What is the

Web?
The web is the common name for the World Wide Web, a subset of the internet consisting of the pages that a Web browser can access. … However, the term Internet refers to the global network of servers that makes the information sharing that happens over the web possible.
TYPES OF WEB

1.) Web 1.0
Web 1.0 refers to the first stage of the World Wide Web evolution. Earlier, there were only a few content creators in Web 1.0, with a massive majority of users who are consumers of content. Personal web pages were standard, consisting mainly of static pages hosted on ISP-run web servers or on free web hosting services.
2.)Web 2.0
Web 2.0 refers to websites highlighting user-generated content, usability, and interoperability for end users. Web 2.0 is also called the participative social web. It does not refer to a modification to any technical specification but to modifying the way Web pages are designed and used. The transition is beneficial, but it does not seem that when the changes occur. Interaction and collaboration with each other are allowed by Web 2.0 in a social media dialogue as the creator of user-generated content in a virtual community. Web 2.0 is an enhanced version of Web 1.0
3.) Web 3.0
It refers to the evolution of web utilization and interaction, which includes altering the web into a database. It enables the up-gradation of the back-end of the web after a long time of focusing on the front-end (Web 2.0 has mainly been about AJAX, tagging, and other front-end user-experience innovation). Web 3.0 is a term used to describe many evolutions of web usage and interaction among several paths. In this, data isn’t owned but instead shared, where services show different views for the same web / the same data.
What is Web Intelligence?
Web Intelligence (WEBINT) is a means to efficiently identify the intelligence available in open source (OSINT). Structuring and visualizing web-based information allows an analyst to surface tactical information like technical indicators and strategic understandings like the swaying sentiment of a troubled region.
🍎Tools Link 🍎
🍏Access Check https://accesscheck.thenetmonitor.org
🍏AFRINIC https://www.afrinic.net
🍏APNIC https://www.apnic.net
🍏ARIN https://www.arin.net
🍏 Website Search Tool https://www.aware-online.com/osint-tools/website-search-tool
🍏Better Whois http://www.betterwhois.com
🍏Central Ops http://centralops.net
🍏Complete DNS https://completedns.com
🍏Daily Changes http://dailychanges.domaintools.com
🍏Danger Zone https://github.com/woj-ciech/Danger-zone
🍏Da.whois https://dawhois.com
🍏Dedicated or Not http://dedicatedornot.com
🍏Denic web whois https://www.denic.de/webwhois
🍏DNSDumpster https://dnsdumpster.com
🍏DNS History http://dnshistory.org
🍏DNS Lookup https://dnslookup.online
🍏DNSlytics https://dnslytics.com
🍏dnspop https://github.com/bitquark/dnspop
🍏DNS Queries https://www.dnsqueries.com
🍏dnsrecon https://github.com/darkoperator/dnsrecon
🍏DNS Root Instances https://atlas.ripe.net/results/maps/root-instances
🍏DNSSec Analyzer https://dnssec-analyzer.verisignlabs.com
🍏DNS Spy
https://dnsspy.io
🍏DNSStuff http://www.dnsstuff.com
🍏DNSTools http://www.dnstools.ch
🍏DNS Trails http://dnstrails.com
🍏DNS Trails https://securitytrails.com/dns-trails
🍏dnstwist https://github.com/elceef/dnstwist
🍏dnstwist
https://dnstwist.it
🍏dnstwister https://dnstwister.report
🍏DNSViz
http://dnsviz.net
🍏Domain Big Data http://domainbigdata.com
🍏Domain Crawler http://www.domaincrawler.com
🍏Domain Dossier http://centralops.net/co/DomainDossier.aspx
🍏Domain Eye https://domaineye.com
🍏DomainIQ https://www.domainiq.com
🍏Domain SDB https://domainsdb.info
🍏Domain To IP Converter http://domaintoipconverter.com
🍏Domain Tools https://www.domaintools.com
🍏Domain Tools http://whois.domaintools.com
🍏DomEye https://xaviesteve.com/domeye
🍏downdetector http://downdetector.com
🍏downforeveryoneorjustme http://downforeveryoneorjustme.com
🍏DNS Checker https://dnschecker.org
🍏DShield API https://isc.sans.edu/api
🍏EasyCounter WHois https://whois.easycounter.com
🍏Easy whois https://www.easywhois.com
🍏Educause Whois Lookup https://net.educause.edu/whois.htm
🍏Geektools http://www.geektools.com/whois.php
🍏Lookup https://www.infobyip.com/ipbulklookup.php
🍏Network Tools http://network-tools.com
🍏NS.Tools
https://ns.tools
Onyphe https://www.onyphe.io
🍏OpenData Rapid7 https://opendata.rapid7.com
🍏The Prefix Whois Project https://pwhois.org
🍏PTRArchive http://ptrarchive.com
🍏Purplepee.com https://purplepee.co
🍏RedirectDetective http://redirectdetective.com
Now let’s discuss types of Web parts :

What is the Surface Web?
The surface web is also called the visible web, or the Indexed Web is the web that we use on a day-to-day basis. We are using this web to conduct our regular activities. We are all immersed in the surface web. It is where our daily online activities take place and what most people consider the internet.
What is Bergie Web?
The second level is the last normally accessible level of the internet i.e., bergie web. All levels that follow this one must be accessed with a proxy, Tor, or by modifying your hardware. At this level you can find some “underground” but still indexed websites, such as 4chan. 4chan is an image board website where users post anonymously.
What is the Deep web?
The Deep Web is worldwide Web content that is not included as a part of the Surface Web. It is hidden from the outside world, so standard search engines do not index it. It is the largest expanding category of new information on the internet. The total quantity of the deep web is 1000-2000X greater than the quantity of the Surface Web.
What is Charter web?
The fourth level, Charter web is also divided in two parts. The first can be accessed through Tor. It is the most accessed part of the deep web. Things like human trafficking and drugs, banned movies and books and black markets exist there. The first website you visit trying to get into the deep web is hidden Wikis links.
What is the DarkWeb?
Dark web can be accessed through a hardware modification: a “Closed Shell System”. Here, shit becomes serious. This is a part of the Charter Web contains hardcore CP, Child Pornography, experimental hardware information (“Gadolinium Gallium Garnet Quantum Electronic Processors”), but also darker information, like the “Law of 13”, World War 2 experiments, and even the location of Atlantis.In this level you can buy guns, drugs, and things that you can’t find in the local market around you.
What is Mariana’s Web?
The Mariana’s Web is darker, deeper, and more dangerous part than the deep web. It may sound like a myth but no its not, it exists. It is believed that this part of the web contains the secrets of the powerful agencies. The most disturbing website on the internet can also be found here. Some says that the Mariana’s web hosts secret data of the agencies and government.
How to Access Mariana’s Web?
Unlike the deep web you can’t use Tor to visit Mariana’s Web. Accessing Mariana Web is more complicated than that. According to the rumor you must calculate the complex algorithm termed the Polymeric Falcighol Derivation. There is some doubt that this algorithm is actually real. Further, while solving it you may be stuck with the impossible task of computing something that does not exist.
In addition, you can’t make this calculation on just any computer. You need a quantum computer which is new technology that is not available to the public. There is a good reason for this lack of public availability. Currently quantum computers need some extreme condition to function properly.
For instance, the processor of a D-Wave 2000Q quantum computer can run only in an extreme environment. It can only work in a high vacuum pressure of 10 billion times lower than the earth’s atmosphere.
What is Level 6 ?
The Level 6 acts as an intermediatory between Marianas Web and therefore the Level 7 is also called as THE FOG/VIRUS SOUP. At this point you really start getting attention you don’t need i.e., people come to kill you. It might sound terrifying, but it is the truth. There are certain things in the world which only some people can know like human trafficking and drug lords. So, if they get aware that you know about them then my friend your life is at risk.
What is The Fog / Virus Soup?
This level is like a warzone. Every other person is trying to reach the level 8. This is basically a sort of a fight between people trying to overthrow the other for having the sole power of the internet in the world. Whoever has reached this level will try to reach the level 8 or stop other from reaching the 8th level because so much of valuable information is in there.
What is The Primarch System?
The last level: the Primarch System is impossible to access directly. the Primarch System is literally the thing controlling the internet. No government has control of it. In fact, nobody even knows what the primarch system is. It’s an anomaly that basically was discovered by super deep web scans within early 2000’s. The 8th layer is assumed to be separated by a level 17 quantum t.r.001 level function lock. Hence, nobody knows what’s in there.

Comprehensive Visual Guide
Dark Web Searching
The dark web is crawled and indexed from numerous non-standard providers, i.e. your traditional search engines such as Google & Bing will not crawl .onion sites on the TOR network. However, proxied TOR sites, being those which use TOR2WEB type services to allow users to view dark web sites from their standard clear web browser, are regularly indexed on Google, although it is not advisable to access these through a proxy for attribution reasons.
Search engines routinely change .onion addresses or go up/down. If any of the following links become unavailable, or you are looking for search engine URLs, a great site is https://onion.live/ - simply search for the search engine name here to find its URL.
Different darknet details:
Safe Browsing Options
There are many opinions and options for how to access darknets. Below is a simple chart for three options that you can use when connecting to a darknet to provide a safer level of protection. Each has varying barriers to entry & users will have different requirements, budgets, or considerations as part of their connection approach.
Option 1:
Option 2:
Install & configure a local virtual machine using a platform such as VirtualBox (https://www.virtualbox.org/) & downloading pre-configured VM’s (such as the TL VM: https://www.tracelabs.org/initiatives/osint-vm) or installing an operating system from scratch
Install TOR/darknet access on the virtual machine
Configure a VPN on your standard workstation
Connect to the darknet from within the virtual machine
Option 3:
Provision a standalone research laptop/computer (consider using bootable operating systems such as Tails for lower-attribution)
Configure a VPN on your research laptop
Install TOR/darknet access natively on the research laptop
Connect to the darknet natively from your research laptop