Book Image

Hands-On Dark Web Analysis

By : Sion Retzkin
Book Image

Hands-On Dark Web Analysis

By: Sion Retzkin

Overview of this book

The overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This book will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the book, we will also share some best practices which will be useful in using the tools for best effect. By the end of this book, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis
Table of Contents (18 chapters)
Title Page
About Packt
Contributors
Preface
Index

IT professionals


I'll start with IT professionals. They are usually the closest to the Dark Web, and feel the most comfortable accessing it, either because of their vocation, or simply out of curiosity.

They know how to use the tools that allow safe access to the Dark Web, such as VPNs and Tor.

Many IT professionals need to access materials on the internet for their work, which may violate strict company procedures, such as not being allowed to access site X using organizational browsers. This is a tricky situation, since they can't perform their work without violating the procedure/policy.

This is a type of catch-22.

To resolve this, IT professionals can use the Tor Browser (or other Dark Web browsers), which won't alert the organizational security systems of this action, due to the way Tor works.

Additionally, if the IT professionals do this on a regular basis, they usually have a dedicated machine ready for Dark Web access, which also minimizes their risk of exposing the organization (monitoring...