Dark Web & Monitoring Tools - 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

THE DARK WEB

The internet can be divided into 3 parts namely the surface web, the deep
web, and the dark web.

➢ The Surface web is part of the internet that we access day to day using
regular browsers like Google Chrome, Safari, or Firefox. Whenever we visit
any website like facebook.com or amazon.com, we are surfing the surface
part of it and are able to access the information which is available to the
user in front of them and not able to access “behind the scene ” of it.

➢ The Deep web makes it accessible to see the information behind closed
doors which are pages and databases that are only meant for a certain
group of people within an organization. A specific URL is required to access
these information and password for the same is required and this
information can’t be found on regular search engines. The deep web is by
far the biggest part of the internet, estimated to make up between 90 and
95% of the complete world wide web. Examples of pages on the deep web
are: the private data and pages of companies, universities, libraries,
hospitals, governments, international organizations, and so on.
➢ The dark web is the part of internet that is only accessible through a special
browser: the Tor browser. It is also called as darknet or the unregulated
part of internet. The dark web is not accessible via regular browsers and
function differently from the regular web. Even when using Tor, dark web
websites don’t end in .com or .org. Instead, URLs usually consist of a
random mix of letters and numbers. They also end in .onion. The URLs of
dark web sites change regularly, so they aren’t as easy to find as most
platforms on other parts of the internet.

The dark web is legal and is merely an extension of an individual’s freedom of


speech and privacy. It is illegal only when the users’ action on the dark web
isn’t in line with the law. The dark web can be a safe place for journalists and
whistle-blowers to communicate freely. Citizens from countries with strict
internet regulations can also use the dark web to talk openly. The purchase of
illegal goods and commodities often happen through dark web and payment
for the same is done via bitcoins or cryptocurrencies as it remains untraceable.
DEVELOPMENT OF DARK WEB
It was developed by The US government in 1995 as The Onion Router to
conduct spy communication. It provides anonymity to all users and eventually
the US government passed it to several civil rights groups (although there are
still rumours that Tor was never really given up by the U.S. government).The
power of the Tor network resides in the fact that it cannot be shut down from
any one location. Even if you pull the plug on American servers, the rest of the
network doesn’t cease to exist.
ACCESSING THE DARK WEB:
Before visiting the dark web, the user needs to keep in mind that it can be
dangerous if the right precautions are not taken it is easy for malware and
hackers to affect the device.
TOR is available on android devices but it is strictly advised not to access dark
web using smartphone as it can lead to breach of users’ privacy and stealing of
personal data. The activity of a user online can be easily tracked and in
smartphone, this is even easier because of the GPS tracking that many apps
use.
Additionally refrain from partake in any illegal activities. The URLs to access a
specific website do not end in .com, .gov etc but will be a jumbled string of
letters.
• Install a VPN on your device and switch it on.
• Using up-to-date antivirus software on your device.
• Download and install the anonymous Tor browser.
• Start the Tor browser.
• Make sure the running of scripts in Tor is forbidden.
• Optional: change the security settings in Tor.
• Start surfing

THE TOR BROWSER:


It stands for The Onion Router (TOR) an open source web browser that keeps
the users anonymous. To achieve this anonymity, the internet activity of a user
is channelled through several IP addresses and hosts. Users of TOR can remain
anonymous on the surface web or can access the dark web. Since TOR is not
fool proof it is always recommended to use a VPN.
INFORMATION ON DARK WEB:
To access the dark web, the users need to be updated on the constantly
changing URLs and have the specific URL to a website or have a good search
engine to get to the exact dark web websites. Given below are few information
that can be accessed via dark web browsing.
• Black markets
• Fraudulent or otherwise dangerous dark web sites
• Email services, fora, and other forms of anonymous online
communication
• Botnets
• Bitcoin and cryptocurrency websites
Source: https://vpnoverview.com/privacy/anonymous-browsing/the-dark-
web/
DARK WEB MONITORING TOOLS:
1. CrowdStrike Falcon X Recon: This intelligence feed scans the Dark Web for
mentions of your brand and corporate identifiers, such as email addresses on
your domain

2. Echosec Beacon: Checks the Dark Web for compromised account


credentials, and stolen personal information and financial data.
3. DarkOwl Vision: A threat intelligence service that includes a Dark web
scanner as an information source.

4. SpyCloud ATO Prevention: Account takeover prevention with a threat


intelligence database derived from Dark Web scans.
Given below are some images of websites available in dark web:

You might also like