0%

Book Description

Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity

Key Features

  • Understand the concept of Dark Net and Deep Web
  • Use Tor to extract data and maintain anonymity
  • Develop a security framework using Deep web evidences

Book Description

The overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization.

This book will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the book, we will also share some best practices which will be useful in using the tools for best effect.

By the end of this book, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis

What you will learn

  • Access the Deep Web and the Dark Web
  • Learn to search and find information in the Dark Web
  • Protect yourself while browsing the Dark Web
  • Understand what the Deep Web and Dark Web are
  • Learn what information you can gather, and how

Who this book is for

This book is targeted towards security professionals, security analyst, or any stakeholder interested in learning the concept of deep web and dark net. No prior knowledge on Deep Web and Dark Net is required

Downloading the example code for this book You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Table of Contents

  1. Title Page
  2. Copyright and Credits
    1. Hands-On Dark Web Analysis
  3. About Packt
    1. Why subscribe?
    2. Packt.com
  4. Contributors
    1. About the author
    2. About the reviewer
    3. Packt is searching for authors like you
  5. Preface
    1. Who this book is for
    2. What this book covers
    3. To get the most out of this book
      1. Download the color images
      2. Conventions used
    4. Get in touch
      1. Reviews
    5. Disclaimer
  6. Understanding the Deep and Dark Web
    1. The origin of the internet
    2. The Deep Web
    3. The Dark Web
      1. Law enforcement
      2. Journalism
      3. Privacy
      4. Criminals
        1. Drugs and illegal substances
        2. Counterfeit goods
        3. Stolen information
        4. Hackers
    4. Summary
    5. Questions
    6. Further reading
  7. Working with the Deep Web
    1. Maintaining privacy on the Dark Web
    2. Transacting on the Dark Web
      1. Secure transaction methods
    3. Deep web emails - Onion Mail
    4. Summary
    5. Questions
    6. Further reading
  8. The Future of the Dark Web
    1. What does the future of the Deep Web hold for us?
      1. Dark Web currency
    2. Dark Web markets
    3. The TOR Project
    4. Public interest in the Dark Web
    5. Summary
    6. Questions
  9. Installing a Linux Virtual Machine (VM)
    1. Linux Distributions
    2. Installing and using a Linux VM
    3. What else can we do with a Linux VM?
      1. Running Linux from a USB flash drive
    4. Summary
    5. Questions
    6. Further reading
  10. Accessing the Dark Web with Tor Browser
    1. What is Tor Browser?
    2. Installing Tor on Linux
      1. Installing Tor Browser via the Terminal, from the downloaded package
      2. Installing the Tor Browser entirely via the Terminal
    3. Tor Project recommendations on the safe use of Tor
    4. Summary
    5. Questions
    6. Further reading
  11. Installing Tails OS
    1. What is Tails OS?
    2. Tails OS installation prerequisites
    3. Downloading Tails OS
      1. Downloading Tails OS in Windows
      2. Downloading Tails OS in Linux
    4. Installing Tails OS
      1. Installing Tails OS in Windows
      2. Installing Tails OS in Red Hat, Fedora (any Linux distro that isn't Debian, Ubuntu, or Mint) for browsing the Dark Web
        1. Installing Tails from the command line
    5. Summary
    6. Questions
    7. Further reading
  12. Installing Whonix
    1. What is Whonix?
    2. Whonix installation and prerequisites
      1. Whonix download
      2. Whonix installation
    3. Using Tor Browser with Whonix
    4. Summary
    5. Questions
    6. Further reading
  13. Installing Qubes OS
    1. What is Qubes OS?
      1. Preparing to install Qubes OS
      2. Hardware requirements
      3. The installation process 
    2. Accessing the Dark Web with Qubes
    3. Summary
    4. Questions
    5. Further reading
  14. What Goes on in the Dark Web - Case Studies
    1. The good and evil side of the Dark Web
    2. Onion websites
    3. Illegal sales on the Dark Web using Bitcoin
      1. The Silk Road
      2. Terrorism
    4. Summary
    5. Questions
    6. Further reading
  15. The Dangers of the Dark Web
    1. Online scams
    2. Avoiding the risks on a Dark Web market
    3. Dangers of the Dark Web
      1. Access
      2. Use and Misuse
      3. Real Risks
      4. Some general dangers
    4. Summary
    5. Questions
    6. Further reading
  16. Using the Dark Web for Your Business
    1. IT professionals
    2. Business companies
    3. Law enforcement agencies 
    4. Military organizations
    5. Cybersecurity professionals
    6. Summary
    7. Questions
    8. Further reading
  17. Assessment
    1. Chapter 1: Understanding the Deep and Dark Web
    2. Chapter 2: Working with the Deep Web
    3. Chapter 3: The Future of the Dark Web
    4. Chapter 4: Installing a Linux Virtual Machine (VM)
    5. Chapter 5: Accessing the Dark Web with Tor Browser
    6. Chapter 6: Installing Tails OS
    7. Chapter 7: Installing Whonix
    8. Chapter 8: Installing Qubes OS
    9. Chapter 9: What Goes on in the Dark Web - Case Studies
    10. Chapter 10: The Dangers of the Dark Web
    11. Chapter 11: Using the Dark Web for Your Business
  18. Another Book You May Enjoy
    1. Leave a review - let other readers know what you think
3.138.113.188