Monday, December 5, 2016

The Dark Web And How To Access It


  • What's the dark web
  • How to access the dark web
  • Installation of TOR browser - Windows and Kali
  • Finding onion websites

Dark Web

What is the dark web

In short, dark web is part of the web which requires special software to browse, and isn't indexed by search engines. (More technical content is enclosed in <extra> tags ahead, and colored purple. Scroll through it if you just want to browse the dark web right away.)


Originally, the internet used telephone network for communication. My first internet connection was a "dial-up" connection which used the telephone network at my house to connect to my ISP. This is what an overlay network is, and in that case, internet was an overlay over the telephone network. Now, the reverse phenomenon can be seen, with people using the internet for voice calls (Voice over IP to be precise), and the telephone network is turning into an overlay over the internet.

How does knowing what an overlay network is help us? Well, to understand the dark web, we need to understand what the dark net is first.

The dark net is the opposite of clear-net. Clear-net is simply parts of the internet which are index-able by search engines. This means that search engine crawlers can read up the pages, understand what the content is, and return those pages when relevant search queries are made to the search engine. On the other hand, dark net can't be indexed, and usually uses uncommon communication protocols, encryption, etc. to achieve that result. Here's where overlay networks get relevant, all of dark net is an overlay network over the internet. Hence, while the Darknet and clear-net reside on the internet, Darknet still manages to be structurally different from the rest of the internet.

From the darknet, we move to the dark web, which is a subset of the dark net. While dark net consists of all sorts of stuff, from www pages to file transfer service and peer to peer connections, dark web only includes the world wide web pages of the dark net (Hence the change from the more encompassing term net in darknet to web in dark web). 


What does it contain

  1. Child pornography and illegal drug markets - These are the two things which the dark web is most infamous for, and if you've heard about the dark web, it's quite likely it in reference to either (or both) of these.
  2. Bitcoin services - Bitcoin is a Cryptocurrency, and considering the nature of activities that go on in the dark web, and the need for anonymity, it's the most common form of payment for any service that you seek on the dark-web.
  3. Hackers for hire 
  4. Carding forums
  5. Plenty of scam sites, phishing sites, etc.
  6. Terrorism
  7. Social media
  8. File sharing

However, the dark web, in general, consists mostly of file sharing, as shown by many studies. While the first few pointers in the list stand out in the crowd, they are not what the dark web is all about. PS: I make no guarantee about the accuracy of these stats.

Dark web statistics


Note : Using TOR is not illegal (in most countries) , but many of the things on the dark web are illegal. Despite the strongly encrypted communications and high level of anonymity, I'd like to suggest that you don't access any illegal content of the site. This article is only meant to educate you about the presence of the dark web, as not knowing about it doesn't mean it'll cease to exist, and as someone interested in the field of computer security/hacking, you must know about the dark web.


 How to Access the dark web

There are many ways to access the dark web. Being a part of the deep net, dark web operates differently than the clear-net, and needs special client software to be accessed. While there are multiple ways to access the dark web, the most common and recommended method involves using TOR, and then visiting the .onion websites. All dark web website have a url with .onion TLD (top level domain), which looks similar to the way the clear-net websites have .com, .org, .net, etc. TLD. Once you have TOR and find out the .onion address of a deep web site (hidden web site), you can simply enter it in the URL bar on TOR browser, and it'll open, just as normal websites open in usual browsers.


If you read the previous boring section, you'd see that I mentioned how the darknet often uses uncommon communication protocols, etc. In case of the dark web, we see that phenomenon with respect to the onion websites. I won't go in much depth, but first look at a .onion URL suggests that it's similar to the clear-net websites. However, internally, the way they work is nothing similar to the clear-net. Precisely, .onion is not part of the internet's DNS root, and hence, normal DNS servers can't resolve your request if you type the URL of a .onion website on your browser. TOR redirects these requests through it's own servers, similar to the way proxies work, and then we get to the website, without the involvement of DNS servers anywhere. This ensures that search engine bots can't browse around the deep web, and that anonymity is maintained, both of the client looking at the web pages, as well as the server serving the web pages. In other words, the server doesn't know who the client is, and the client doesn't know anything about where the server is.)


Install TOR

All required instructions can be found here, and I suggest you skip this section of the guide and use the official page (which has very very detailed instructions if you scroll down on that page)


Simply go to TOR Browser Download page, and download and run the executable provided. No further instructions are needed as far as installation goes, since it's quite similar to how you'd install regular software on windows.


Go to TOR Browser Download page, and download the .tar.xz archive (according to your architecture, 64bit or 32bit). There is no installation procedure. Simply extract the archive (using GUI or using tar on terminal).

Just extract the archive and you're good to go

Common for both Windows and Linux

  1. Locate where the TOR browser folder is located. This is where you installed/extracted it. You'll see an icon which says something like Tor Browser, or Setup Tor Browser, run it.
  2. You'll see a window. It may differ a bit, but you have to choose the connect option.
  3. You'll see a progress bar with some messages shown below. It'll take a few second and you'll have a browser window ready.

Finding onion websites

Now that you have what looks like Mozilla Firefox running in front of you. You can simply enter normal URLs and enjoy surfing the web with privacy. However, we are here to browse the dark web, and we have no idea what to enter in the URL bar.

The solution is simple, just head over to the hidden wiki (clearnet link), and you'll have a list of websites you can go to. Better yet, go to the dark web hidden wiki (link opens only on TOR), with an indexing of dark web websites. You are now surfing the dark web. This is the furthest I'm taking you, and from here on, you can go wherever you want. You can simply click URLs on the hidden wiki like you'd do on a regular browser, and the website would open. Regardless of what happens behind the scenes, the user experience from here on is what it's like in the clear web (albeit a lot slower).

As far as finding websites is concerned, you are left with indexes of websites, such as the hidden wiki, and some search engines, which are nowhere as good as the clearnet search engines, which is, by design, the intention of the dark web.

The hidden wiki, link provided above

Torch search engine, the hidden wiki has a link to it, which can be opened directly on TOR


Go around, explore the place, don't go anywhere illegal, don't do anything illegal. Also, beware of scams, and don't leave your personal information anywhere. Take a look at instructions on how to be safe when using tor, follow them properly, and you won't face any troubles.


  1. Hii! I am new to linux. I dont know what to do after visiting that site. Can you help me out?

    1. Use the navigation bar at the top. Under the 'Hack with Kali' section, you'll find multiple categories. I'd recommend Wifi Hacking. Go through all tutorials in that category from top to bottom.

  2. Will people try to hack me once I'm browsing the Dark Web?

    1. this is funny :D
      because of you are running in virtuaƟ machine you can do whatever you want...

    2. What the fuck are u talking about you are in a virtual machine ? Tor is like a proxychain not a virtual machine...

  3. thats different, if you visit some redrooms and that shit than can u get hacked

  4. We are anynomous .....
    We are legion....
    We always with truth

    We do not forget....
    We do not forget....

    Expect us.....

    Be hahaha. ..

  5. Hey guys! I have lost money to some binary trading scam and unlike many others who might have lost some money, I was able to recover my lost funds thanks to a hacker I contacted. His name is Optimus and you can contact him via mail

  6. This is genuinely an awesome read for me. I have bookmarked it and I am anticipating perusing new articles. Keep doing awesome!
    Web Development

  7. This blog is a punchy piece of writing, as it has a strong effect.
    software development company in delhi

  8. "Thank you for sharing your thoughts. I really appreciate your efforts and
    I will be waiting for your further post thank you once again."

  9. 80% of Traffic is pedophile related... encompasses 99% of internet material... little skeptical on some of the claims. Also if its 500 times bigger doesn't that make it 99.8% of the internet? I guess you cant really round up to 100%, but that's 5 times different than 1/100 as claimed earlier in the video.

  10. This is very significant, and yet necessary towards just click this unique backlink:
    mason soiza

  11. All he needs do is to make utilization of any of the proper web development apparatuses like Macromedia Visual Studio and Microsoft FrontPage.userfeel

  12. So as to create a web site or an internet presence, one wants to employ a website design company. maketavimo paslaugos

  13. It usually takes a while before the web developer actually starts to write the code that makes up the web site.

  14. Nice post! This is a very nice blog that I will definitively come back to more times this year! Thanks for informative post. alamat video bokep

  15. We are tied directly into the sate’s renewal database which allows us to process your request almost instantly. buy essays Web design dubai

  16. amazing article, it turned into exceptionally obliging! I understandably began in this and i am becoming greater acquainted thinking about it bigger! Cheers, store conflict extraordinary! Web Design

  17. I advise you to go to this site steep casino while you will think I ran to play and I think soon I will bring out my first win

Hello lol, From my past experiences or intense poverty I just discovered last week, Making money is not all about hardwork. You've gotta be smart. I knew this when I was with a special hacker who is so truthful and genuine in his ways. 
there's something new about getting double value of your current bitcoins in your wallet, and believe me its real !!! From 4000 $ I now have up to 16,000 $ in my bitcoin wallet ... If you know who cryptologic technicians are then you'll understand that you have doubling bitcoin. 
contact JAMIEHACKING99 (AT) Gmail (DOT) COM.
    A team of 5 cryptologic technicians who take 30% out of the profits they help you, pretty good deal is not it.

    1. JAMIEHACKING99 (AT) Gmail (DOT) COM

      is scammer

  19. Contact us if you need to hire a reliable hacker to track your partner's phone remotely, facebook and other apps.

    Email: finessehackers


© Kali Tutorials, 2016. Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Shashwat Chaudhary and Kali Tutorials with appropriate and specific direction to the original content.
Bitcoin: 1B5aLqJcMW7zznffTxQwta8JTZsxBDPguC