Você está na página 1de 31

Cybercrime Capacity Building Program in Latin America and the Caribbean

Tecnicas de
investigacion en la
DarkWeb
Fernando Fernandez Lazaro
Coordinador Laboratorio Forense Digital
Innovation and Outreach Directorate
OBJECTIVOS

Al final del modulo se conseguira :

1. Identificar 2 metodos de acceder a la Darkweb


2. Conocer como funciona TOR
3. Aprender 3 metodos de busqueda e investigacion
en la Dark Web
Que conexion hay entre
estas dos imagenes?

en.wikipedia.org

www.amazon.com
techno-radar.com
Overlay Networks

The Onion Router (Tor)


Freenet
The Invisible Internet Project (I2P)
https://tor2web.org/
Exercise

Google: onion.city onion.link


and then Ransomware
Tor (The Onion Router)

Hidden services Relays


Multi-layered encryption
https://www.torproject.org
https://guardianproject.info/
Malware for sale Doxing
$150-400 $25 to $100
E-learning
How to make a Botnet
Vulnerabilities

Fullz
Hacking (for Hire) DUMPss
http://2ogmrlfzdthnwkez.onion/
CVVs

Stolen accounts and identities


Ransomware
Spam and phishing campaigns
Weapons Terrorism

Counterfeit money

Human trafficking
Thieves and burglars

Assassination services

New Life Identity


Human experiments
Money laundering
https://www.deepdotweb.com/ http://thehiddenwiki.org/
http://darkwebnews.com/
https://dnstats.net/market-comparison
Otros recursos
Buscadores (Sinbad, Candle, Visitor)
Directorios de links (Onion Soup , Onion Link Directory,
Onion Dir)
Web applications (Pastebin, Anon PasteBin, ZeroBin)
Forums (The Hub)
Social media (Galaxy2)
Boards/chans (8chan)
The Google Search That Took Down Ross Ulbricht

http://motherboard.vice.com/read/the-google-search-that-took-
down-ross-ulbricht
Resumen
Conclusiones
Preguntas

Thank You-Merci-Gracias

f.lazaro@interpol.int

Você também pode gostar