Friday 17 February 2012

Deep Web underworld web - Part 1

Deep Web Part 1

Hello, today I will talk about a computer network, which is based on the infrastructure of the Internet.
In it you will find everything that is not in the usual web: the arms trade, drugs, pornography and much more.
Servers with this content are in the zone “Deep Web” (DeepWeb) – segments of the Internet
not available for indexing by search engines.
Access to many of these sites is possible only through a chain of encrypted connections – TOR-network whose nodes are scattered throughout the world.
Specifically warn, if you – a normal person, with weak nervous system you should not watch.
If you have strong nerves – than go on:
Management Console client TORa. The screen displays the current route of the traffic on an encrypted network. All connections are anonymous, to pave a new route at any time. At the same TOR can not guarantee 100% protection from interception, so data can be “heard” at the service provider at the stage entrance and exit from the network. Client software can operate in an input or output points, so that it will pass through another traffic flows and the owner of the computer will always be able to say “it’s someone else rocked / walked” and will be right. By the way, about the TOR say that it is up to 99% of the trolls, hackers, lovers of child porn and FBI agents.
As usual search engine indexing in the network is not available in TORe popular collections of links to various resources. The most famous of them – HiddenWiki, one of the biggest. As the access to anonymous, it is often vandalized, such as removing sections with links to child porn. Also, it can be found in the archives of all operations AnonOps, all stolen from the FBI data and files. Some information might have envied even WikiLeaks.
HackBB – one of the largest boards for the exchange of experience in the field of cybercrime. There is also a kind of market where you can buy a pack of credit card data, spambots, you order a DDoS (for example, LJ), or break-mail address or a specific site. Most of the transactions passing through an intermediary – a person with an established reputation that will not lose it for immediate gain. Of course, the mediator takes a percentage for their services. In general, trade credit card data, but once sold, even the administrator account in World of Warcraft.
Prices are not very large. These cards are from the skimmers at ATMs. With these cards you can easily make purchases on the Internet. Slightly more expensive are the data from the pin and full scans of cards – such information can make a real card and make purchases in stores.
Because encryption and a great chain of connection speed in knots TORe very, very low, so most sites are designed very ascetic. Often, it is plain HTML, just like 15 years ago when we used dial-up access.
Here is a starting scam with Verizon employe:
Reader for the cards, is established as a pad on the ATM.

Her insides. A miniature camera, and Flash memory.
Examples of installation. Complete with Skimmer and driver.

No comments:

Post a Comment