Introduction
The cyber kill chain is the intelligence-driven defense framework developed by Lockheed Martin. It is a seven-stage model that helps security engineers identify advanced persistent threats(APTs) and mitigate the impact of cyber attacks on organizations. The seven stages are Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, Command and Control, and Actions on Objectives. This publication focuses on how threat actors leverage the dark web to compromise victims during the Reconnaissance phase.
How to access the dark web using VPN
The dark web is a haven for cybercriminals. Cyber security analysts must use a VPN and the Tor browser to access the dark web. The first step is to install a VPN like OpenVPN, ZeroTier VPN, or PfSenseVPN. The VPN encrypts internet connections, hiding user's IP addresses from the public. After you install the VPN, the second step is to install the Tor browser. Uncovering cyber adversaries in the dark web requires cyber security analysts to use the Tor browser and search engines like DuckDuckGo, Candle, Dark Search, Torch, Ahmia, Not Evil, Haystak, and The Hidden Wiki. Don't use surface web search engines like Google, Firefox or MSN.
Accessing the dark web without using a VPN and the Tor browser is extremely risky and unsafe. It is highly recommended to use the VPN when accessing the dark web. Unlike the surface web which is controlled by laws and regulation authorities, the dark operates with no regulations and this makes it a favorite place for cybercriminals. When a user accesses the dark web without a VPN installed on the machine, the....