Thursday, 1 June 2017

Difference Between The Internet, The Web, The Deep Web, and The Dark Web

To discuss these things and figure out the Difference Between The Internet, The Web, The Deep Web, and The Dark Web, we will start with basics of Internet and Web. Because most people confuse between the deep web and the dark web and how they’re different.


Internet: The internet is the physical connection of all the computers that are joined together across the world, it started off with ARPANET in the late 60s which was research agencies getting together to connect their computers from a long distance and this is when computers were huge things in massive rooms and then that graduated to the NSFNET, which was the National Science Foundation net which was all the universities connecting together into a, kind of bigger network and in the start of the 90s it became the internet, where they connected more broadly to commercial networks as well as research networks.

Web: The web is the software that runs on the physical internet, that is a way of sharing information across all those different computers. The web is just one type of software on the internet other types of software include email exchange (SMTP), file transfer protocols (FTP), where we can send files to other computers, so it’s just a type of software that runs on the physical internet.


How do you view the web?

We have web browsers like Chrome, Safari and Firefox and they just know how to talk to the web to ask for pages and to get things. There’s two key bits of the web which make it work, the first one is URLs- Uniform Resource Locators and the second one is an HTTP Server (Hypertext Transfer Protocol Server) or a Web Server and this server runs on those physical computers that stores information in the form of pages and data and they send it to the person who is looking for this using URLs.

Deep Web: This is a part of web we are not allowed to see or google is not allowed to see or can’t find or hasn’t found, in easiest way we can say Deep Web is a huge portion of the web which google doesn’t have access.


Secrets of The Deep Dark Web:

There are four examples that makes Deep Web different from the Webà

·         Any place that we go we must type in the passwords (stuff behind passwords) kind of Bank Information, profile pages on Amazon etc. but the main page of Facebook and Amazon are on the surface web that the google can see.
·         Dynamic Content: Content which gets generated based on what you do or where you are i.e. Facebook feed which is always changing.
·         Robot Exclusion Standard: Most website have a file which is robots.txt on the server and that says to google or other search engines, you can look at those pages but don’t look at these pages and Google simply just doesn’t index them.
·         Nobody’s Ever Link:  It has never been found as this google spiders have never followed a link to find it. (95% of the web is Deep Web)

Dark Web: Dark Web is just the web but built differently and there are several dark webs, they sit on the internet and overlay the same internet like the web does. They just talk different languages, they have secret handshakes and they encrypt things in different ways. A good example of a Dark Web is Tor which is the “Onion” - where you go to .onion pages rather than .com pages, it’s just different language, different codes and the way you asked for a page is differently so ever. Other examples of Dark Web are .rdos, .lll, .clos etc.


·         It protects you and anonymity by encrypting everything and lots of layers sending in an unusual route.

DEFCON Hacking Conference - Held Annually in Las Vegas


DEFCON was founded by Jeff Moss is 1993 as a farewell party for his friend, member of “Platinum Net” and fellow hacker. DEFCON term comes from movie WarGames, referencing the US Armed Forces DEFense readiness CONdition.

DEFCON 25 is a four-day event being held at Caesars Palace in Las Vegas, USA from 27th July to 30th July 2017.



DEFCON 25 Fee: $260.00 USD, Cash for all four days. Everyone have to pay the same fee (Cash) including the government, media, ‘well known hackers’, and the unknown script kiddies. Goons and speakers only will get discount for DEFCON 25, and Only Cash will be accepted.

Age Limit for DEFCON 25: There are no age limits but you must be 18 years of age or older to book hotel room and check-in. A valid ID prof will be required upon check-in. and there will be 21 or older rule for certain “private” parties with bouncers at the doors checking IDs. Generally, this rule will be applicable for all areas where alcohol is being served. Presentations are open for all ages but in some contests, may have age restrictions for competition due to laws.


Black Badge: To the contest winners of certain events Black Badge is the highest award DEFCON gives. Sometimes Capture the flag (CTF) and Hacker Jeopardy winners earn these but mostly varies from year to year.
Best hacks at the conference receives a Black Badge that allows lifetime free entry to DEFCON.



List of Black Badge Holder’s:

CONFERENCE
COMPETITION
WINNER
DEFCON 8
Hacker Jeopardy
Izaac
DEFCON 9
Hacker Jeopardy
Izaac
DEFCON 10
Cannonball Run
Capture the Flag
Hacker Jeopardy
Scavenger Hunt
Slogan Contest
War Drive
Evel Matt
Digirev
Detroit Crew
Team Exodus
Neal Krawetz
Wireless Con
DEFCON 11
Capture the Flag
Hacker Jeopardy
Robot Warz
Scavenger Hunt
War Driving
WiFi Shootout
WiFi Showdown
Team Anomaly
Condor, Blueboar
Kallahar
Team: Elitist Cunts
Arkasha, Bobzilla, Mentat
Slink
Pukingmonkey
DEFCON 12
Artwork (Red Bull Can)
Cannonball Run
Capture the Flag
Coffee Wars
Lock Picking (Obstacle Contest)
Lock Picking (Speed Contest)
Robot Wars
Scavenger Hunt
TCP/IP Embedded Device
The Leetest Link
T-shirt Contest
WiFi Contest: Fox and Hound
WiFi Shootout
Effffn
Matt
Sk3wl 0f r00t, led by Chris Eagle
Hook
Qmark
Lemon Jello
Team Irvine
Poor Social Engineers
1o57
Vicky
JesseK
Renderman and Deviant Ollam
P.O.D.
DEFCON 13
Cannonball Run
Capture the Flag
Hacker Jeopardy
Program Cover Photo
Robot Warz
Scavenger Hunt
WarDrive
Gizm0
Shellphish
Jennifer Bennett, JMK
John D
Team Florida
Timmy Needs a Liver
Preset Kill Limit
DEFCON 14
Capture the Flag
Hacker Jeopardy
Lock Picking (Speed)
DEF CON Robot Contest
Scavenger Hunt
l@stplace
NYMPHS
Omicron
Team Octopi
Vegas 2.0
DEFCON 15
Capture the Flag
DEF CON Robot Contest
Hacker Jeopardy
Mystery Challenge
l@stplace
Team Octopi
Kumquat
Grifter
DEFCON 16
Capture the Flag
DEF CON Bots
Hacker Jeopardy
Mystery Challenge
Open CTF
sk3wl0fr00t
Team Yozhik
NYMPHS
Grifter, Bunni
Team V&
DEFCON 17
Badge Hacking Contest
Capture the Flag
Gringo Warrior
Hacker Jeopardy
HFC
Mystery Challenge
Open CTF
Zoz
Team VedaGods
Nuclear Steve
Team Nicehat
HDM
Grifter
Team Quail
DEFCON 18
Badge Hacking Contest
Capture the Flag
Gringo Warrior
Hacker Jeopardy
Mystery Challenge
Social Engineering CTF
IPSIN
ACME Pharm
Nuclear Steve
Daniel Pops
Krux
Phat32
DEFCON 19
The Badge
Capture the Flag
Gringo Warrior
Social Engineering CTF
designed by 1o57
European Nopsled Team
Dr. Tran
Amoeba Wonderwall
DEFCON 20
The Badge
Black Bag
Badge Challenge
Badge Hacking
Bro CTF
Capture the Flag
Capture the Packet
Crash and Compile
Mystery Challenge
Scavenger Hunt
Services Rendered (Contributor)
Services Rendered: (CTF Organizing)
Services Rendered (Goon)
Social Engineering CTF
Tamper Evident
designed by 1o57
Ray
MLF
Mailglare
Team Virgins
Samurai
Team Strawberries
Team Nullstring
Psychoholics
Re-engineering Sex Toys
Winn Schwartau
DDTEK
Lockheed, Heather
Shane
Motherfucking Professionals
DEFCON 21
The Badge
Badge Challenge
Badge Crypto Challenge
Badge Hacking
Capture the Flag
Capture the Packet
Hacker Jeopardy
Hacker Pyramid
Services Rendered as Goons
Social Engineering CTF
designed by 1o57
Team MLF
Decrement, Jabroni
Llama Princess
Plaid Parliament of Pwning
CCSF_HACKERS
phreck, DocWho
Zoz, Lintile
Noid, Lunaslide, Londo, Zac
Lilly
DEFCON 22
The Badge
Badge Contest
Black Bag Contest
Capture the Flag
Capture the Packet
DEF CON Darknet Project
Lockpicking
1o57 Badge Hacking
Open CTF
Social Engineering CTF
designed by 1o57
MLF
Sec
Plaid Parliament of Pwning
Umi
Silk
Skynet, Big Ezy
Beeker
Team Neg9
sn0ww, amidda
DEFCON 23
The Badge
Badge Challenge
Capture the Flag
Crash and Compile
Hack Fortress
OpenCTF
Scavenger Hunt
Social Engineering CTF
Warl0ck gam3z
designed by 1o57
Council of Nine
DEFKOR
Volatile Consts
Team !rdy4this
0x8F
A Glen Greenwald Santorum
Jen F.
ggulfunny
DEFCON 24
The Badge
Badge Challenge
Capture the Flag
SoHopelessly Broken (IoTCTF)
Capture the Packet
The DEF CON Darknet Project
Wireless CTF
Social Engineering CTF
Car Hacking CTF
CGC
designed by 1o57
Council of Nine
Plaid Parliament of Pwning (PPP)
CYDY
Mon
ohaithear
dEM
Chris S.
compukidmike
apr
DEFCON 25
Coming Soon!!!
Coming Soon!!!


Basics of Blockchain, Bitcoin, Cryptocurrency, Mining. Security in Blockchain and possible attacks against Blockchain? Use of Blockchain in Real life?

·        Blockchain What is Blockchain? Definition à   Blockchain is a consensus based secure Decentralized Public Database ...