Deep Web Part 1
Hello, today I will talk about a computer network, which is based on the infrastructure of the Internet.
In it you will find everything that is not in the usual web: the arms trade, drugs, pornography and much more.
Servers with this content are in the zone “Deep Web” (DeepWeb) – segments of the Internet
not available for indexing by search engines.
Access to many of these sites is possible only through a chain of
encrypted connections – TOR-network whose nodes are scattered throughout
the world.
Specifically warn, if you – a normal person, with weak nervous system you should not watch.
If you have strong nerves – than go on:

Management
Console client TORa. The screen displays the current route of the
traffic on an encrypted network. All connections are anonymous, to pave a
new route at any time. At the same TOR can not guarantee 100%
protection from interception, so data can be “heard” at the service
provider at the stage entrance and exit from the network. Client
software can operate in an input or output points, so that it will pass
through another traffic flows and the owner of the computer will always
be able to say “it’s someone else rocked / walked” and will be right. By
the way, about the TOR say that it is up to 99% of the trolls, hackers,
lovers of child porn and FBI agents.
As usual search engine indexing in the network is not available in
TORe popular collections of links to various resources. The most famous
of them – HiddenWiki, one of the biggest. As the access to anonymous, it
is often vandalized, such as removing sections with links to child
porn. Also, it can be found in the archives of all operations AnonOps,
all stolen from the FBI data and files. Some information might have
envied even WikiLeaks.

HackBB
– one of the largest boards for the exchange of experience in the field
of cybercrime. There is also a kind of market where you can buy a pack
of credit card data, spambots, you order a DDoS (for example, LJ), or
break-mail address or a specific site. Most of the transactions passing
through an intermediary – a person with an established reputation that
will not lose it for immediate gain. Of course, the mediator takes a
percentage for their services. In general, trade credit card data, but
once sold, even the administrator account in World of Warcraft.

Prices
are not very large. These cards are from the skimmers at ATMs. With
these cards you can easily make purchases on the Internet. Slightly more
expensive are the data from the pin and full scans of cards – such
information can make a real card and make purchases in stores.

Because
encryption and a great chain of connection speed in knots TORe very,
very low, so most sites are designed very ascetic. Often, it is plain
HTML, just like 15 years ago when we used dial-up access.


Here is a starting scam with Verizon employe:


Reader for the cards, is established as a pad on the ATM.

Her insides. A miniature camera, and Flash memory.

Examples of installation. Complete with Skimmer and driver.

No comments:
Post a Comment