Book Image

Hands-On Dark Web Analysis

By : Sion Retzkin
Book Image

Hands-On Dark Web Analysis

By: Sion Retzkin

Overview of this book

The overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This book will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the book, we will also share some best practices which will be useful in using the tools for best effect. By the end of this book, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis
Table of Contents (18 chapters)
Title Page
About Packt

What is Whonix?

Whonix is another OS focused on security and privacy. It's open source, and hence free to download and use. It's based on Linux (Debian) and Tor is implemented into it, to force all network connections through Tor (or be blocked). This is done automatically and is virtually system wide. Whonix is the only OS to work this way, so far.

Whonix was designed with the concept of VMs in mind. Desktop applications come pre-installed and are pre-configured with safety in mind. (It's also possible to install custom applications)


Whonix has two parts: the Whonix-Gateway VM and the Whonix-Workstation VM. The first runs Tor processes and acts as a gateway, while the second runs applications on an isolated network. There are several benefits to this design:

  • All connections are routed through Tor
  • Applications and servers can be run anonymously over the internet
  • DNS leaks are not possible
  • Malware with root privileges can't detect the user's real IP address
  • User errors that could lead to threats...