The Secrets of the Dark Web

top ethical hackers of india

THE DEEP WEB

The internet in the present days is been compared to many things: A fighter jet; A Nuclear Weapon; and most famously a series of tubes. As it is compared to an iceberg which takes down the whole yacht in minutes. The 10% of the network we call the internet is available in a normal search to the general public. Hidden below the virtual waterlines a surprising and secretive network Known as Deep web.

The Dark web can be only accessed with a special browser such as The Onion Router (TOR). the deep web is built on the basis of peer-to-peer connections, which allows to safely share files directly.

The Deep web has strong support to appeal to privacy advocates, who have taken huge advantage of the lack of tracing or identifying to the shield their anonymity from advertisers and officials alike. A former CIA agent Whistleblower Edward Snowden used the Deep web to collect much of the information that carried him into a worldwide discussion, and columnists around the world are coming to rely on it as a secure alternative to the public web searching for sensitive, confidential and dangerous information.

But the tight-lipped nature of the network has also made its own criminals of various stripes, Human organ trade, trafficking from illegal drugs to a stolen credit card to the child pornography. An online marketplace named as “THE SILK ROAD” driven by the internet currency Bitcoin. The subjected headlines in 2013 when the expertise succeeded in shutting it down. The site had its own prominence as the internet’s go-to destination for illegal sales of drugs, and its death spawned both a crowd-sourced documentary.

An organization such as AT&T, eager to examine, control activity and track within the misty borders, are working restlessly to bring light to the far end of the Deep Web. Government and law enforcement agencies, illegal trafficking, leaks, and concerned about privacy, are the unfamiliar positions striving to police the same wild and wooly neither world rely on for their own hidden operations. But secrets, scandals, and skulls will always find their path to the darkest parts of the web, and while destiny of the Deep Web may be as dark as its twisted triangles, it’s certain to remain a portion of internet wisdom for years to come.

Originate Of Deep Web

The term, “Deep web,” was stamped in 2001 by BrightPlanet, an Internet search Technology corporation that practices in searching deep web content.

Military sources of Deep Web – Like other sectors of the internet, the Deep Web began to build with the help of the U.S. military, which inquired a way to communicate with intelligence assets and Americans commissions abroad without being exposed. David Goldschlag, Michael Reed, and Paul Syverson mathematician at the Naval Research Laboratory started working on the idea of “ONION ROUTING” in 1995. Their research shortly developed into the Onion Router project, famously known as TOR, in 1997.

The U.S. Navy published the TOR code for the use of the public in 2004 and 2006 a group of developers built the TOR project and published the service currently in use.

Download TOR From Here https://www.torproject.org/download/download

Why Google Won’t Find Everything?

Present’s biggest search engines are much more capable than they were 20 years ago. They can foretell your search, perform multi-word queries, and serve billions and trillions of webpages.

Nevertheless, despite Google’s web intrepidity, it and other search engines have a very cramped view of what’s out there.

Search engines operate by “crawling” links on a website. If a site owner doesn’t want their page to be disclosed or to be found, it won’t introduce a direct link to that page. If there is no link on a web page, it can’t be crawled or indexed in Google’s extensive search library. As the search engine won’t display the result.

 

The Good, Bad, And Downright Ugly Of The Dark Web

Because the TOR network permits allow users to window-shop

anonymously, it’s used by secret services, activists, law enforcement, whistleblowers, researchers, and users who are forbidden from Internet access.

WikiLeaks is an ill-famed Dark Web site that permits whistleblowers to anonymously upload detailed information is an Assange.

Even the most famous site Facebook has a Dark Web site. Last October, the social media monster began TOR private services so users could avoid bypass monitoring or censorship.

Anonymity, however, tends to have a dark side. The TOR network can also be used to shield the sensitive information of users involved in criminal activity.

 

Types Of Illegal Operations You Could Find On The TOR Network

  • Unlicensed Weapons
  • Illegal Hacking Guides and Pirated Software
  • Pornography
  • Drugs
  • Sales of stolen Credit cards and their information
  • The illegal practice of trading on the stock exchange
  • Hiring trained Killers
  • Gambling
  • Money laundering
  • Sale of fake currency

 

The Silk Road

One of the Popular-known origins of treacherous activity on the Dark Web is “THE SILK ROAD”, also known as the “Amazon of Drugs”. The site marketed high-grade, illegal drugs. Until it was completely shut down by the FBI. Growth, Agora Marketplace, and Nucleus Marketplace are three added examples of famous black market sites.

ethical hacking course in bangalore

October 2013, FBI arrested Ross Ulbricht under the commands of being the sites pseudonymous originator “Dread Pirate Roberts”. On 6 November 2013, Silk Road 2.0 has been introduced, managed by the former administrator of Silk Road. This too was shut down and the operator was arrested on 6 November 2014 as a portion of the so-called “Operation Onymous”. Ross Ulbricht was adjudged of eight charges related to Silk Road in the U.S. Federal court in Manhattan and was convicted to life prison without the possibility of parole

A Site Similar To The Silk Road

The Farmer’s Market was a Tor Similar to Silk Road, but they never used their mood of payments using bitcoins, rather they used PayPal and The Western Union allowed permitted the law enforcement to track the route of their payments and it was consequently shut down by FBI in 2012. Many other sites already existed when silk road was locked down and it was predicted that these would take down the market that Silk Road earlier overlooked. Sites like “Atlantis”, shut down in September 2013, and Project Black Flag, concluding in October 2013, each robbed their user’s bitcoins. October 2013, site named Black Market Reloaded and was shut down temporarily due to the site’s source code was being leaked. The market of many Silk Road followers was reported by the Economist in May 2015.

Kinds Of Web

The Surface Web: Web pages that are shown up on any normal search engines outcomes. And the given search result can be found in Google search, then its 100% sure that it belongs to Surface Web The Deep Web: Any search or content which cannot be displayed in a normal search engine can’t access. Deep Web pages include all sensitive information protected by a login, a page that doesn’t have a link or a website database.

ethical hacking course in bangalore

The Dark Web: A small, unknown corner of the Deep Web that is hidden willfully from normal search. And it can be accessed by a special Web browser for users to access it.

 

Do’s And Dont’s In A Dark Web.

Do’s

  • Make sure Tor is kept up to date
  • Create a new identity when necessary
  • Use a VPN alongside Tor
  • Consider running a Tor relay
  • Use Tor for anonymous email

Dont’s

  • Go overboard with browser add-ons
  • Share your real email address
  • Search the web using Google
  • Maximize the Tor window
  • Use Tor for torrenting

 

Few Links To Access Dark Web

Name              Link                     Description
1. Dream Market            http://6khhxwj7viwe5xjm.onion/                   Drugs, Digital  Goods 
2.Silk Road                http://silkroad7rn2puhj.onion/                   Drugs, Weapons 
3.Valhalla                 http://valhallaxmn3fydu.onion/register/DpXB      Drugs 
4.WallStreet Market        http://wallstyizjhkrvmj.onion/signup             Drugs 

 

Finally, As The Wording Says

The Deeper You’ll go, The Darker it’ll get

Into one’s secret

Into the Space

Into the Web (Internet): One Universe One Rule ……

Phishing Attack | Every Thing you need to know about Phishing

ethical hacking course in bangalore

What Is Phishing?

phishing is a social engineering attack to trick you into revealing your personal and confidential information. It is also a common type of cyber attack. The term phishing is commonly used to describe this artifice. There is also a good reason for the use of ph instead of f. The earliest hackers were known as phreaks. Phreaking refers to the exploration or experimenting and study of telecommunication. Phreaks and hackers have always been closely related. The ph spelling was used to link phishing frauds with these underground communities.

 

History Of Phishing And Case Studies.

A phishing technique was first ever described in detail in a paper presentation delivered to 1987
international HP user group. the first ever known phishing direct attack was attempted against a
payment system affected E-gold in June 2001 which was followed up by a “post-9/11 id check” shortly after the attack on the World Trade Center on September 11 which made a huge noise. And followed by several attacks.
The term phishing can be traced in the early 1990s via American online or AOL. where a group of hackers banded together called themselves as “The Warez Community” are considered as the first hackers. In early fraudulence, they developed an algorithm which allowed them to generate fake credit card numbers. which they would later use to attempt to make phony AOL accounts.

Case Study 1

wanna cry shuts downs business in 180 countries. it is remembered as one of the worst cyber attacks in history. This ransomware attack is suspected of having impacted more than 2,30,000 around 150

countries. The debate is still on the top whether the attack was from a suspected e-mail id or the
other phishing method used.

Case Study 2

Google docs hacked over 3 million people stopped working worldwide on May 2017 where phisher was
caught sending fraudulent emails inviting to edit Google Docs. on opening the invitations they were
brought to a tricky third-party app, where the phishers were able to access peoples Gmail accounts.

Case Study3

Facebook and Google took for $100 million after the month of this incident U.S. Department of Justice (DOJ) arrested Lithuanian man for allegedly stealing of $100 million from the two top know companies of U.S. the phishers targeted attack successfully by using phishing email by inducing employees into wiring the money to overseas bank accounts under his control.

 

Types Of Phishing   

  • Deceptive Phishing
  • Spear phishing
  • Whaling
  • Pharming

Deceptive Phishing:

Deceptive phishing is one of the most used phishing methods. In this method, the attackers attempt to gather all the confidential information from the victims. These attackers use the gathered information to steal or to launch other attacks. A fake email is been generated from a bank asking you to click a link and verify your account details.

Spear Phishing:

Spear phishing basically targets individuals instead of a large group. Attackers usually

a victim on social media and other websites so that they can customize their communication and appear more realistic Spear phishing is one of the most commonly used or the first step used to penetrate a company’s defenses and carry out an attack research their

Whaling:

whaling is a method used to attack directly senior or important individuals at an organization or a company. These attackers often spend a huge amount of time on target by gathering information. once an opportune moment is gained they launch an attack or steal login credentials. whaling attack is
only targeted on high-level executives who are able to access the confidential part of the company’s
information. This method is also known as CEO fraud.

Pharming:

pharming is as similar as a phishing attack. here the victims are directed to bogus sites through fictitious emails and to reveal their sensitive information. But in pharming, the victim does not even have to click on the link in the email. the attacker can easily infect the user’s computer or the web server and redirect it to a fake site even if the correct URL is entered.                                       

Prevention Of Phishing

  • Keep informed of phishing technique
  • Think before you click
  • Install an anti-phishing toolbar
  • Verify sites security
  • Check online account regularly
  • Keep your browser up to date

Keep Informed Of Phishing Technique:

modern phishing technique is being developed in the upcoming days. without the knowledge, you can easily fall for a phishers trap. to avoid it get regularly updated on the phishing scams as early as possible. By all these awareness u will be at a much lower risk of becoming a prey to an animal. for IT users ongoing security awareness training and simulated phishing is highly recommended for the safety of a top organization.

Think Before You Click:

It’s fine to click on a link that is on trusted sites. but clicking in a link that appears in a random email with a grammatical error and with different links is not a smart move. A phishing email may claim to be from atop institutions, company, organization etc. it may look same as the original website. but the email may ask u to fill the information through which they can access all your personal details. So think before you click.

Install An Anti-Phishing Toolbar:

Most of the internet browser can be customized with anti-phishing toolbars. This helps with a quick check of the phishing threats that you are visiting and compare them with the list of the phishing websites. if the enter or click on a phishing site or link it alerts us about it. this is one the protective layer of anti-phishing scams.

Verify Sites Security:

It’s natural to share a little sensitive financial information online. as long as we make sure that the website is secured. however to be on a safer side check the site’s URL begins with “https” and a closed lock icon near the address bar. If you are alerted by an anti-phishing tool that the site contains any malicious files, do not enter the site and never download any files from malicious websites or emails. By using a cracked software it may lead u to a phishing website which offers low-cost products. by purchasing at these websites the user financial details like debit card details etc can be accessed by cybercriminals

Check Online Account Regularly:

if you don’t visit your online account frequently or for a while, there are chances of a phishers field day with it. so it is advisable to check your online account every now and then and to have a strong password. to prevent bank phishing and credit card phishing scams, you need to personally ensure that there is no fraudulent transaction happening without your knowledge.

Keep Your Browser Up To Date:

security updates are released frequently for all popular browsers. they are released to fix the security loopholes and to face the upcoming threats. regular updates can keep you safe from phishing and other kinds of cyber attacks.

These are the few important steps to be followed to prevent yourself from phishing attacks

Social Engineering Attacks: A Complete Step by Step Guide

ethical hacking course in bangalore

SOCIAL ENGINEERING ATTACKS

What Is Social Engineering?

Social Engineering is techniques used by cybercriminals to gain your confidence to trick you giving them your personal details such as your account credentials so they can gain complete access to your accounts, device or network. these attacks can be performed anywhere where human interaction is involved. In addition, many individuals don’t easily realize the value of personal details and maybe not sure of how to protect that information from such attacks.

How Social Engineering Works?

Social Engineering Attacks are considered as the first approach in most of the attacks as its easier to exploit by your trust in someone help in discovering different ways to hack into your account, system or network.
For Example, its always considered to trick someone into giving you their password than actually  hacking  into servers and retrieve the password

Almost Every Cyber Attacks usually consist of social engineering attacks such as Phishing Email which is used to convince someone they are from a legitimate source like [email protected] or from someone trusted contacts which are usually containing an attachment with a virus which can infect your system and gain complete access to your system or network.

What Are Different Types Of Social Engineering Attacks?

Different types of Social engineering attacks that can be performed anywhere where human interaction is involved. The following below are the most popular social engineering attacks.

Phishing Attack

Phishing Attack is one of the most popular social engineering attacks types used by attackers, an attacker usually send phishing scams such as a text message or email which makes a person curious to click on malicious links or mail attachments that contain malware which give an attacker complete access to system or network of the victim.
Most Phishing attack has these characteristics such as

  • Hacker usually embedded links or Shorten links that redirect the users to the malicious link which appear legitimate.
  • Makes the user curious, fear or sense of urgency to click on the link.
  • Most Attacks Seek information Such as name, date of birth, address, phone number, bank details, OTP (One Time Password).
  • Makes the URL of website look similar to legitimate

Pretexting

Pretexting is a form of social engineering attacks where hacker mainly focuses on questions that appear to be required to confirm identity and steal personal information of the victim. Most of the scam is often pretend to be the person that they need certain bits of information from their target in order to confirm their identity.

The Hacker usually starts by establishing trust with their victim by impersonating like a Police officer, Bank authorized person or someone who have the right to know. They ask questions that are generally required to confirm the victim identity, through which they gather information about the victim for the attack.

More advanced attacks of pre-texting will target to exploit the structural weaknesses of an organization

All sorts of Information is gathered using this technique such as name, date of birth, address, phone number, bank details, OTP (One Time Password).

Unlike phishing attacks which makes the user curious, fear and sense of urgency. Here pretexting attacks depends on establishing a completely false sense of trust with the victim. This requires the hacker to build a great story that leaves no doubt to the victim about the hacker.

Baiting

Baiting is considered as much similar to phishing attacks in many ways, we can define Baiting attacks that are used for a fake promise to irritated curious victims. they tempt the user to fall for the trap so they can steal their personal information which is not just restricted to online but also Attackers can also focus on exploiting human curiosity with use of physical media.

Baiters most of the time offer an individual with free software or document files to downloads so can infect their system or network to gain complete access and steal the information required by them.

Baiting scams don’t necessarily have to be carried out in the physical world. Online forms of baiting consist of ads to a malicious website or download a file which is infected by malware.

Unusual Social Engineering Attacks

Unusual Social Engineering Attacks method is more complex methods used by an attacker to hack into system or network of the victim and gain the complete access.

  • Many different users receive a fake email that claimed to be from the Apple – asking the user to confirm their identity so they can refund amount – the email received seems from legitimate and many users got infected from this.
  • The attacker used CD to attack the victim which was trojan spyware infected. The CD disk is infected and given to victim which help to get access into different individuals and companies system or network.

 

How To Prevent Social Engineering Attacks?

To overcome the familiarity exploit, the user must be trained to not compromise familiarity with security measures. Even the people in and around familiar should prove that they have the authorization to access certain areas and information

  • To defend from intimidating circumstances attack, users must be highly trained to identify social engineering techniques that fish for the sensitive information and reject by saying no.
  • To counter any phishing techniques, many sites such as Yahoo use secured connections and encrypt data prove that what they are trained for. checking the URL may help you find fake sites. avoid responding to emails that request you for personal information
  • To tackle tailgating attacks, users must not allow others to use their security clearance to gain access to restricted areas. each user must use their own access clearance
  • To counter human curiosities, it’s better to pick up flash disks to a system admin who needs to scan for viruses or other malware on an isolated machine.
  • To tackle techniques that exploit human greed, employees must be trained not to fall to that trap.
  • Never open any emails from an untrusted source.
  • Never offers from strangers the benefit of the doubt. if they seem to be very good, they probably are phishers.
  • Lock your laptops whenever you are not at the workstation.
  • Purchase anti-virus and update it on a regular basis. No ant-virus solution can defend you 100%. It will just help you in protecting against the cyber threat.
  • Read the company’s policies terms and conditions to understand what circumstances you can let any stranger into the building.

How Can I Educate My Employees To Prevent Social Engineering?

Protection against social engineering starts with educating yourself– users must be properly trained to never click on suspicious links and always take care of their log-in credentials, even at office or home. In the events where the social tactics are successful, they are likely to result in a malware injection. To combat trojans, rootkits, and many more, It’s difficult to employ high-quality Internet security that can both eliminate infectiously and help track their source

Get your team trained on Ethical Hacking and Cyber Security by our Cyber Security Professional, Contact us for more details regarding Course Curriculum.

 

Everything You want Know About Man in The Middle Attack

What Is Man In The Middle Attack?

Man in the middle attack most importantly requires three players. First comes the victim, second comes the entity with which the victim trying to communicate, and the man in the middle. And the worst part of Man in the middle attack is that the victim has no idea of the interception.

How Precisely Does A Man-In-The-Middle Attack Work?

Let us assume you have received an email that appeared to be from your bank, asking you to log in to your account to verify your account information. As soon as you click on the link in the email and you are taken to a fraudster website where its just the replica of your original bank website, where you log in and perform the requested task by the middle man.
Man-in-middle-attack is a type of eavesdropping attack when a phisher inserts himself as a proxy into a communication session between people or system. A MITM attack exploits the conversation, transfer of other data or real-time processing. MITM attack allows a phisher to intercept, send or receive data without even the notice of the owner.

MITM Attacks: Close To You Or With Malware

Man-in-the-middle attacks come in two forms, one that involves physical proximity to the intended target, and another that involves malicious software, or malware. This second form, like our fake bank example above, is also called a man-in-the-browser attack. Attackers execute a man-in-the-middle attack in two phases — interception and decryption.

With a traditional MITM attack, attackers need access to an unsecured or poorly secured Wi-Fi router. These types of connections are generally found in public areas with free Wi-Fi hotspots, and even in some people’s homes, if they haven’t protected their network. Attackers will scan the router looking for specific vulnerabilities such as a weak password. Once attackers find a vulnerability, they’ll use tools to intercept and read the victim’s transmitted data. They then insert their tools between the victim’s computer and the websites the user visits. A successful man-in-the-middle attack does not stop at the interception. The victim’s encrypted data has to be decrypted so that the attacker can read and act upon it.

The Man-In-The-Middle Attack Is Of  Two Forms

  1. Physical proximity to the intended target
  2. Malicious software or malware (main in browser attack)

phishers execute man-in-the-middle attack in two phases interception and decryption. With a traditional MITIM attack, phishers need access to a wi-fi network, so they firstly hack into a wi-fi network. these types of network or connections are available in public areas, or even in some people’s home. If the wi-fi is not protected with strong security. Phishers will scan the router looking for a specific vulnerability such as a weak password. Once the vulnerabilities are found, phishers will use tools to intercept and read the victim’s personal data, transferred data and much more. Then a tool is inserted between the victim’s computer and the website the user visits. Any successful man-in-middle attack does not stop an interception. The victim’s encrypted data is later decrypted so that the reader can read and act accordingly to it.

Types of Man-in-the-Middle Attacks

  • Rogue Access Point
  • ARP Spoofing
  • mDNS Spoofing
  • DNS Spoofing

Rogue Access Point

Devices that are equipped with wireless cards will often try to auto connect to the network emitting the strongest signal. Attackers can set up their own wireless network and trick nearby devices to join its domain. All of the victim’s network traffic can be manipulated by the attacker. This method is so dangerous because the attacker does not even have to be on a trusted

ARP Spoofing

ARP is the Adress Resolution Protocol. It is used to project IP address to physical MAC addresses in a local network. When a host needs to communicate to a host with a given IP address, it references the ARP cache to project the IP address to a MAC address. If the address is not found, a request is made asking for the Mac address of the device with the IP address. An attacker wishing to pose as another host can respond to the request it should not be responding to its own MAC address. With some precisely placed packets, a hacker can identify the private traffic between two hosts. And extract all the confidential information, such as yielding full access to application accounts that are not accessible by everyone or exchange of session tokens.

MDNS Spoofing

Multicast DNS is similar to DNS, it’s done on a local area network (LAN) using broadcast like ARP. The local name resolution system makes the configuration of network devices extremely simple. Users don’t have to know exactly which addresses their devices is communicating. Devices such as printers, Tv’s, and other entertainment systems make use of this kind of protocol since they are connected to a trusted network. When an app needs to know the address of a device or any entertainment system. An attacker can easily slide into these kinds of the system by a fake data request instructing the system to resolve the address and here by taking control over the system. So to avoid these kinds of attacks devices keep a local cache of addresses. Which protects the devices from the attack.

DNS Spoofing

DNS Spoofing is similar ARO resolves IP address MAC addresses on a Local Area Network, DNS projects the domain name to IP address. When using a DNS spoofing attack, the attacker tries to introduce corrupt DNS cache information to a host in an attempt to access another host using their domain names, such as www.onlineshopping.com. This will lead to the victim sending sensitive information to a fraudulent host, with the trust and confidence they are sending the information to a trusted source. Attackers who have already spoofed the IP address could have will have an easier time spoofing DNS easily by resolving the address of a DNS server to the attacker address

Case Studies

A huge bust on a multinational company nabbing 49 suspects throughout Europe.
They were arrested on suspicion of using Man-in-the-Middle attack. The main motive of the attack was to intercept payment request from emails.

As Europol detailed in a statement, the raid was coordinated by Europol’s European cybercrime center (EC3), led by the Spanish National Police, Italian Polizia di Stato, the Spanish National Police and the Polish Police central Bureau of Investigation supported by Uk law enforcement bodies.
The suspects were arrested at multiple places in Italy, Poland, Spain, The UK, Georgia, and Belgium.
Police seized external hard disks, laptops, telephones, tablets, credit cards, SIM Cards, cash, memory sticks etc.

Further investigation uncovered international fraud totaling $ 68,57,730 that was recovered in a short period of time.

The team’s main targets were medium and large European company via Man-in-The-Middle attacks.
The suspects used social engineering and management and were able to insert malware or spyware onto the network of the target. Once the communication is established with the target’s device they access to the required data like emails, banking info, and many more.
The fraudsters then set up a similar transaction with the targets real site.$6.8 million

Prevention Of Man-In-The-Middle Attack.

With the arena of tools readily available to carry out attacks like Man-in-The-Middle attacks, it takes many steps to help protect yourself, your data, and your connections.

Make sure the “https” is always there on the website you visit to ensure your safety.
Be aware of tricky phishing emails from attackers asking you to update your bank info or any other login credentials.
Instead of clicking on the link provided in the emails, manually type the web addresses in the browser.
Never connect to public wi-fi without activating a VPN ( Virtual Private Network ) like Turbo VPN, Norton Secure VPN, etc. A VPN encrypts your private IP addresses provided from the local internet provider which helps in protecting your private data.
Be sure that the wi-fi you connect is completely secure.

In our rapidly growing connected world, it’s important to know the type of threats and how to be protected from those kinds of threats. So protect your devices and network with proper protection to stay safe and secure