EDITOR'S PICK
  • CYBER BULLYING AND CHILD SAFETY
  • A GUIDE TO DARK WEB
  • GUIDE TO NETWORK SECURITY
  • CONTACT US
CONTACT US
Security Land
  • HOME
  • NEWS
    News

    Combatting Cyber Crime: FBI Columbia Leads Multi-Agency Training Course to Enhance Investigation Techniques

    Security Land Security Land January 26, 2023
    News

    Gen Z’s Lack of Cybersecurity Knowledge Puts Small Businesses at Risk

    Security Land January 25, 2023
    News

    Experts Predict Consequential Year for Cybersecurity in 2023

    Security Land January 19, 2023
  • DATA BREACHES
    Data Breaches

    India’s Education Ministry Data Breach Exposes Millions of Student and Teacher Records on Unsecured Server

    A security lapse in India's Education Ministry's Digital Infrastructure for Knowledge Sharing…

    Security Land Security Land January 26, 2023
    Data Breaches
    Riot Games Suffers Social Engineering Attack
    DevOps
    Data Breaches
    CircleCI Reveals Malware Attack as the Cause of Recent Security Breach, Advises Developers to Rotate Secrets and API Tokens
    Data Breach - Security Land
    Data BreachesEditors Pick
    What You Should Know About Data Breaches
    indian bank data breach
    Data Breaches
    Indian Bank Exposed Millions of Records Online
  • EDUCATION
    Education

    Protecting Your Business: The Importance of Web Application Security

    Sponsored by IntelSenseIntelSense
    Editors PickEducation

    Incident Response Guide for Small Businesses

    Sponsored by IntelSenseIntelSense
    Education

    Protecting Patient Data: The Importance of Cybersecurity in Healthcare

    Sponsored by IntelSenseIntelSense
  • MORE
    • Customize Interests
    • Contact Us
  • BOOKMARKS
Reading: A Guide to the Dark Web
Share
Security Land
Aa
  • HOME
  • NEWS
  • DATA BREACHES
  • EDUCATION
  • MORE
  • BOOKMARKS
Search
  • HOME
  • NEWS
  • DATA BREACHES
  • EDUCATION
  • MORE
    • Customize Interests
    • Contact Us
  • BOOKMARKS
Have an existing account? Sign In
Follow US
© Copyright 2023 | Security Land from IntelSense.
Security Land > Dark Web > A Guide to the Dark Web
Dark Web

A Guide to the Dark Web

Security Land
Last updated: 2021/12/06 at 1:12 AM
Security Land
Share
10 Min Read
dark web guide
SHARE

If you’ve ever wondered what the dark web looks like, here’s your chance to find out. In fact, even if you’re not sure what the dark web is, this guide will help you understand it in no time.

Contents
What is the Dark Web?What is Tor?How Does Tor Work?What Can I Find on Dark Web?Cryptocurrencies and Dark Web

After reading this guide, you’ll know why the dark web is such an attractive place for cybercriminals and how to best protect yourself from their scams, spam, phishing attacks, and other schemes.

What is the Dark Web?

First, let’s talk about what the dark web is not. The first thing that many people think of when they hear dark web is Silk Road and other black markets—that’s not what we mean by dark web.

The internet you use every day is actually a subset of what we call the surface web, which refers to anything searchable by a traditional search engine like Google or Bing. The surface web includes your email accounts, banking information and shopping sites—basically any content that can be found with a traditional search engine. It also represents a relatively small percentage of total internet traffic—less than 10%.

Everything else that isn’t accessible with a regular browser? That’s dark web.

Like it sounds, most dark web pages are hidden behind services like Tor; only those using special tools (called Tor browsers) can access them. To understand why someone would want to visit these hidden parts of the internet, it helps to know what they offer: anonymity and encryption.

Because dark web users are masked by Tor from third-party monitoring/tracking and almost completely untraceable via IP address or geographic location (since exit nodes may be in another country altogether), transactions can be both secure and anonymous for users—and thus ideal for illegal activities including buying drugs online.

But so much more exists on darknet beyond nefarious uses; good old Wikipedia was even hosted there at one point, but Facebook is still there.

What is Tor?

Tor, short for The Onion Router, is a specialized browser that allows users to browse websites anonymously. Originally developed by United States Naval Research Laboratory employees in an attempt to protect government communications online, Tor was released to the public for free in 2004 and has since become one of the most popular anonymous communication tools on Earth.

TOR browser

It’s typically used by people living under authoritarian regimes or anyone who wants unfettered access to information without being tracked—like some journalists and political activists.

However, it’s also a preferred tool of nefarious hackers who want anonymity while they trade goods and services illegally on dark web marketplaces like AlphaBay or Hansa Market.

How Does Tor Work?

When you use Tor, your internet traffic gets routed through several relays before reaching its destination. Each relay knows only what information to pass along to the next hop until your IP address reaches its final destination.

That way no one—not even those running servers where you surfed from or are surfing toward—can see what sites you’re accessing or how much time you spend there.

Because of its encrypted nature, only trusted exit nodes can actually read any data transmitted over Tor; malicious exit nodes cannot do so as part of their job description with regard to TLS/SSL data encryption and will be booted out of relays if discovered violating protocol rules about not reading data sent over untrusted connections.

What Can I Find on Dark Web?

Well, it’s really a fancy question for anyone who already saw some kind of darkness there, and it’s really difficult to answer, because there is too much scam and phishing sites.

But let’s take a look with few examples.

-* Note: We will not disclose names or URLs of these forums or websites for your own safety.

Showing example of Dark Web Search Engine – Place where everyone can add new .onion website. Just this one have added 1206 websites and 2514 mirrors. Also visitors reported 2671 time that one of advertised links are scam or phishing.
This is an example of website that can be accessed directly, without need of any registration, just choosing their advertised product will lead you to checkout page. As you can see on picture, they are selling credit cards, Paypal and WU Transfers. Of course, most of these websites are reported as Scam.
The last example is showing drug market. This market is not one person show, it’s a based on Vendors, Escrow (Administrator) and Customer.

We skip giving more examples like “Hire a Hitman”, “We Hack Everyone”, “Earn 1 million in 1 month” etc., so this is enough to give you some kind of perspective what’s happening there.

Dark Web is also full of police agents doing their job, and there is a lot of examples showing “This website is sized”.

After Silkroad market, one of most popular was Alphabay. Prior to its takedown, AlphaBay reached over 200 000 users and 40 000 vendors. There were over 250 000 listings for illegal drugs and toxic chemicals on AlphaBay, and over 100 000 listings for stolen and fraudulent identification documents and access devices, counterfeit goods, malware and other computer hacking tools, firearms, and fraudulent services.  

A conservative estimation of USD 1 billion was transacted in the market since its creation in 2014. Transactions were paid in Bitcoin and other cryptocurrencies. Hansa was the third largest criminal marketplace on the Dark Web, trading similarly high volumes in illicit drugs and other commodities. The two markets were created to facilitate the expansion of a major underground criminal economy, which affected the lives of thousands of people around the world and was expressly designed to frustrate the ability of law enforcement to bring offenders to justice, Europol posted in that days.

In July 2017., Two major law enforcement operations, led by the Federal Bureau of Investigation (FBI), the US Drug Enforcement Agency (DEA) and the Dutch National Police, with the support of Europol, have shut down the infrastructure of an underground criminal economy responsible for the trading of over 350 000 illicit commodities including drugs, firearms and cybercrime malware. The coordinated law enforcement action in Europe and the US ranks as one of the most sophisticated takedown operations ever seen in the fight against criminal activities online. This market was called Hansa.

Hansa market sized in LEA operation

Cryptocurrencies and Dark Web

In 2013, an American researcher discovered a Bitcoin-based drug market named Silk Road, which accepted only Bitcoins as payment, operated on a hidden service (that is, its site address began with http:// rather than https://), used Tor for access and relied on a PGP encryption scheme to protect users.

The same year, journalists bought heroin and cocaine from dealers in Baltimore on another market based in Tor named Atlantis.

Must Read: Legal and Illegal Uses of Cryptocurriencies

And, unlike other sites on what people increasingly call the dark web — like The Hidden Wiki — these sites have no links out to other sites or discussion boards. They are essentially dead ends: You can order drugs from them but you cannot look up where to buy them elsewhere online.

After Silk Road (which was taken down by law enforcement in 2013), bitcoin started being used as a payment method on new darknet markets.

Two main categories of cryptocurrency can be distinguished in darknet markets: privacy-oriented coins and tokens, such as monero, zcash and dash; and Bitcoin. This is due to its liquidity, ease of transfer across borders and relative anonymity compared to other cryptocurrencies.

Such currencies are referred to as privacy or mixing coins; they aim at making it hard for anyone besides those participating in transactions to link real identities with addresses.

In contrast, tokens may represent either companies’ shares or smart contracts that could be exchanged for services at a later time.

The most notorious example of using bitcoins on dark web marketplaces is probably Silk Road which saw $224 million worth of bitcoin exchanged through its marketplace from 2011 to October 2013 before it was shut down by authorities.

You Might Also Like

India’s Education Ministry Data Breach Exposes Millions of Student and Teacher Records on Unsecured Server

Gen Z’s Lack of Cybersecurity Knowledge Puts Small Businesses at Risk

Experts Predict Consequential Year for Cybersecurity in 2023

Protecting Patient Data: The Importance of Cybersecurity in Healthcare

Personal data of 42 million Americans found on the dark web according to research

TAGGED: alphabay, Anonymity, cybersecurity, Dark web, DarkWeb, Guide for Dark Web, hansa market, phishing attack, Privacy, scam, Secrets of Dark Web, silkroad, spam, tor, tor browser
Share this Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Email Print
By Security Land
Follow:
Hello. I am Bot created by SL Team.
Leave a comment Leave a comment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Watch Now

- Advertisement -
Ad imageAd image

Trending Stories

After DDoS Attacks Intel Techniques Removed OSINT Tools

June 10, 2019
Endpoint Security

HP Announces Remote Work Equipment Service and Endpoint Data Security

November 5, 2021

Peekaboo 0-day – View and Alter Surveillance Camera

September 26, 2018

Highway 407 Investigating “Inside Theft of Data”

June 1, 2018
malware analysis
Education

Behind The Scenes of a Malware Analysis

November 20, 2021
Network Security

NSA Issues Guidance on IPv6 Cybersecurity Risks

January 24, 2023

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

I have read and agree to the terms & conditions

Follow US on Social Media

Linkedin Twitter Facebook Instagram Youtube

© Copyright 2023 | Security Land from IntelSense.

Security Land

More from Security Land

  • About Us
  • Privacy Policy
  • Advertise
  • Contact Us
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
SAVE & ACCEPT
physical security
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc.

I have read and agree to the terms & conditions
Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?