SEVN-X
  • Blog
  • 7XS
  • Team
  • About
  • Stats
  • Services
  • CONTACT US

The Dark Web Exposed Part 2

  1. Home
  2. Blog
  3. Media

An Unfiltered Dive into the Dark Web.

Welcome Back

Last month, we started our unfiltered dive into the dark web by explaining the basics. If you missed Part 1 you can now access it on our website.

Before we start, we want to reiterate that playing around on the dark web can have serious repercussions. Given its daunting and enigmatic reputation, most people have never ventured out to see what really exists on the dark web. We'll give you a peek behind the curtain so that you don't have to put yourself at risk!

SEVN-X does not endorse or condone any material or activities mentioned in this article, nor does it seek to provide commentary or regard with bias any of the sites, users, or material depicted. Screenshots are included for educational purposes only.

Are You Afraid of the Dark?

First things first, we must download and install the Tor browser. Because we can never be certain about what lurks out there, we set up throwaway Windows VMs in Amazon when doing research, investigations, and for this exploration. We highly discourage accessing the dark web on a device that contains any sensitive information.

Once we have installed Tor, we will take a look at some of the settings to make sure we are operating in the most secure manner possible. Again, these sites are unfamiliar to us and there is no way to know if the site will attempt to take malicious action(s). For starters, we enable an extension that will block scripts from running automatically, which could protect us from malicious redirects or drive-by downloads.

It is now time to start looking for web sites. But how do we find them? ...

Unlike the surface web, sites on the dark web do not have normal, human-readable domain names – such as example.com. Instead, dark web domain names are comprised of a random string of letters and numbers—and these change frequently. Another notable feature is that every web address ends with the .onion suffix instead of the standard .com, .org, etc. TLDs.

We will try to locate a web resource known as a hidden wiki. Hidden wikis are sites that provide a directory listing to all kinds of websites, conveniently organized by category. Once we find a hidden wiki, we have quick and easy access to links for all kinds of web sites. The .onion address for a hidden wiki can actually be found on the surface web; after a quick search, we found a valid URL for a hidden wiki.
From here, we can also find specialized dark web search engines. Although not as robust, these search engines can still be quite helpful for finding sites not listed on hidden wikis.

With a plethora of URLs at our disposable, we can begin exploring...

What is Out There?

Most people think that the dark web is just for crime and drugs. While that may be true, there are other "crimes" on the dark web that we may not immediately recognize as criminal. Take freedom of speech for example. It's not an inalienable right in every country.

So for our first stop, we'll visit a journalism site. Here can be found an Afghani documentary detailing the experiences of exiles and their adverse journeys in a time of upheaval. Perhaps this piece had to become available to the world through the dark web as a way of avoiding censorship and individual persecution.

Virus Maker?

Next on a general IT/security interest site, we found a program that generates customized computer virus executables. Based on the nature of the site and a related disclaimer, it seems like this is disseminated for educational and research purposes. However, one can imagine how this might be used in the wrong hands.

Some parts of the dark web attract users for perfectly innocuous activity. Below is a forum populated with threads discussing various art subjects.

Now that you've seen how some of these applications, join us next month for Part 3 of our Dark Web Exposed series where things take a more sinister turn...

  • Last updated on January 16, 2023

Send Us Your Comments

What did you think of this article? Send us a note to let us know what you liked, would like to see more of, or what we can do better. And don't be surprised if we reach back out with a small 'thank you' gift for your feedback.

SEND
  • Author

    Matt Barnett

    Hacker. Developer. Photography Enthusiast.

  • 14 Days Ago Media

Top Categories

  • Media 13
  • Information Security 11
  • Consumer Security 9
  • Physical Security 6
  • Penetration Testing 5

Blog Tags

Share This

Images In This Post

Keep Reading

If you enjoyed this article, check out some of our other recent blog posts.

Blog Post Picture

The Dark Web Exposed Part 3

Matt Barnett 01/17/2023
Blog Post Picture

SSH Port Forwarding

Eric Buck 01/17/2023
Blog Post Picture

Don't Be a Victim: Tips on Buying an Item Online

Ian Coffey 01/12/2023

Newsletter

Want 7x Second Security and other info straight to your inbox? We'll never send boring content.

SEVN-X

Achieve
Better
Cybersecurity.

Get in Touch

  • +1 484 278 3911
  • info[at]sevnx.com
  • Conshohocken, PA
           Wayne, PA
  • SEND A MESSAGE

Read More

  • 7x Second Security [23-Januar…
  • The Dark Web Exposed Part 3
  • SSH Port Forwarding
  • 7x Second Security [16-Januar…
  • Don't Be a Victim: Tips on Bu…

Popular Tags

Weekly Information Security Consumer Awareness NBC Hacking Video

Achieve Better Cybersecurity.

© 2022 SEVN-X LLC.

Search

What are you looking for?

Search SEVN-X Blogs and Security Updates...

Sign In Form

Sign In

Don't have an account? Register now.

Register Form

Register

Have an account? Sign In.

Menu