Professional Documents
Culture Documents
Deep Web, also known as hidden web, is a term that evokes the unknown, a
mysterious place in the cyber space populated by criminals and hackers that is not
accessible for ordinary people, but is it true?
What is the Deep Web, how do you access to its resources and what is possible to find
in its networks? In this post, Ill try to provide an overview on the principal concepts
related tothe Deep Web, providing a guide on how to orient within a plethora of hidden
services
The Deep Web is a collection on information resources located on the World Wide Web
not indexed by search engines, contrary to what one might think, its extension is much
higher than that of ordinary web, raw estimationsaccredit it around 500 times larger.
How is it possible? How do search engines work?
Search engines use software called crawlers to scan web content, these applications
browses the World Wide Web in a methodicaland automated manner and typically
create a copy of all the visited pages for later analysis and indexing procedure. The
crawlers are not able to scan the entire web but in many cases the fail to retrieve content
accessible from the web. The following are the principal categories of Deep Web
resources not reached by these softwares:
The consequence of this data are shocking.During its web experience, a user could
access only to a small portion of the overall network, and instead the Dark portion is
The principal characteristic of the Deep Web is the anonymity.Its use is mainly
motivated by the users need to hide their identity online; this exigency is shared by
various categories of individuals, not necessary cyber criminals. Of course, total
anonymity attracts criminal industries that are migrating various activities in the hidden
web.In the recent months, the number of underground markets that sell any kind of odd,
from drugs to weapons has grown exponentially.
The Deep Web and the service hidden in its resources are also largely used by
governments, in particular by intelligence agencies and militaryto exchange documents
secretlyand by journalists to bypass censorship established by dictatorial regimes to
suppress internal dissidents.
Anonymizing networks The Tor Network
How are individuals tracked on the web and how is it possible tomake a user
anonymous online?
In the Internet every resource is identified by an IP address that could be
masqueradedusing anonymizing services or surfing throughanonymizing networks such
as I2P and Tor network. The fundamental concepts on which these networks are based
arethe layered routing and the adoption of encryption algorithms to protect information
during the transmission.
Without doubts, the most popular anonymizing network is Tor, The onion router, a
system managedby the US Naval Research Laboratory from 2004 to 2005 to enable
online anonymity;successively the project was supported by the Electronic Frontier
Foundation.
Using the Tor client software, auser is able to surf in Tor Network, which I strongly
suggest to navigate inside the deep web using Tails OS distribution which is bootable
OS that doesnt leavetrace on the users machine.
https://tails.boum.org/
The popular Tor Bundle is equipped with its own portable Firefox versionfor
anonymous navigation.Anyways, it is strongly suggested that usersmake check of
installed/in use plugins; in many the commercial version in fact common plugins could
expose users identity also on anonymizing networks.
Once plunged into the depths of Deep Web, it is easy to get lost, which is why it is
essential to keep in mind which are considered the references that can help navigation.
Recall that in the Deep Web there arent search engines like Google, the navigation is
quite different from ordinary web and every research appears more complex due the
absence of indexing of the contents.Typically, users proceed in the navigation jumping
from list of navigable URL proposed by more or less known sites, collection of Wikis
and BBS-like sites have the main purpose to aggregate links, categorizing them in more
suitable groups of consulting.
Another difference that users immediately note is the format of web site URLs.Instead
of classic extensions (e.g. .com, .gov) the domains in the Deep Web generally end with
the .onion suffix, .onion-URLs are used to identify hidden services. Addresses in the
.onion pseudo-TLD are 16-character alpha-semi-numeric hashes which are
automatically generated based on a public key when the hidden service is configured.
These 16-character hashes can be made up of any letter in the alphabet, and decimal
digits beginning with 2 and ending with 7, thus representing an 80-bit number in
base32.
jhiwjjlqpyawmpjx.onion
This .onion-URL isnt used only to refer the hidden service, it also offers service
authentication. Only one specific hidden service is associated to this identifier and no
one can forge or spoof it because an 80 bit number actually is a part of the hash of the
public key of the hidden service and the public key is strongly related to its private
key.Now that reader has understood what the meaning for this strange sequence of
characters representative of onion addressed, let provide few interesting info that could
allow him to move first step in the obscurity of the Deep Web.
The Wikies
Wikies are most precious resources in the Deep Web, especially for those individuals
that have no fixed references for their researches, they are collections of URLs related
to various topics arranged in categories to improve the consultation.Most popular, but
not the only one is the Hidden Wiki, it is a mine of information and links to allow wide
researched in the Deep Web.
http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page
The wiki offer an impressive quantity of URLs related to raw contents and discussion
pages.The web site appears very friendly to visitors that once located the section of
interest, representative of a specific thematic area, could browse to the links listed.
Users could easily find content related to hacking, hacktivism, market places,
commercial services and forums and a specific session forservices arranged for
geographic areas.
Figure 2 TorDir
Want to learn more?? The InfoSec Institute Ethical Hacking course goes indepth into the techniques used by malicious, black hat hackers with attention
getting lectures and hands-on lab exercises. While these hacking skills can be
used for malicious purposes, this class teaches you how to use the same
hacking techniques to perform a white-hat, ethical hack, on your organization.
You leave with the ability to quantitatively assess and measure threats to
information assets; and discover where your organization is most vulnerable
to black hat hackers. Some features of this course include:
Search Engines
The wikis arent the unique guides for Dark web surfers and inexpert users, many
sites offers primitive search engines that allow users to retrieve the URLs related to
content to search. One of the most interesting Onion domain list is tor hidden service
search Ahmia.fi available onworld wide web at the following address:
https://ahmia.fi/
acquire illegal products, encouraging the use of virtual currency schema such as Bitcoin
that allow instantaneous and not traceabletransactions on which gain commissions.
The most popular dark market is Silk Road, an online marketplace where the majority
of products are derived from illegal activities, an autonomous system that advantage the
exercise of criminal activities while ensuring the anonymity of transactions and the
inability to track down the criminals.
https://silkroadvb5piz3r.onion
Want to learn more?? The InfoSec Institute Ethical Hacking course goes indepth into the techniques used by malicious, black hat hackers with attention
getting lectures and hands-on lab exercises. While these hacking skills can be
used for malicious purposes, this class teaches you how to use the same
hacking techniques to perform a white-hat, ethical hack, on your organization.
You leave with the ability to quantitatively assess and measure threats to
Address
http://7v2i3bwsaj7cjs34.onion/
http://okx5b2r76olbriil.onion/
http://5onwnspjvuk7cwvk.onion/index.php
http://ie66qw46jejj4zn2.onion/
http://fpgigmfnlscyok5h.onion/
http://yyz57kb55zslet4c.onion/
http://y47ylcppnh3afqk4.onion/
http://sheep5u64fi457aw.onion/
Figure 7GermanWeed
The Deep Web is also very popular in the hacker underground community, many
hackers use it regularly to exchange information, opinions and tools with others
passionate in the matter.Recently, some forums in the hidden web have also been used
to commercialize exploit tools or hacking services (e.g. DDoS attack, botnetrenting).
One of the most famous malwares, based on the Zeus malicious code,is Citadel trojan
that is also available in the deep web; security experts have in fact found an excellent
customer relationship management (CRM) model implemented by its creators. The
authors of malicious code have structured an efficient service for the sale (around
$2,500) of the malware and the providing of improvements and customizations for
specific needs (e.g. customization to target specific banks or financial institutions or to
setup of a cyber-espionage tool) for the trojan through social network platforms that get
in touch clients with the creators of the virus.To ensure their anonymity, authors of
Citadel implemented a malware-as-service selling model based on a hidden service in
theDeep Web.
The phenomenon is not isolated cybercrime is exploring the possibility of migrating
its activities in the Deep Web; the security community is assisting to the consolidation
of the black markets that sell various products from drugs to exploits for zero-day
vulnerabilities.
Digging in the Tor network, it is possible to found a huge number of hidden services
that offer forums and document exchange platforms specifically developed for hackers.
Search engine
HackBB
CaravanaBrasil
Rent a hacker
DroidSheep
SharePass
BlackHat Money Makers
Group
Home of hashparty
Address
http://clsvtzwzdgzkjda7.onion/
http://l2zukdb5b2favsfc.onion/
http://ugh6gtz44ifx23e7.onion/
http://7v2i3bwsaj7cjs34.onion/
http://tklxxs3rdzdjppnl.onion/
http://r2xqrckqvvtdifol.onion/
http://3terbsb5mmmdyhse.onion/
Governments are dedicating great attention to the Deep Web and to the opportunity
given by its environments to the growth and diffusion of cyber threats, military cyber
units are infiltrating it and are using it for both defensive and offensive purposes(in a
previousarticle, I wrote about this issue)
The Deep Web is governments project to operate anonymously, of course this aspect
has been also exploited by cyber criminals, hacktivists and normal people that desire to
defend their privacy, for this reason institutions and agencies of every countries have
promoted project to develop new monitoring systems and at same time they have started
a misinformation campaign against the this parallel and hidden world.
Consider that use of anonymizing networks is not encouraged by governments all over
the world, for obvious reasons, because they cannot monitor users activities and
because they fear the offensives of foreign groups of hackers from the Deep Web.
I always suggest to notbelieve that those whosustain that Deep Web are the reign of the
evil because they are trying simply to defend their secrets keeping you away from that
place.
References
http://securityaffairs.co/wordpress/5650/cyber-crime/what-is-the-deep-web-a-first-tripinto-the-abyss.html
http://securityaffairs.co/wordpress/8005/cyber-crime/traveling-the-silk-road-study-ofthe-famous-market-places.html
https://metrics.torproject.org/
http://pastebin.com/ADTynHbX
http://www.amazon.com/The-Deep-Dark-Web-hidden/dp/1480177598
http://arxiv.org/pdf/1207.7139v1.pdf
http://pastebin.com/QtptdsS1
Incoming search terms:
deep web
deep web links
dark web
blocked deep web pages
open access and deep web:different
onion wiki index php Main Page
onion sites list
onion black market adresses
non Blocking deep web search engine
search the deep web