Introduction The cyber kill chain is the intelligence-driven defense framework developed by Lockheed Martin. It is a seven-stage model that helps security engineers identify advanced persistent threats(APTs) and mitigate the impact of cyber attacks on organizations. The seven stages are Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, Command and Control, and Actions on Objectives. This publication focuses on how threat actors leverage the dark web to compromise victims during the Reconnaissance phase. How to access the dark web using VPN The dark web is a haven for cybercriminals. Cyber security analysts must use a VPN and the Tor browser to access the dark web. The first step is to install a VPN like OpenVPN, ZeroTier VPN, or PfSenseVPN. The VPN encrypts internet connections, hiding user's IP addresses from the public. After you install the VPN, the second step is to install the Tor browser. Uncovering cyber adversaries in the dark web requires....