Skip to main content

What is Dark web and Deep web || Explained


What is Dark web and Deep web || Explained
v Dark web:
Dark web is hidden part of internet. It is available on dark networks. It is 96% of total internet. The internet which a normal user can use is 1% which includes google, YouTube, Facebook, yahoo, Bing, etc. The Dark web is largest website of Hackers   Internet is divided into 7 levels and 3 parts.
·       Parts of Internet:

 

1.    Surface web(2 levels)
2.    Dark web and Deep web(4 levels)
3.    Mariana Web(1 level)
v Deep web:
Deep web is also a part of dark web. The databases of companies like Facebook, YouTube are stored here. It is legal to access deep web. There are not much illegal things on deep web as compared to dark web.
v Accessing Dark web & Deep web:
Dark web & Deep web are accessed through tor browser. Tor browser creates a proxy chain which makes you to work anonymously. To access a dark web or deep web you need special link. Link looks like:
               Nfkdnd2119239dkmfd.onion
The link have irregular words. The links of dark web have millions of words and they are compressed to shorten them. The links are changed monthly. The dark web links always ends with .onion Drugs, weapons, and other illegal things are sold here.
v Search Engines:
The dark web have many search engines. As Surface web have search engines like Google, Bing, Yahoo and DuckDuckgo same as dark web have search engines like:
Ø Torch
Ø Ahmia
Ø Not Evil
Ø Grams
Ø Info Desk Grams
Ø Haystak
Ø Etc.

Comments

Popular posts from this blog

Hacking an Facebook ID

Hacking an Facebook ID  There are two methods that are used for hacking Facebook account:        Phishing attack        Token access 1: Phishing attack In phishing attack the attacker downloads the Facebook Login page and then create a database and makes little bit changes in Facebook login page so that victim should login.   The Facebook Phishing page may look like this: Then attacker uploads it to online server or offline server such as Xampp and then creates a tunnel between localhost and Internet to make it available everywhere. The tunnel can be created using ngrok.                Working: The attacker sends it to his victim and when victims login to fake page it redirects it to real Facebook page and the information which user has entered into fake page will be stored in txt file and now hackers can access his/her...

SpyMax malware that targeted Libyan Individuals

Spy Max (Spyware) || Newly found malwares in 2020 || Explained SpyMax: It belongs to surveillance ware family, SpyMax was found targeting Libyan Individuals. It masqueraded as “Corona Live 1.1” to steal photos, media, files, Device location, as well as permission to take pictures and record videos of individuals from infected phone.

Who is Anonymous || Anonymous (The Hacktivists) || Anonymous is in Action

Who is Anonymous || Anonymous (The Hacktivists) || Explained   Anonymous is a decentralized group of Hackers without an identity. They did a first attack in 2003. It has no headquarters so there is no option to join anonymous. They use wrong way to hack but their purpose is to give peoples freedom of speech, Equality and Justice on Internet. Anonymous is basically an idea. They have done many operations and against governments of different countries. The following are some famous operations of Anonymous: ·       OP Dark net (Removed Child Pornography from Dark web) ·       OP Israel (Shutdown approximately 10000 Israeli websites) ·       OP Iran ·       OP Payback Etc. Anonymous uses guy fox masks and there is no way to join the group. Anonymous also had official YouTube Channel. This channel was given by google to Anonymous. Anonymous uploads and tells world the in...