Dark Web Reconnaissance: The Art of Uncovering the Hidden Adversaries

Apr 29, 2024

Introduction

The cyber kill chain is the intelligence-driven defense framework developed by Lockheed Martin. It is a seven-stage model that helps security engineers identify advanced persistent threats(APTs) and mitigate the impact of cyber attacks on organizations. The seven stages are Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, Command and Control, and Actions on Objectives. This publication focuses on how threat actors leverage the dark web to compromise victims during the Reconnaissance phase.

How to access the dark web using VPN

The dark web is a haven for cybercriminals. Cyber security analysts must use a VPN and the Tor browser to access the dark web. The first step is to install a VPN like OpenVPN, ZeroTier VPN, or PfSenseVPN. The VPN encrypts internet connections, hiding user's IP addresses from the public. After you install the VPN, the second step is to install the Tor browser. Uncovering cyber adversaries in the dark web requires cyber security analysts to use the Tor browser and search engines like DuckDuckGo, Candle, Dark Search, Torch, Ahmia, Not Evil, Haystak, and The Hidden Wiki. Don't use surface web search engines like Google, Firefox or MSN.

 

Accessing the dark web without using a VPN and the Tor browser is extremely risky and unsafe. It is highly recommended to use the VPN when accessing the dark web. Unlike the surface web which is controlled by laws and regulation authorities, the dark operates with no regulations and this makes it a favorite place for cybercriminals. When a user accesses the dark web without a VPN installed on the machine, the....

Author

Peter Chari
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023