Introduction To Dark Web
Introduction To Dark Web
The Good Guys - Intelligence Gathering Intelligence Gathering by Law Enforcement Intelligence Gathering by Threat Intelligence Company The Bad Guys - Insight into Illegal Sites a screenshot of a REAL site on the dark web that is supposedly selling handguns
in the UK. This site could be run by scammers, law enforcement, or worse – a
It’s important to note that different countries will likely have different It is common knowledge that law enforcement entities around the world monitor the Here are just a few things that security teams could benefit from Dark Web: DO. NOT. SEARCH. FOR. SITES. LIKE. THESE. legitimate site.
regulations and laws when it comes to accessing the dark web for different dark web, infiltrate private sites and forums, and gather intelligence and evidence
purposes, and you should always research any applicable legal content before that can be used to prosecute criminals who hide behind the apparent anonymity • Information about cyber-attacks that are being planned or launched in the near • If you click on one wrong link and your browser loads explicit material,
conducting dark web operations to ensure that you are not prosecuted for provided by TOR and the dark web. future – allows security teams to prepare. such as child pornography, you are accountable for it and can be
illegal activity. Involve your legal team or a consultant, and make law • Information about malicious actors selling access to companies – this can allow prosecuted for viewing it.
enforcement aware of what you’re doing. The below is based on information Below are some interesting cases where law enforcement has conducted large-scale security teams to identify the compromised accounts or systems and kick the attacker • If you click on one wrong link your system can be infected with malware
from the US Department of Justice. operations within the dark web. out. that can steal or encrypt your files, leading to 2nd stage attacks such as
• Information about malicious actors selling malware and hacking tools – this can blackmail.
Legal Activities Operation Onymous provide valuable indicators that a security team can proactively block (such as file
• Organizations are able to ‘passively’ collect threat intelligence from dark Silk Road was the largest and most well-known dark web marketplace, hashes).
web sources. This means ‘scraping’ publicly-accessible sources is primarily used for the sale of illegal drugs around the world. The website • Data breach dumps typically end up on the dark web, either freely available or sold at
permitted. Organizations can silently watch and listen to activity on the launched in February 2011, but was shut down in October 2013 by the FBI who an auction – being able to access the list of breached credentials can help
dark web, and record it for other purposes such as dissemination or for arrested the founder, Ross Ulbricht. In November, Silk Road 2.0 was raised by the organizations to identify if any of their corporate accounts were included, so they can
team behind the original website. A year later the site was once again shut down Whilst illegal marketplaces do operate in the dark web, there are a vast number of
selling to clients. reset the passwords and ensure no malicious actors can gain access.
by law enforcement as a part of “Operation Onymous”, a joint effort headed by fake sites and stores. These can either be operated by scammers, looking to take
• Access private dark web forums legally. This goes hand-in-hand with the
the FBI and Europol to “address the problems of malware, botnet schemes, and money then disappear, or by law enforcement setting up sting operations to
above point – provided individuals can gain legitimate access to a forum,
Example Company - https://www.recordedfuture.com/ catch individuals that are purchasing illegal goods. Let’s walk through a mock
they are permitted to scrape the contents for later analysis or sharing. illicit markets or darknets” (1). Police forces in 17 different countries were
involved, and it is thought that around 27 sites were taken over, preventing scenario where a criminal in the UK is looking to buy a firearm.
Legal access in this context means that the individual(s) need to be invited
into the forum (typically achieved by creating a fake online persona and illegal activities from continuing. Over $1,000,000 in bitcoin was retrieved, along
performing social-engineering attacks against forum staff) or by with other assets including gold, silver, cash, and drugs.
purchasing access.
• Masquerade as a criminal on forums, asking for advice from criminals or Hansa Dark market Infiltration
hackers in order to collect intelligence. This must be well documented so • Hansa, similar to Silk Road, was previously the largest dark web marketplace in
that law enforcement knows this is for legitimate purposes and not Europe, with 3600 dealers, 24,000 different drug-related products, and other
genuine criminal activity. miscellaneous sales of fake documents. As observed with Silk Road, when a
marketplace is simply shut down by law enforcement, customers and traders
Illegal Activities simply move to one of the many other available sites. In the case of Hansa, in
• Providing dark web forums or private site staff with illegal material in 2016 Dutch officers from the Netherlands National High Tech Crime Unit decided
order to gain access or build trust, such as malware or personal to infiltrate and take over a marketplace, rather than shut it off completely.
information that could be used to conduct crimes. • Dutch investigators uncovered the identities of two Hansa administrators and
• Accessing forums or private sites by brute-forcing account credentials, gained access to both of their accounts, so they now had complete control over
exploiting a vulnerability, using compromised credentials belonging to the site. In the following months, officers worked to uncover the identities of
another user, or impersonating a real person. sellers and buyers by performing social engineering attacks, tricking users into
• Assist individuals or parties in committing crimes by offering advice, opening files on their own systems which grabbed system information and
information, money, or resources, as this makes you an accessory to any geographical location and edited the site code to perform passive
crimes that occur as a result. reconnaissance and collect information from site visitors.
• This operation was believed to be “one of the most successful blows against the
dark web in its short history: millions of dollars' worth of confiscated bitcoins,
more than a dozen arrests and counting of the site’s top drug dealers, and a vast
database of Hansa user information that authorities say should haunt anyone
who bought or sold on the site during its last month online”.
Accessing the Dark Web Accessing the Dark Web Accessing the Dark Web Browsing Activity
The Onion Router Tor Warning and Disclaimer Accessing Tor Below is a list of the sites that you need to find either using clear web or dark web
search engines to find their current URLs, and then answer an additional question by
The History of TOR
before attempting to access TOR, for your own safety: When using TOR, your request is encrypted, sent to your ISP, then moves on to TOR nodes, visiting them using the TOR browser.
TOR was founded by individual researchers who worked at the US Naval Research Laboratory. systems that are used to bounce requests around. After a number of bounces, your request
• Understand that there is the potential for you to come across offensive or explicit will be decrypted and sent to the intended destination so that it is impossible to track • What is the current URL for the CIA mirror website on the dark web?
David Goldschlag, Mike Reed, and Paul Syverson realized there was a distinct lack of internet
http://ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion/
security in the 1990s and saw how easy it was to perform surveillance, so they decided to find a content, and you should be prepared to deal with viewing it. where the original request actually came from.
solution that would work to protect the privacy of internet users. Their solution was onion • As an unregulated part of the internet, there is an increased risk of criminals or
• Visit the CIA mirror site and search for “Our Organization” on the “About” sub-
routing. hackers trying to steal your data, get you to download malware, or attack your system
menu. What is the first of the seven basic components of the CIA?
through the browser. Make sure all software is up-to-date or disabled, such as Flash integrity; service; excellence; courage; teamwork; and stewardship
The basic explanation for how onion routing works is that instead of traffic going from A > B it Player and your browser. Do not click on any links or navigate to any sites if you do
goes from A > C > J > K > B, and the traffic is encrypted at each part of the journey, making sure not know what they are. • What is the current URL for the ProPublica investigative journalism outlet?
that it can’t be intercepted or sniffed during transit. This also meant that it was extremely • Ensure you have an updated operating system, including security updates and https://www.propublica.org/
difficult for B to identify where the request has come from (A). patches. http://p53lf57qovyuvwsc6xnrppyply3vtqm7l6pcobkmyqsiofyeznfu5uqd.onion/
• Ensure you have an up-to-date anti-virus solution and it is running.
For TOR to function, it needed a decentralized network – a large number of independently- • We highly recommend that you use a VPN, then use the TOR browser.
owned servers (known as ‘nodes’) which worked together to form a network, which would later Tor download - https://www.torproject.org/ • On the ProPublica site, click on “About” at the top. Copy and paste the first
be named the ‘Tor network’. To make it accessible for new nodes to be created, in October sentence under the heading “The Mission”.
2002 the code for Tor was released as free and open-source software, and within a year there To expose abuses of power and betrayals of the public trust by government, business,
were 13 active Tor nodes. and other institutions, using the moral force of investigative journalism to spur reform
through the sustained spotlighting of wrongdoing.
The Electronic Frontier Foundation, a non-profit dedicated to defending civil liberties in the
digital world, saw the importance of the Tor network in 2004 and began funding the work being
completed by Roger Dingledine and Nick Mathewson. In 2006 they formed “The Tor Project,
Inc”, a 501(c)3 non-profit organization, so they could receive funding in order to continue
developing and maintaining Tor.
Challenge Scenario
Last month we were informed about a huge drug trafficking network that was taking place in
the UK through the TOR network, in response to this situation we set to work and managed to
dismantle their main TOR marketplace to stop drugs from reaching the streets of the UK.
However, we were informed that one of the creators of this network managed to evade us and
is now continuing to carry out this type of activity. This is where you come in. We think we have
found the site that this individual uses to “tell their stories” regarding criminal activity.
We need you to find evidence that will allow us to identify this subject, relate it to drug
trafficking crimes, and bring them to justice. We know this is a difficult task, but we are
confident in your abilities, and we are sure that you will succeed.
1] Gain access to the site (Visit the URL, click on ‘Start Challenge’ button. When presented with
a login screen, right-click and select “Inspect Element”. Select the ‘Console’ tab and enter in the
command: generateUserCredentials(). Decode the answer, and you’re good to go!)
generateUserCredentials(){let
ret='';usrs=["KF7ybuD1"];pswds=["AIyhfot0V9VIWm6W"];ret="USR:"+usrs[Math.floor(Math.random()*u
srs.length)]+" , PASS: "+pswds[Math.floor(Math.random()*pswds.length)];cons…
siteusername1- Wousbacan
siteusername2- DarkChest984
Country: Germany
Country: United Kingdom
Date: 17/8/20XX
Date: 23/8/20XX
Date: 26/10/20XX
31st October
51°56'57.2"N 1°19'26.1"E
====
Authentic Swiftzerland's chocolate you're tired of not finding good chocolate? This post is for you.
Recreational Drugs Buying/SellingLet the party begins! (Everything you wanna know about drug dealing)
Hey dude... wanna candy? (The real D king!)Deliver the package, collect the money and live like a king!
BBB Organs for saleAre you such an alcoholic that your kidney stopped working? Don't worry, we can
get you a new one.
Love Scales (Reptile Sales)We all love these little cute and beautiful reptiles, come and get one :3
Hey dude... wanna candy? (The real D king!)Deliver the package, collect the money and live like a king!
BBB Organs for saleAre you such an alcoholic that your kidney stopped working? Don't worry, we can
get you a new one.
Love Scales (Reptile Sales)We all love these little cute and beautiful reptiles, come and get one :3
saleAre
oholic KF7ybuD1 AIyhfot0V9VIWm6W
y stopped DarkChest984
worry, -
26/10/20XX
Hexadecimal
31/10/20XX
51°56'57.2"N 1°19'26.1"E