Book Image

Hands-On Dark Web Analysis

By : Sion Retzkin
Book Image

Hands-On Dark Web Analysis

By: Sion Retzkin

Overview of this book

The overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This book will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the book, we will also share some best practices which will be useful in using the tools for best effect. By the end of this book, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis
Table of Contents (18 chapters)
Title Page
About Packt
Contributors
Preface
Index

Preface

The World Wide Web is divided into three areas: the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas that are not accessible through general search engines or browsers. This provides several advantages, such as anonymity and privacy, but it also provides people performing illicit, illegal, or nefarious activities with the same benefits. IT and security professionals also gain benefits by accessing these areas. 

This book will initially introduce you to the concept of the Deep Web and the Dark Web and will examine their significance. Then, we will deep dive into the recommended ways to access them, by using various operating systems and tools such as the Tor browser. We will also discuss what data can be obtained there, best practices for using the tools for the best effect, and who uses the Deep Web and the Dark Web.

By the end of this book, you will have hands-on experience of working with the Deep Web and the Dark Web.

 

Who this book is for

This book is aimed at IT and security professionals, security analysts, and any stakeholder interested in learning the concepts of the Deep Web and the Dark Web. Some technical acumen is necessary for the hands-on parts of this book, such as internet browsing, the concept and use of virtual machines, and installing operating systems. The book includes step-by-step instructions, with screenshots of all the hands-on chapters.

What this book covers

Chapter 1, Understanding the Deep and Dark Web, starts by looking at where it all started, and we will talk about the terminology—what is the Deep Web? What is the Dark Web? We will also talk about the difference between the Deep Web and the Dark Web, and examine the reason behind the names and what can be done there.

Chapter 2, Working with the Deep Web, discusses using the Deep Web and the Dark Web. For example, how to access the Deep Web and the Dark Web, and what really goes on there? How can there be so many sites out there? In this chapter, we'll discuss how the Deep Web and Dark Web are used.

Chapter 3, The Future of the Dark Web, covers the usage trends in the Dark Web. We will also talk about how it is used today and where will it go from here. We will learn about what to expect in the future from the Deep Web and the Dark Web. We will learn about the future benefits (or dangers) we can gain from the uncharted territory of the Dark Web.

Chapter 4, Installing a Linux Virtual Machine (VM), explains how to install a Linux virtual machine.

Chapter 5, Accessing the Dark Web with the Tor Browser, will help you to learn about, install, and configure the Tor browser on a Linux distribution.

Chapter 6Installing Tails OS, outlines another operating system that is useful for accessing the Deep Web—Tails OS. It is a live operating system that you can start on almost any computer from a USB stick or a DVD. In this chapter, we'll focus on installing Tails OS and accessing the Dark Web with it.

Chapter 7, Installing Whonix, covers another operating system that's worth mentioning: Whonix. Whonix is designed for advanced security and privacy. It's a heavily reconfigured Linux Debian that runs inside multiple virtual machines, providing a substantial layer of protection from malware and IP address leaks. Whonix is the only operating system designed to be run inside a VM and paired with Tor. In this chapter, we'll learn how to install and use Whonix to browse the Dark Web.

Chapter 8, Installing Qubes OS, covers a Xen-based operating system that is also considered extremely secure: Qubes OS, which will be the focus of this chapter. Qubes OS operates under the assumption that it has already been breached, so every application is run in its own virtual environment. In this chapter, we will learn how to install and use Qubes OS to access the Deep Web.

Chapter 9What Goes on in the Dark Web – Case Studies, provides several examples of how the Dark Web is used in order to outline the dangers (and benefits) of going there. Anyone can access the Dark Web and, in this chapter, we will break down the types of people who access it, and why.

Chapter 10The Dangers of the Dark Web, discusses the things that are lurking in the Dark Web. What are the dangers? How do we avoid them? These are probably the type of questions you've asked yourself when contemplating the Dark Web. Many people view the Dark Web as an evil place, teeming with malicious hooded hackers, just waiting for us to enter. In this chapter, we'll learn what the risks are in the Dark Web, and how to avoid them.

 

 

Chapter 11Using the Dark Web for Your Business, moves on from who uses the Deep Web and Dark Web, and why. Now, let's learn how we can use them ourselves, to help us perform tasks, to help in our career, and more.

To get the most out of this book

You should have a USB stick and a computer you are willing to format, or a computer with enough resources to create virtual machines.

 

Download the color images

We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it here: https://www.packtpub.com/sites/default/files/downloads/9781789133363_ColorImages.pdf.

Conventions used

There are a number of text conventions used throughout this book.

CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Double-click on the Start-tor-browser.desktop file to launch Tor Browser"

A block of code is set as follows:

html, body, #map {
 height: 100%; 
 margin: 0;
 padding: 0
}

Any command-line input or output is written as follows:

sudo apt install gnupg

Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Now, plug in the second USB stick, go to Applications | Tails | Tails Installer (in Tails OS), and install Tails on it."

Note

Warnings or important notes appear like this.

Note

Tips and tricks appear like this.

Get in touch

Feedback from our readers is always welcome.

General feedback: If you have questions about any aspect of this book, mention the book title in the subject of your message and email us at [email protected].

Errata: Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you have found a mistake in this book, we would be grateful if you would report this to us. Please visit www.packt.com/submit-errata, selecting your book, clicking on the Errata Submission Form link, and entering the details.

Piracy: If you come across any illegal copies of our works in any form on the Internet, we would be grateful if you would provide us with the location address or website name. Please contact us at [email protected] with a link to the material.

If you are interested in becoming an author: If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, please visit authors.packtpub.com.

Reviews

Please leave a review. Once you have read and used this book, why not leave a review on the site that you purchased it from? Potential readers can then see and use your unbiased opinion to make purchase decisions, we at Packt can understand what you think about our products, and our authors can see your feedback on their book. Thank you!

For more information about Packt, please visit packt.com.

Disclaimer

The information within this book is intended to be used only in an ethical manner. Do not use any information from the book if you do not have written permission from the owner of the equipment. If you perform illegal actions, you are likely to be arrested and prosecuted to the full extent of the law. Packt Publishing does not take any responsibility if you misuse any of the information contained within the book. The information herein must only be used while testing environments with proper written authorizations from appropriate persons responsible.