , Don’t loose it to morons
QUESTIONS ?
Thank you

More Related Content

What's hot (20)

PPTX
Deep web
Abu Kaisar
 
PPTX
The Dark side of the Web
Paula Ripoll Cacho
 
PPTX
Guide to dark web
Jspider - Noida
 
PPTX
The Dark Web
Jan Siy
 
PPTX
Introduction To Dark Web
Adityakumar Yadav
 
PPTX
Dark web
Safwan Hashmi
 
PDF
Rolling in the Deep. ISACA.SV.2016
Bich (Evelyn) Chu
 
PPTX
Cybersecurity and the DarkNet
James Bollen
 
PPTX
The Deep Web, TOR Network and Internet Anonymity
Abhimanyu Singh
 
PPTX
Research in the deep web
Seth Porter, MA, MLIS
 
PPTX
Deep and Dark Web
Md. Nazmus Shakib Robin
 
PPTX
Dark Web and Privacy
Brian Pichman
 
PPTX
The dark web
Bella M
 
PPTX
Journey To The Dark Web
MiteshWani
 
PPTX
Deep web and Dark web
Parvez Hossain
 
PPTX
Dark web
aakshidhingra
 
PPTX
Dark web by Claudine Impas
Claudine Impas
 
PPTX
Ali shahbazi khojasteh - deep web
Ali Shahbazi Khojasteh
 
PPTX
Deep web power point presentation
albafg55
 
PPTX
Deep Web
AbishaiDas
 
Deep web
Abu Kaisar
 
The Dark side of the Web
Paula Ripoll Cacho
 
Guide to dark web
Jspider - Noida
 
The Dark Web
Jan Siy
 
Introduction To Dark Web
Adityakumar Yadav
 
Dark web
Safwan Hashmi
 
Rolling in the Deep. ISACA.SV.2016
Bich (Evelyn) Chu
 
Cybersecurity and the DarkNet
James Bollen
 
The Deep Web, TOR Network and Internet Anonymity
Abhimanyu Singh
 
Research in the deep web
Seth Porter, MA, MLIS
 
Deep and Dark Web
Md. Nazmus Shakib Robin
 
Dark Web and Privacy
Brian Pichman
 
The dark web
Bella M
 
Journey To The Dark Web
MiteshWani
 
Deep web and Dark web
Parvez Hossain
 
Dark web
aakshidhingra
 
Dark web by Claudine Impas
Claudine Impas
 
Ali shahbazi khojasteh - deep web
Ali Shahbazi Khojasteh
 
Deep web power point presentation
albafg55
 
Deep Web
AbishaiDas
 

Viewers also liked (20)

PPT
Impossible Is Nothing
Richard Dedor
 
ODP
Impossible is Nothing?
Shriram Sivaramakrishnan
 
PPTX
10 facts about japan
AbdAlrahman siyamek
 
PPT
Nobel prize
asiyat1975
 
PPSX
Presentation on Medicated Chewing Gums
Manoj Kumar Tekuri
 
PDF
Dos and Don'ts of an Engineering Statement of Purpose
SOP Writing
 
PPTX
Data made out of functions
kenbot
 
PDF
The Deep Web - How the Deep Web Works
Omar Samy
 
PDF
Human Body
Stacy Schanks
 
PPT
Bubble gum
Ms Wilson
 
PPTX
Deep Web
Ahmed Khan
 
PPTX
Japan - An Emerging Civilization
Eleven
 
PPTX
Deep web
ANKIT OJHA
 
PPSX
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
maditabalnco
 
PDF
Sustainable Innovation Day
Peter Bertels
 
PDF
Clean and green hydrocarbons ignite publish
Krzysztof (Kris) Palka
 
PDF
10 Practical Ways to Be More Efficient at Work
Weekdone.com
 
PDF
iOS Scroll Performance
Kyle Sherman
 
PDF
Testing at Spotify
Andrii Dzynia
 
Impossible Is Nothing
Richard Dedor
 
Impossible is Nothing?
Shriram Sivaramakrishnan
 
10 facts about japan
AbdAlrahman siyamek
 
Nobel prize
asiyat1975
 
Presentation on Medicated Chewing Gums
Manoj Kumar Tekuri
 
Dos and Don'ts of an Engineering Statement of Purpose
SOP Writing
 
Data made out of functions
kenbot
 
The Deep Web - How the Deep Web Works
Omar Samy
 
Human Body
Stacy Schanks
 
Bubble gum
Ms Wilson
 
Deep Web
Ahmed Khan
 
Japan - An Emerging Civilization
Eleven
 
Deep web
ANKIT OJHA
 
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
maditabalnco
 
Sustainable Innovation Day
Peter Bertels
 
Clean and green hydrocarbons ignite publish
Krzysztof (Kris) Palka
 
10 Practical Ways to Be More Efficient at Work
Weekdone.com
 
iOS Scroll Performance
Kyle Sherman
 
Testing at Spotify
Andrii Dzynia
 
Ad

Similar to Deep Web - what to do and what not to do (20)

PDF
Introduction to Deep Web
IRJET Journal
 
PPTX
Overview of Deep web
Shubhankar Dutta
 
PPTX
Dark web technology based ppt for power pt
murug9700
 
PPTX
Team11_DeepDarkWeb.pptx
AtulKumawat4
 
PDF
Team11_DeepDarkWebrthrthghhtjrjjyjyjyjyjyj
JamesAntony18
 
DOCX
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
helzerpatrina
 
PPTX
PptDW.pptxvbbbvvvxxfjjrtuhvcfhhjddffcvjjgg
qualitykioskpvtltd
 
PPTX
Deep web
GauravPandey319
 
PDF
Deep Web Stories_ Tales from the Unindexed Internet.pdf
kabirhasan11
 
PPTX
Deep and dark web
AnkitSharma2196
 
PPTX
Invisible Web
Muhammad Azeem Mazhar
 
PPTX
The deepweb
ALuna Ryssel
 
PPTX
Deep web, the unIndexed web
Nitish Joshi
 
PPTX
Deep and Dark web
Nihal Ahmed
 
PPTX
Dark wed
AraVind Pillai
 
PDF
Wp below the_surface
Medina Núñez
 
PPTX
The Deep Web
Melody Chiaoco
 
PPTX
Web layers
hashim102
 
PPTX
Cyber crime- a case study
Shubh Thakkar
 
PDF
darkeeb_royida-alhayali darkeebf.ppt.pdf
maniuraglebocki
 
Introduction to Deep Web
IRJET Journal
 
Overview of Deep web
Shubhankar Dutta
 
Dark web technology based ppt for power pt
murug9700
 
Team11_DeepDarkWeb.pptx
AtulKumawat4
 
Team11_DeepDarkWebrthrthghhtjrjjyjyjyjyjyj
JamesAntony18
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
helzerpatrina
 
PptDW.pptxvbbbvvvxxfjjrtuhvcfhhjddffcvjjgg
qualitykioskpvtltd
 
Deep web
GauravPandey319
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
kabirhasan11
 
Deep and dark web
AnkitSharma2196
 
Invisible Web
Muhammad Azeem Mazhar
 
The deepweb
ALuna Ryssel
 
Deep web, the unIndexed web
Nitish Joshi
 
Deep and Dark web
Nihal Ahmed
 
Dark wed
AraVind Pillai
 
Wp below the_surface
Medina Núñez
 
The Deep Web
Melody Chiaoco
 
Web layers
hashim102
 
Cyber crime- a case study
Shubh Thakkar
 
darkeeb_royida-alhayali darkeebf.ppt.pdf
maniuraglebocki
 
Ad

More from Cysinfo Cyber Security Community (20)

PDF
Understanding Malware Persistence Techniques by Monnappa K A
Cysinfo Cyber Security Community
 
PDF
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Cysinfo Cyber Security Community
 
PDF
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Cysinfo Cyber Security Community
 
PPTX
Emerging Trends in Cybersecurity by Amar Prusty
Cysinfo Cyber Security Community
 
PDF
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
Cysinfo Cyber Security Community
 
PDF
Closer look at PHP Unserialization by Ashwin Shenoi
Cysinfo Cyber Security Community
 
PDF
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
Cysinfo Cyber Security Community
 
PDF
The Art of Executing JavaScript by Akhil Mahendra
Cysinfo Cyber Security Community
 
PDF
Reversing and Decrypting Malware Communications by Monnappa
Cysinfo Cyber Security Community
 
PPTX
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
Cysinfo Cyber Security Community
 
PPTX
Analysis of android apk using adhrit by Abhishek J.M
Cysinfo Cyber Security Community
 
PDF
Understanding evasive hollow process injection techniques monnappa k a
Cysinfo Cyber Security Community
 
PPTX
Security challenges in d2d communication by ajithkumar vyasarao
Cysinfo Cyber Security Community
 
PPTX
S2 e (selective symbolic execution) -shivkrishna a
Cysinfo Cyber Security Community
 
PPTX
Dynamic binary analysis using angr siddharth muralee
Cysinfo Cyber Security Community
 
PPTX
Bit flipping attack on aes cbc - ashutosh ahelleya
Cysinfo Cyber Security Community
 
PDF
Security Analytics using ELK stack
Cysinfo Cyber Security Community
 
PDF
Linux Malware Analysis
Cysinfo Cyber Security Community
 
ODP
Introduction to Binary Exploitation
Cysinfo Cyber Security Community
 
PDF
ATM Malware: Understanding the threat
Cysinfo Cyber Security Community
 
Understanding Malware Persistence Techniques by Monnappa K A
Cysinfo Cyber Security Community
 
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Cysinfo Cyber Security Community
 
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Cysinfo Cyber Security Community
 
Emerging Trends in Cybersecurity by Amar Prusty
Cysinfo Cyber Security Community
 
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
Cysinfo Cyber Security Community
 
Closer look at PHP Unserialization by Ashwin Shenoi
Cysinfo Cyber Security Community
 
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
Cysinfo Cyber Security Community
 
The Art of Executing JavaScript by Akhil Mahendra
Cysinfo Cyber Security Community
 
Reversing and Decrypting Malware Communications by Monnappa
Cysinfo Cyber Security Community
 
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
Cysinfo Cyber Security Community
 
Analysis of android apk using adhrit by Abhishek J.M
Cysinfo Cyber Security Community
 
Understanding evasive hollow process injection techniques monnappa k a
Cysinfo Cyber Security Community
 
Security challenges in d2d communication by ajithkumar vyasarao
Cysinfo Cyber Security Community
 
S2 e (selective symbolic execution) -shivkrishna a
Cysinfo Cyber Security Community
 
Dynamic binary analysis using angr siddharth muralee
Cysinfo Cyber Security Community
 
Bit flipping attack on aes cbc - ashutosh ahelleya
Cysinfo Cyber Security Community
 
Security Analytics using ELK stack
Cysinfo Cyber Security Community
 
Linux Malware Analysis
Cysinfo Cyber Security Community
 
Introduction to Binary Exploitation
Cysinfo Cyber Security Community
 
ATM Malware: Understanding the threat
Cysinfo Cyber Security Community
 

Recently uploaded (20)

PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
July Patch Tuesday
Ivanti
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
July Patch Tuesday
Ivanti
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 

Deep Web - what to do and what not to do

  • 1. DEEP WEB WHAT TO DO ‘N’ WHAT NOT TO DO
  • 2. root@topdeepweb:$> cat whoami.txt [+] AJAY KUMAR [+] [+] INDEPENDENT SECURITY RESEARCHER [+] [+] DEEP WEB ENTHUISIAT AND RESEARCHER [+] [+] YET TO BE AN ENGINEER [+] [+] Find my research works on 0xmalweb.online [+]
  • 3. WHAT IS DEEP WEB ?
  • 4. The deep web or invisible web or hidden webare parts of the World Wide Web whose contents are not indexed by standard search engines for any reason
  • 5. WONDER WHAT IT IS ? • Deep web contains 75% of the total world wide web • Only remaining 25% is Surface web (which includes Facebook , Twitter , Google etc) • The most popular search engine GOOGLE can search only 18% of the SURFACE WEB • In the sense , only 18% of the surface web is indexed by google
  • 6. Levels Of web SURFACE WEB: The web that the vast majority of internet users are connected to. Accessible in any nation that does not block internet access. E.g: Social media sites like Facebook, informational websites like Wikipedia, general websites, etc. BERGIE WEB: The layer of the Surface Web that is blocked in some nations. Some other information is only accessible through illegal means. E.g: Google locked results, recently web crawled old content, pirated media, pornography etc
  • 7. Levels Of Web (contd…) DEEPWEB: Requires special software or proxy to access (TOR).Contains most of the archived web pages of the 1990s Web that did not renew their domain names and such.E.g: Government/Business Research, Hackers, ScriptKiddies, Virus Information, Illegal and Obscene Content (CP, Gore, Suicides, etc…) CHARTER WEB: It is like the regular deep web, but harder to get into and more illegal content. Advanced covert government research, most of the internet black market (run on bitcoins), Human/Arms/Drug/Rare Animal Trafficking, Assassination Networks , illegal game hunting, line of blood locations, more banned obscene content like CP, Gore, etc.
  • 8. Levels Of Web (contd…) • MARIANAS WEB: Lowest known level of the Deep Web. Named after the Spanish Technician who created it. It is extremely difficult to access, users say it is the safest part of the internet due to the privacy. Julian Assange and other top-level Wikileaks members are believed to have access.
  • 9. Do Deep Web Is Really Illegal? If So what actually the Deep Web contains to call it Illegal
  • 10. SPAMMERS / SOCIAL ENGINEERERS / DOXERS
  • 11. SECURE YOURSELF RED ROOMS / SUICIDAL FORUMS
  • 14. HITMAN / CONTRACT KILLERS
  • 19. But Not Everything In Deep Web Is Illegal
  • 20. Researchers from Terbium Labs claim to have found evidence that 50% of the deep web contents are legal
  • 21. 50% 13% 11% 9% 4% 3% 3% 2%2%1%1%1% Deep Web legal Drugs Multiple other categories (illicit) Site Down Other illicit activity Explicit Fraud Pharmaceuticals Hacking & Exploits Downloadable Exploitation Extremisum
  • 22. What Legal Things Do Deep Web Contains ??
  • 29. 0 Day Exploits and Data Dumps
  • 30. Secure Yourself While Accessing Deep Web
  • 31. • Manual settings For Tor Browser go for about:config and make sure javascript.enabled and geo.enabled is set to false
  • 32. • Disable Javascript using No script addon too • Disable or Uninstall all addons except HTTPS Everywhere • Try to change tor circuit and network over a period of time manually • Donot download any files directly from the Deep Web • Donot open any links directly from Deep Web in surface web • Use PGP to chat or mail with someone on Deep Web • Use unique username for each and every forums you visit • Don’t use same usernames while using IRC or on surface web • Avoid using .to and .link (tor2web services) • Try to use tor in a dedicated system (tail live os )
  • 33. “Anonymity does not mean criminality” Privacy Matters In Deep Web , Don’t loose it to morons