Book Image

Hands-On Dark Web Analysis

By : Sion Retzkin
Book Image

Hands-On Dark Web Analysis

By: Sion Retzkin

Overview of this book

The overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This book will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the book, we will also share some best practices which will be useful in using the tools for best effect. By the end of this book, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis
Table of Contents (18 chapters)
Title Page
About Packt

Transacting on the Dark Web

To buy or sell on Dark Web markets, you need to understand a little about cryptocurrency. You've all probably heard about Bitcoin, which is the most well known one, but there are many others.

There are various ways to obtain Bitcoin or any other cryptocurrency, like purchasing or mining.

One of the important topics, transacting with cryptocurrency, is to maintain privacy. This is done by obfuscating the origin of bitcoins in a bitcoin wallet and the identity/location of the receiver.

This is usually performed by a 3rd party application/service, where the process can take between minutes to hours. Be careful when you look for one of these services, as there are scams in that market, usually due to the fact that they cost money, and provide vectors for scammers to steal our money.

Fraudulent sites pretend to be obfuscating services (also known as tumblers) and collect the money from unsuspecting users. The money will never reach the end target.


Always verify the service...