The Dark Web - Part 1
KARAN KOHALE
Cybersecurity Engineer | Cyber Threat Intelligence | Certified Ethical Hacker | Incident Response | XDR | IT Security Engineer | SOC Analyst | ZTA | SIEM |
Hello folks, it’s been a while. Have you heard of illegitimate buying and selling on the web before? Have you heard about a market where all sorts of illegal goods like human parts, cannabis, guns, nuclear weapons, and the relatable item called credit cards are being sold? Oh yes! I can feel you nodding your head for either yes or no. Don’t worry about it, in this article, I will be sharing with you how to access such a market, what is it called, and how to safely access it.
Threat intelligence is not only meant for security professionals but likes of journalists, privacy-conscious people do it a lot without knowing what it is being called. So if you are curious about how to monitor your brands, it is a must for you to understand how to get into a place on the web called Dark Web
The web consist of three distinct part
Accessing the darknet is key to every threat intelligence analyst because of the following reasons
领英推荐
Tools to Access
Dark Web Search Engine
Conclusion
Navigating the darknet can be quite interesting and intriguing yet you must exercise safety as you ride the dark tunnel. First block web cam, second don’t download anything from the darknet, and lastly don't maximize the tor browser screen. Enjoy surfing!
Part 2 will be Dark Web Research