How To Access Dark Web.

Aditya Rastogi
5 min readMay 16, 2020

--

Spider Web in dark
The greatest artist and web-designer ever is indeed a spider!

To all the new entrants in the Cyber Security, this is a post that shall help in exploring the depths and dark dungeons in Dark Web.

This will enrich with the knowledge that I got after trial and errors, plus losing few computers 😅.

Deep web vs. dark web: What’s the difference?

Taking the famous sea and glacier example, to compare between Internet as we know, deep and dark web.
Image Source: Google Image

The terms “deep web” and “dark web” are sometimes used interchangeably, but they are not the same. Deep web refers to anything on the internet that is not indexed by and, therefore, accessible via a search engine like Google. Deep web content includes anything behind a paywall or requires sign-in credentials. It also includes any content that its owners have blocked web crawlers from indexing.

The dark web is a subset of the deep web that is intentionally hidden, requiring a specific browser—TOR—to access, as explained below. No one really knows the size of the dark web, but most estimates put it at around 5% of the total internet. Again, not all the dark web is used for illicit purposes despite its ominous-sounding name.

How to Use Dark web

STEP 1- Start with Encryption, Download Tor and Tor Browser.

STEP 2- It is for your own safety, clear all backgrounds apps before opening Tor as while browsing The Dark Web many hacker’s try to find vulnerability to exploit and get into your Computer. Hence, close all backgrounds process and applications.

STEP 3- Always keep in mind what are you looking for, the longer you surf more vulnerable you are to paying for your data or your system (ransomware). As there is no safe search in Tor Browser, hence always use a deep web search engine. The deep web is intentionally difficult to explore and maintain, so these search engines may not be as effective as you are used to on the ordinary internet. In order to find a variety of results, try using several of them for each search, such as Torch (http://xmh57jrzrnw6insl.onion/) and TorSearch (http://kbhpodhnfxl3clb4.onion/).

Use specialized dark web services. While the dark web is infamous for illegal activity, there are legitimate sites as well. Some are based on familiar concepts, like image sharing (e.g. http://www.zw3crggtadila2sg.onion/imageboard/). Others are more unique to deep web culture, such as secure whistleblowing sites (e.g., http://5r4bjnjug3apqdii.onion/) and eBook collections focused on subversive works (e.g., https://xfmro77i3lixucja.onion.lt/).

STEP 4- Don’t download anything directly from Tor. Protect your device by using a VPN to Encrypt Your Internet Traffic and a good antivirus ( I would personally recommend using Kaspersky Antivirus).

IMPORTANT SAFETY TIPS

Before you open the Tor browser, you should:

  • Close all non-essential apps on your machine, e.g., Netflix, password managers.
  • Stop unnecessary services from running, e.g., OneDrive.
  • Cover your webcam with a piece of paper. It is shockingly easy to gain access to your webcam, even without you noticing.
  • Download Tor from the original site only ( https://www.torproject.org/ ) also Forbid scripts from the TOR (Most Important)(Scripts on websites can be used to keep track of what you’re doing online: they become part of your digital fingerprint. Tor has included a nice feature in its browser to ensure no websites are able to run scripts on you. To activate this, go to the upper right corner of the browser and click on the symbol with the letter “S”. Select the option Enable restrictions globally, and you’re good to go.)
  • Have a reputable and fully updated antivirus program installed on your device.
  • Install quality and up-to-date anti-malware software. For more general information on malware, see our malware section.
  • Turn off your location on your device. Your location can be found through your IP-address as well as your device itself.
  • In Windows 10, you can turn off your location from Settings > Privacy > Location > Turn off location + erase location history
  • For macOS: System Preferences > Security & Privacy panel > Privacy > uncheck “Enable location Services”
  • For Tails or other live OS: you will not have to worry about your location being leaked.

Dark web sites

Dark web sites look pretty much like any other site, but there are important differences. One is the naming structure. Instead of ending in .com or .co, dark web sites end in .onion. That’s “a special-use top level domain suffix designating an anonymous hidden service reachable via the Tor network,” according to Wikipedia. Browsers with the appropriate proxy can reach these sites, but others can’t.

Dark web sites also use a scrambled naming structure that creates URLs that are often impossible to remember. For example, a popular commerce site called Dream Market goes by the unintelligible address of (http://eajwlvm3z2lcca76.onion/).

Many dark websites are set up by scammers, who constantly move around to avoid the wrath of their victims. Even commerce sites that may have existed for a year or more can suddenly disappear if the owners decide to cash in and flee with the escrow money they’re holding on behalf of customers.

Law enforcement officials are getting better at finding and prosecuting owners of sites that sell illicit goods and services. In the summer of 2017, a team of cyber cops from three countries successfully shut down Alpha Bay, the dark web’s largest source of contraband, sending shudders throughout the network. But many merchants simply migrated elsewhere.

The anonymous nature of the Tor network also makes it especially vulnerable to DDoS, sites are constantly changing addresses to avoid DDoS, which makes for a very dynamic environment. As a result, The quality of search varies widely, and a lot of material is outdated.

Top Dark Web Sites

Few were earlier mentioned but this is a compilation of all the best sites you view to make visit to the Dark Web short and planned.

  1. Mail2Tor : http://mail2tor2zyjdctd.onion/
  2. The Hidden Wiki : http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/wiki/index.php/Main_Page
  3. ProPublica : https://www.propub3r6espa33w.onion/
  4. DuckDuckGo : http://3g2upl4pq6kufc4m.onion/
  5. Soylent News : http://7rmath4ro2of2a42.onion/
  6. TorLinks : http://torlinksd6pdnihy.onion/
  7. Hidden Answers : http://answerszuvs3gg2l64e6hmnryudl5zgrmwm3vh65hzszdghblddvfiqd.onion/
  8. The Dark Lair : http://vrimutd6so6a565x.onion/index.php/Board
  9. The CIA : http://ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion/

If you liked this article and made it to the end, Please press the applause button down below!

--

--

No responses yet