{"id":31298,"date":"2018-10-15T13:24:12","date_gmt":"2018-10-15T07:54:12","guid":{"rendered":"https:\/\/www.wikitechy.com\/technology\/?p=31298"},"modified":"2020-08-02T18:48:28","modified_gmt":"2020-08-02T13:18:28","slug":"types-of-web-in-hacking-world","status":"publish","type":"post","link":"https:\/\/www.wikitechy.com\/technology\/types-of-web-in-hacking-world\/","title":{"rendered":"Types of Web in hacking World"},"content":{"rendered":"<p style=\"text-align: justify;\"><b>Level 1- The Surface Web<\/b><\/p>\n<ul style=\"text-align: justify;\">\n<li>The web that the vast majority of internet users are accustomed to.<\/li>\n<li>Accessible in any nation that does not block internet access, even places like China and Egypt.<\/li>\n<li>Social media sites like <a href=\"https:\/\/www.wikitechy.com\/technology\/hackers-hack-facebook-account-2017-fb-security-tips\/\">Facebook<\/a>, informational websites like Wikipedia, general websites, etc.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><b>Level 2 &#8211; The <\/b><b>Bergie<\/b><b> Web<\/b><\/p>\n<ul style=\"text-align: justify;\">\n<li>The layer of the Surface Web that is blocked in some nations. Some other information is only accessible through illegal means.<\/li>\n<li>Google locked results<\/li>\n<li>Recently web crawled old content<\/li>\n<li>Pirated Media<\/li>\n<li>Pornography<\/li>\n<\/ul>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-31300 size-large\" src=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2018\/10\/types-of-web-1024x692.jpg\" alt=\"\" width=\"1024\" height=\"692\" srcset=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2018\/10\/types-of-web-1024x692.jpg 1024w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2018\/10\/types-of-web-300x203.jpg 300w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2018\/10\/types-of-web-768x519.jpg 768w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2018\/10\/types-of-web.jpg 1098w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2018\/10\/types-of-web-990x669.jpg 990w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: justify;\"><b>Level 3 &#8211; The Deep Web<\/b><\/p>\n<ul style=\"text-align: justify;\">\n<li>Requires a <a href=\"https:\/\/www.wikitechy.com\/technology\/vpn-vs-proxy-vs-smart-dns-whats-difference\/\">proxy<\/a> or two (namely Tor) to access.<\/li>\n<li>Contains most of the archived web pages of the 1990s Web that did not renew their domain names and such.<\/li>\n<li>Government\/Business\/Collegiate Research.<\/li>\n<li>Hackers\/Script Kiddies\/Virus Information.<\/li>\n<li>Illegal and Obscene Content (CP, Gore, Suicides, etc.)<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><b>Level 4- The Charter Web<\/b><\/p>\n<ul style=\"text-align: justify;\">\n<li>Like the Regular Deep Web, but harder to get into and more illegal content.<\/li>\n<li>Advanced covert government research.<\/li>\n<li>Most of the internet black market (run on <a href=\"https:\/\/pawnmybitcoin.com\" target=\"_blank\" rel=\"noopener\">bitcoins<\/a>)<\/li>\n<li>Human\/Arms\/Drug\/Rare Animal Trafficking.<\/li>\n<li>Assassination networks , bounty hunters, illegal game hunting, line of blood locations, etc.<\/li>\n<li>More banned obscene content like CP, Gore, etc.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><b>Level 5-Marianas Web<\/b><\/p>\n<ul style=\"text-align: justify;\">\n<li>Lowest known level of the Deep Web.<\/li>\n<li>Named after the Spanish Technician who created it.<\/li>\n<li>Extremely difficult to access, users say it is the safest part of the internet due to how private it is.<\/li>\n<li>Julian Assange and other top-level Wikileaks members are believed to have access.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><b>Rumored Levels 6-8 Web<\/b><\/p>\n<ul style=\"text-align: justify;\">\n<li>Mostly the stuff of conspiracy theorists.<\/li>\n<li>Level 6 is a giant firewall meant to prevent people from going any further.<\/li>\n<li>Level 7 \u201cThe Fog\u201d is where various worldwide power-players jockey for control of PrimArch. Said to be very dangerous, full of viruses and such.<\/li>\n<li>Level 8 is called PrimArch and is claimed to be controlled by an extremely powerful AI (possibly running on a quantum computer).<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\n","protected":false},"excerpt":{"rendered":"<p>Level 1- The Surface Web The web that the vast majority of internet users are accustomed to. Accessible in any nation that does not block internet access, even places like China and Egypt. Social media sites like Facebook, informational websites like Wikipedia, general websites, etc. Level 2 &#8211; The Bergie Web The layer of the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":31299,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29859],"tags":[61299,85551,85554,85550,85548,85549,85547,85553,85552],"class_list":["post-31298","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking","tag-3-types-of-hackers","tag-7-types-of-hackers-ppt","tag-types-of-hacking-attacks","tag-types-of-hacking-pdf","tag-types-of-hacking-techniques","tag-types-of-hacking-wikipedia","tag-types-of-web-in-hacking-world","tag-what-is-computer-hacking","tag-what-is-hacking"],"_links":{"self":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts\/31298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/comments?post=31298"}],"version-history":[{"count":0,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts\/31298\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/media\/31299"}],"wp:attachment":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/media?parent=31298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/categories?post=31298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/tags?post=31298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}