Monday, December 5, 2016

The Dark Web And How To Access It

Contents

  • What's the dark web
  • How to access the dark web
  • Installation of TOR browser - Windows and Kali
  • Finding onion websites

Dark Web

What is the dark web

In short, dark web is part of the web which requires special software to browse, and isn't indexed by search engines. (More technical content is enclosed in <extra> tags ahead, and colored purple. Scroll through it if you just want to browse the dark web right away.)


<EXTRA>

Originally, the internet used telephone network for communication. My first internet connection was a "dial-up" connection which used the telephone network at my house to connect to my ISP. This is what an overlay network is, and in that case, internet was an overlay over the telephone network. Now, the reverse phenomenon can be seen, with people using the internet for voice calls (Voice over IP to be precise), and the telephone network is turning into an overlay over the internet.

How does knowing what an overlay network is help us? Well, to understand the dark web, we need to understand what the dark net is first.

The dark net is the opposite of clear-net. Clear-net is simply parts of the internet which are index-able by search engines. This means that search engine crawlers can read up the pages, understand what the content is, and return those pages when relevant search queries are made to the search engine. On the other hand, dark net can't be indexed, and usually uses uncommon communication protocols, encryption, etc. to achieve that result. Here's where overlay networks get relevant, all of dark net is an overlay network over the internet. Hence, while the Darknet and clear-net reside on the internet, Darknet still manages to be structurally different from the rest of the internet.

From the darknet, we move to the dark web, which is a subset of the dark net. While dark net consists of all sorts of stuff, from www pages to file transfer service and peer to peer connections, dark web only includes the world wide web pages of the dark net (Hence the change from the more encompassing term net in darknet to web in dark web). 

</EXTRA>

What does it contain

  1. Child pornography and illegal drug markets - These are the two things which the dark web is most infamous for, and if you've heard about the dark web, it's quite likely it in reference to either (or both) of these.
  2. Bitcoin services - Bitcoin is a Cryptocurrency, and considering the nature of activities that go on in the dark web, and the need for anonymity, it's the most common form of payment for any service that you seek on the dark-web.
  3. Hackers for hire 
  4. Carding forums
  5. Plenty of scam sites, phishing sites, etc.
  6. Terrorism
  7. Social media
  8. File sharing

However, the dark web, in general, consists mostly of file sharing, as shown by many studies. While the first few pointers in the list stand out in the crowd, they are not what the dark web is all about. PS: I make no guarantee about the accuracy of these stats.

Dark web statistics


<EXTRA>

Note : Using TOR is not illegal (in most countries) , but many of the things on the dark web are illegal. Despite the strongly encrypted communications and high level of anonymity, I'd like to suggest that you don't access any illegal content of the site. This article is only meant to educate you about the presence of the dark web, as not knowing about it doesn't mean it'll cease to exist, and as someone interested in the field of computer security/hacking, you must know about the dark web.

</EXTRA>

 How to Access the dark web

There are many ways to access the dark web. Being a part of the deep net, dark web operates differently than the clear-net, and needs special client software to be accessed. While there are multiple ways to access the dark web, the most common and recommended method involves using TOR, and then visiting the .onion websites. All dark web website have a url with .onion TLD (top level domain), which looks similar to the way the clear-net websites have .com, .org, .net, etc. TLD. Once you have TOR and find out the .onion address of a deep web site (hidden web site), you can simply enter it in the URL bar on TOR browser, and it'll open, just as normal websites open in usual browsers.



<EXTRA>

If you read the previous boring section, you'd see that I mentioned how the darknet often uses uncommon communication protocols, etc. In case of the dark web, we see that phenomenon with respect to the onion websites. I won't go in much depth, but first look at a .onion URL suggests that it's similar to the clear-net websites. However, internally, the way they work is nothing similar to the clear-net. Precisely, .onion is not part of the internet's DNS root, and hence, normal DNS servers can't resolve your request if you type the URL of a .onion website on your browser. TOR redirects these requests through it's own servers, similar to the way proxies work, and then we get to the website, without the involvement of DNS servers anywhere. This ensures that search engine bots can't browse around the deep web, and that anonymity is maintained, both of the client looking at the web pages, as well as the server serving the web pages. In other words, the server doesn't know who the client is, and the client doesn't know anything about where the server is.)

</EXTRA>


Install TOR

All required instructions can be found here, and I suggest you skip this section of the guide and use the official page (which has very very detailed instructions if you scroll down on that page)

Windows

Simply go to TOR Browser Download page, and download and run the executable provided. No further instructions are needed as far as installation goes, since it's quite similar to how you'd install regular software on windows.

Linux

Go to TOR Browser Download page, and download the .tar.xz archive (according to your architecture, 64bit or 32bit). There is no installation procedure. Simply extract the archive (using GUI or using tar on terminal).

Just extract the archive and you're good to go

Common for both Windows and Linux

  1. Locate where the TOR browser folder is located. This is where you installed/extracted it. You'll see an icon which says something like Tor Browser, or Setup Tor Browser, run it.
  2. You'll see a window. It may differ a bit, but you have to choose the connect option.
  3. You'll see a progress bar with some messages shown below. It'll take a few second and you'll have a browser window ready.







Finding onion websites

Now that you have what looks like Mozilla Firefox running in front of you. You can simply enter normal URLs and enjoy surfing the web with privacy. However, we are here to browse the dark web, and we have no idea what to enter in the URL bar.

The solution is simple, just head over to the hidden wiki (clearnet link), and you'll have a list of websites you can go to. Better yet, go to the dark web hidden wiki (link opens only on TOR), with an indexing of dark web websites. You are now surfing the dark web. This is the furthest I'm taking you, and from here on, you can go wherever you want. You can simply click URLs on the hidden wiki like you'd do on a regular browser, and the website would open. Regardless of what happens behind the scenes, the user experience from here on is what it's like in the clear web (albeit a lot slower).

As far as finding websites is concerned, you are left with indexes of websites, such as the hidden wiki, and some search engines, which are nowhere as good as the clearnet search engines, which is, by design, the intention of the dark web.

The hidden wiki, link provided above



Torch search engine, the hidden wiki has a link to it, which can be opened directly on TOR

Conclusion

Go around, explore the place, don't go anywhere illegal, don't do anything illegal. Also, beware of scams, and don't leave your personal information anywhere. Take a look at instructions on how to be safe when using tor, follow them properly, and you won't face any troubles.

47 comments:

  1. Hii! I am new to linux. I dont know what to do after visiting that site. Can you help me out?

    ReplyDelete
    Replies
    1. Use the navigation bar at the top. Under the 'Hack with Kali' section, you'll find multiple categories. I'd recommend Wifi Hacking. Go through all tutorials in that category from top to bottom.

      Delete
  2. Will people try to hack me once I'm browsing the Dark Web?

    ReplyDelete
    Replies
    1. this is funny :D
      because of you are running in virtuaƟ machine you can do whatever you want...

      Delete
    2. What the fuck are u talking about you are in a virtual machine ? Tor is like a proxychain not a virtual machine...

      Delete
  3. thats different, if you visit some redrooms and that shit than can u get hacked

    ReplyDelete
  4. We are anynomous .....
    We are legion....
    We always with truth

    We do not forget....
    We do not forget....

    Expect us.....

    Be hahaha. ..

    ReplyDelete
  5. Hey guys! I have lost money to some binary trading scam and unlike many others who might have lost some money, I was able to recover my lost funds thanks to a hacker I contacted. His name is Optimus and you can contact him via mail cybertronxiii@gmail.com

    ReplyDelete
  6. This is genuinely an awesome read for me. I have bookmarked it and I am anticipating perusing new articles. Keep doing awesome!
    Web Development

    ReplyDelete
  7. This blog is a punchy piece of writing, as it has a strong effect.
    software development company in delhi

    ReplyDelete
  8. "Thank you for sharing your thoughts. I really appreciate your efforts and
    I will be waiting for your further post thank you once again."

    ReplyDelete
  9. 80% of Traffic is pedophile related... encompasses 99% of internet material... little skeptical on some of the claims. Also if its 500 times bigger doesn't that make it 99.8% of the internet? I guess you cant really round up to 100%, but that's 5 times different than 1/100 as claimed earlier in the video.

    ReplyDelete
  10. This is very significant, and yet necessary towards just click this unique backlink:
    mason soiza

    ReplyDelete
  11. All he needs do is to make utilization of any of the proper web development apparatuses like Macromedia Visual Studio and Microsoft FrontPage.userfeel

    ReplyDelete
  12. So as to create a web site or an internet presence, one wants to employ a website design company. maketavimo paslaugos

    ReplyDelete
  13. It usually takes a while before the web developer actually starts to write the code that makes up the web site. https://medijo.lt/skrajutes/

    ReplyDelete
  14. Nice post! This is a very nice blog that I will definitively come back to more times this year! Thanks for informative post. alamat video bokep

    ReplyDelete
  15. We are tied directly into the sate’s renewal database which allows us to process your request almost instantly. buy essays Web design dubai

    ReplyDelete
  16. amazing article, it turned into exceptionally obliging! I understandably began in this and i am becoming greater acquainted thinking about it bigger! Cheers, store conflict extraordinary! Web Design

    ReplyDelete
  17. I advise you to go to this site steep casino while you will think I ran to play and I think soon I will bring out my first win

    ReplyDelete
  18. GET RICH INVESTING WISELY. 
Hello lol, From my past experiences or intense poverty I just discovered last week, Making money is not all about hardwork. You've gotta be smart. I knew this when I was with a special hacker who is so truthful and genuine in his ways. 
there's something new about getting double value of your current bitcoins in your wallet, and believe me its real !!! From 4000 $ I now have up to 16,000 $ in my bitcoin wallet ... If you know who cryptologic technicians are then you'll understand that you have doubling bitcoin. 
contact JAMIEHACKING99 (AT) Gmail (DOT) COM.
    A team of 5 cryptologic technicians who take 30% out of the profits they help you, pretty good deal is not it.

    ReplyDelete
    Replies
    1. JAMIEHACKING99 (AT) Gmail (DOT) COM

      is scammer

      Delete
  19. Contact us if you need to hire a reliable hacker to track your partner's phone remotely, facebook and other apps.

    Website: www.finessehackers.com
    Email: finessehackers @gmail.com

    ReplyDelete
  20. Another advantage that you can appreciate by utilizing VPS is multi occupancy. You can apportion diverse assets to your customers once you acquire VPS facilitating. Linux VPS

    ReplyDelete
  21. Devoted server facilitating is a sort of facilitating in which a solitary server is rented to a site proprietor or an association. This implies the customer will have full oversight of the server. Moreover, the majority of the product and equipment assets of the server are totally utilized by the customer's site. Dedicated Server Hosting

    ReplyDelete
  22. Cool you write, the information is very good and interesting, I'll give you a link to my site. Aviation website design

    ReplyDelete
  23. nice article Facebook is the largest social media platform for contact with your family, friends, and other person who is a most impotent on your life .so
    Security Of facebook is very important for everyone. If you want your facebook a high security then check this site Tips To Ensure Security Of Your Facebook Account

    ReplyDelete
  24. There are as of now three prevalent ways to deal with building up a One Web webpage: utilizing a responsive design; customer side versatile designs; and server-side versatile designs.Webdesigner Website Voor Professionele en Betaalbare Websites

    ReplyDelete
  25. Firms can redistribute their assembling to different countries and depend on broadcast communications to continue promoting, R&D, and conveyance groups in close contact with the assembling gatherings. In this way the technology can empower a better division of work among nations, which thusly influences the relative interest for different aptitudes in every country. Hier vindt je meer

    ReplyDelete
  26. You make so many great points here that I read your article a couple of times. Your views are in accordance with my own for the most part. This is great content for your readers. Webdesign

    ReplyDelete
  27. I found your this post while searching for some related information on blog search...Its a good post..keep posting and update the information. Webdesign

    ReplyDelete
  28. I am happy to find this post very useful for me, as it contains lot of information. I always prefer to read the quality content and this thing I found in you post. Thanks for sharing. Webdesign

    ReplyDelete
  29. I recently found many useful information in your website especially this blog page. Among the lots of comments on your articles. Thanks for sharing. Webdesign

    ReplyDelete
  30. This is a great article thanks for sharing this informative information. I will visit your blog regularly for some latest post. I will visit your blog regularly for Some latest post. Webdesign

    ReplyDelete
  31. Really impressed! Everything is very open and very clear clarification of issues. It contains truly facts. Your website is very valuable. Thanks for sharing. Webdesign

    ReplyDelete
  32. This is a great article thanks for sharing this informative information. I will visit your blog regularly for some latest post. I will visit your blog regularly for Some latest post. Webdesign

    ReplyDelete
  33. I recently found many useful information in your website especially this blog page. Among the lots of comments on your articles. Thanks for sharing. Webdesign

    ReplyDelete
  34. This is a great article thanks for sharing this informative information. I will visit your blog regularly for some latest post. I will visit your blog regularly for Some latest post. Webdesign

    ReplyDelete
  35. Hello! I just wish to give an enormous thumbs up for the nice info you've got right here on this post. I will probably be coming back to your weblog for more soon! Webdesign

    ReplyDelete
  36. Webdesigner waar u een professionele en betaalbare website kan laten maken? De nr. 1 webdesigner in Limburg, Antwerpen en Vlaams-Brabant voor SEO websites. Webdesigner

    ReplyDelete
  37. Water bills can be sliced by 50 to 70 % by utilizing a top notch solar water panel framework Zonnepanelen

    ReplyDelete
  38. Very good post, thanks a lot for sharing. Do you happen to have an RSS feed I can subscribe to? web design

    ReplyDelete
  39. I’m going to read this. I’ll be sure to come back. thanks for sharing. and also This article gives the light in which we can observe the reality. this is very nice one and gives indepth information. thanks for this nice article... cpanel hosting

    ReplyDelete
  40. A wonderful web designer should be in a situation to understand the rising patterns in the market, the normal changes in web design, current and future patterns just as the latest web advancement instruments.internet marketing for local business

    ReplyDelete
  41. PLEASE READ!!!! Hello Guys,This is a Life Time transformation !!! i'm so happy I got mine from mars. My blank ATM card can
    withdraw $4,000 daily. I got it from Him last week and now I have $23,000 for free. The blank ATM withdraws money from
    any ATM machines and there is no name on it, it is not traceable and now i have money for business and enough money for
    me and my family to live on .I am really happy i met mars because i met two people before him and they took my money
    not knowing that they were scams. But am happy now.Mars sent the card through DHL and i got it in two days. Get your
    own card from him now he is not like other scammer pretending to have the ATM card,he is giving it out for free to help
    people even if it is illegal but it helps a lot and no one ever gets caught. I’m grateful to mars because he changed my
    story all of a sudden .The card works in all countries except Philippines, Czech Republic and Slovenia,
    mars’s email address is Marsdhacker@gmailcom

    ReplyDelete
  42. Thank you again for all the knowledge you distribute,Good post. I was very interested in the article, it's quite inspiring I should admit. I like visiting you site since I always come across interesting articles like this one.Great Job, I greatly appreciate that.Do Keep sharing! Regards, Webdesign bureau

    ReplyDelete

© Kali Tutorials, 2016. Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Shashwat Chaudhary and Kali Tutorials with appropriate and specific direction to the original content.
Bitcoin: 1B5aLqJcMW7zznffTxQwta8JTZsxBDPguC