0% found this document useful (0 votes)
45 views9 pages

Dark Web Search - Introduction and Instruction - Cybrary

Uploaded by

Krishna Mahanti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views9 pages

Dark Web Search - Introduction and Instruction - Cybrary

Uploaded by

Krishna Mahanti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

3/25/2021 Dark Web Search: Introduction and Instruction | Cybrary

Home / 0P3N Blog / Dark Web Search: Introduction and Instruction

Ready to Start Your Career?


Create Free Account

Dark Web Search: Introduction and Instruction


By: Nihad Hassan
September 28, 2020
Nowadays, cyber threats are coming from everywhere, from both the surface and the
dark web. For instance, many enterprises rely on information collected from dark web
communities to predict future attacks against their IT infrastructure and information
systems.
The World Wide Web is composed of three layers: the surface, deep, and dark webs.
The surface–or normal - web is what most people refer to when talking about the
internet (although the internet and the web are two different terms). The surface web
makes up less than 4% of the entire web content and includes web pages that are
indexed by typical search engines, such as Google and Yahoo. The second layer is the
deep web. The content within this layer is hidden behind a paywall (i.e. requires paid
access), login pages, or requires the user to enter search queries in HTML forms to
retrieve information from deep web databases. The deep web makes up the greatest
volume of the web’s content. Many researchers estimate the deep web’s size to be 400
to 550 times the size of the surface web. Typical search engines cannot index their
contents. Both surface and deep web can be accessed using typical web browsers;
however, things are different when talking about the deepest layer of the web (the dark
web) which requires special software to access. The dark web is a tiny portion of the
deep web (it makes up less than 1% of the entire web’s size). The dark web is not one
network, rather, it is a term for any closed network that requires specific software,
configurations, or authorization to access that mask the identity of its visitors (e.g. by
concealing their IP address). The collection of these networks (e.g. TOR, I2P, Freenet)
form the dark web.
Dark web sites are accessed by thousands of people every day; however, there is no
central repository for these sites that simplify finding contents within them. Knowing

https://www.cybrary.it/blog/dark-web-search-introduction-and-instruction/ 1/9
3/25/2021 Dark Web Search: Introduction and Instruction | Cybrary

how to find your way within this jungle becomes an essential skill for any cybersecurity
professional.
The dark web can be the source of very important information when looking for threat
intelligence. However, finding information on the dark web is very difficult, especially
when searching for criminal communities involved in trading illegal products and
services.
In this article, we will shed some light on popular dark web services (both search
engines and directories) to search and locate information in the dark web, focusing on
the TOR anonymity network because of its size and popularity.

Start The "How To Use Tor" Course Today >>


Tor2web Tor2web (see Figure 1 is the first free online service that can be used to
access the TOR darknet, without the TOR Browser and using your current web browser
from the normal (surface) internet.
TOR websites (also known as TOR Onion Services) have the extension *.onion. To use
Tor2web, all you have to do is replace the onion website extension with either *.onion.to,
*.onion.city, *.onion.cab, or *.onion.direct to access the TOR service on the darknet.
Tor2web connects you with onion services hosted on the TOR network and relays
messages back to you via the TOR network.
If you are using the TOR network for anonymity, then it is not advisable to use this
service. However, if you aim to browse TOR hidden services using your standard web
browser without using the TOR Browser, then Tor2web is your option.
alt_text

DarkSearch DarkSearch (see Figure 2 claims it can index a large percentage of the TOR
network content. Currently, it has indexed more than one million pages from about
2000,0 sites. We can use this service from the surface web to search for keywords
within TOR hidden services. Darksearch uses the Tor2web service to access content on
the TOR darknet using typical web browsers.
https://www.cybrary.it/blog/dark-web-search-introduction-and-instruction/ 2/9
3/25/2021 Dark Web Search: Introduction and Instruction | Cybrary

DarkSearch differentiates its service from other dark web search engines by offering a
free API to automate searches in addition to crawling TOR darknet hidden services,
weekly, to update its index. Finally, DarkSearch does not store user search queries when
using it from the surface web, although, keeping user anonymous can be achieved by
accessing this service from within the TOR anonymity network (using the TOR Browser).
alt_text

Ahmia Ahmia (see Figure 3 is an old search engine for finding hidden services on the
TOR anonymity network. Ahmia is a free and open-source project, so one can set up a
working version of Ahmia on a local computer with its crawlers and index. Ahmia offers
some forms of privacy for its users by not recording user search queries; however, unlike
the previous two services, you need to use TOR Browser to access results returned by
Ahmia search engine.
Ahmia has a dedicated search facility for I2P anonymity network that can be accessed at
http://msydqstlz2kzerdg.onion/i2p/.
Finally, Ahmia allows TOR hidden service owners to register their sites on its index, so
other searchers can locate the website and its contents more easily.
alt_text

https://www.cybrary.it/blog/dark-web-search-introduction-and-instruction/ 3/9
3/25/2021 Dark Web Search: Introduction and Instruction | Cybrary

Torch TORCH (see Figure 4 is another search engine for searching the TOR network, it
claims to index around 1.1 Million pages.
alt_text

TorLinks TorLinks (see Figure 5 is a directory of TOR hidden services. Sites are
categorized into groups (both commercial and non-commercial sites).
alt_text

not Evil not Evil (see Figure 6 is another search engine for finding information on the
TOR anonymity network. not Evil does not index sites promoting illegal products and
services.

https://www.cybrary.it/blog/dark-web-search-introduction-and-instruction/ 4/9
3/25/2021 Dark Web Search: Introduction and Instruction | Cybrary

alt_text

QUO QUO (see Figure 7 is a dark web full-text search engine designed to create a
continuously updated index of onion pages. This site claims it has indexed more than
one million pages across 20k onion sites. QUO does not record user searches via logs,
cookies, or JavaScript.
alt_text

DeepLink Onion Directory DeepLink (see Figure 8 is the richest directory of TOR hidden
services on the TOR anonymity network. It lists both legal and illegal services and some
of them link to different marketplaces for buying and selling illicit goods, including stolen
personal information that can be used for identity theft.

https://www.cybrary.it/blog/dark-web-search-introduction-and-instruction/ 5/9
3/25/2021 Dark Web Search: Introduction and Instruction | Cybrary

alt_text

Summary
In today’s information age, to manage risks against your organization, you need to have
access to a vast amount of digital data that may exist on the dark web. There are no
centralized search engines for locating information on dark web anonymity networks;
however, there are a few search engines and some web directories that list major dark
web sites. They can serve as your introduction point to begin your journey of discovering
resources on the dark web. Keep in mind, the dark web is where most cybercriminal
activities take place, use a reliable VPN service, and a security-hardened operating
system (e.g. Tails) before accessing this place.

Previous Next

https://www.cybrary.it/blog/dark-web-search-introduction-and-instruction/ 6/9
3/25/2021 Dark Web Search: Introduction and Instruction | Cybrary

Related Blogs

Top Five Cybersecurity Challenges In 2021


By: Nihad Hassan
IT leaders increasingly appreciate the importance of cybersecurity to their organizations, the recent
cyberattacks against high-profile organizations show the vital work that should be done to overcome
and mitigate such attacks as possible. The ongoing spread of COVID19 disease has forced most
organizations to adopt the work from home model. The ...

ISSEP Training Course Review


By: Shimon Brathwaite
What is the ISSEP training course? The ISSEP stands for Information Systems Security Engineering
Professional, a concentration for the CISSP certification, the most popular and in-demand
cybersecurity certification globally. The ISSEP certification is vendor-neutral specialty certification
that demonstrates an individual’s proficiency in designing, creating, and implementing security for
information systems, ...

Top 11 Python Interview Questions


By: Nihad Hassan
There are many high-level programming languages; however, Python language gain increased
https://www.cybrary.it/blog/dark-web-search-introduction-and-instruction/ 7/9
3/25/2021 Dark Web Search: Introduction and Instruction | Cybrary

popularity among cybersecurity professionals in recent years for many reasons like: Python
programming is considerably easy to learn, comparable with Java and C, and its syntax is much
simpler. Python is a free and open-source programming language so ...

Related Courses

Cross-Site
Scripting

Cross-Site Scripting
This course will cover an introduction to Cross-Site Scripting XSS a popular cybersecurity attack. ...
CYBRARY COURSE INTERMEDIATE 40 MINUTES 1 CEU/CPE HOURS AVAILABLE
CERTIFICATE OF COMPLETION OFFERED

Cloud
Architecture
Foundations
Cloud Architecture Foundations
In this Cloud Architecture training, students learn the basics of cloud computing across three platforms ...
CYBRARY COURSE INTERMEDIATE 7 HOURS 31 MINUTES 8 CEU/CPE HOURS AVAILABLE
CERTIFICATE OF COMPLETION OFFERED POPULAR

Android
Development
Fundamentals
Android Development Fundamentals
Android users dominate the mobile market, so the demand for Android developers is high. This ...
CYBRARY COURSE BEGINNER 4 HOURS 3 MINUTES 4 CEU/CPE HOURS AVAILABLE
CERTIFICATE OF COMPLETION OFFERED

Build your Cybersecurity or IT Career


https://www.cybrary.it/blog/dark-web-search-introduction-and-instruction/ 8/9
3/25/2021 Dark Web Search: Introduction and Instruction | Cybrary

Accelerate in your role, earn new certifications, and develop cutting-edge skills
using the fastest growing catalog in the industry

Start Trial

Create Free Account

Solutions Platform
For Individuals Catalog
For Teams Instructors
Alliances

Company Resources
About Blog
Careers Help Center
Press Verify Certificate
Exam Vouchers
The Cybrary Podcast
Mobile App
Report a Vulnerability
Cybrary Text Logo
Black SVG

© 2021 Cybrary Terms of Service Privacy Policy


Protected by Signal Sciences
Logo

https://www.cybrary.it/blog/dark-web-search-introduction-and-instruction/ 9/9

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy