Dark Web | TOR | Proxy Chain
Hi there, I’m glad to see you here. In this article, we’ll talk about Anonymity, TOR, Proxy Chain and the Dark Web that people mostly fear. First of all, I’d like to say that there is no such thing as 100% privacy. That’s why you always have to be careful. And don’t forget! You must always research to learn more. I hope it will be helpful for you. Let’s start!
Contents:
-The Dark Web
-TOR
-Proxy Chain
The Dark Web is the hidden collective of internet sites only accessible by a specialized web browser. It is used for keeping internet activity anonymous and private, which can be helpful in both legal and illegal applications. While some use it to evade government censorship, it has also been known to be utilized for highly illegal activity. So why do people use the Dark Web?
-Not indexed by normal user
-Require TOR Browser
-Helps for free speech
-A heaven for illegal activities
-Bitcoin
I hear you ask yourself how can I access the Dark Web? Then let’s answer the questions that need to answered. We need TOR Browser to access the Dark Web. So what is TOR Browser and how to install it? Firstly, I have to warn you. The FBI might come to your house so be careful! (Don’t worry! It was just a joke..)
Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than seven thousand relays, to conceal a user’s location and usage from anyone performing network surveillance or traffic analysis. Using Tor makes it more difficult to trace a user’s Internet activity. Tor’s intended use is to protect the personal privacy of its users, as well as their freedom and ability to communicate confidentially through IP address anonymity using Tor exit nodes.
Tor Browser Setup
Step 1: Run the “apt-get install tor -y” command to install tor.
Step 2: Download the GNU/Linux “.tar.xz” file.
Step 3: Do you wonder what’s in it? Let’s see!
Step 4: Life is full of “errors”. But every error has a solution.
Step 5: Open “start-tor-browser” file with a text editor.
Step 6: Find the syntax and delete it.
Step 7: Now everything is ready. Let’s go!
Step 8: We need to go deeper. But how? We’ll use DuckDuckGo for this.
DuckDuckGo (DDG) is an internet search engine that emphasizes protecting searchers’ privacy and avoiding the filter bubble of personalized search results.
Step 9: Welcome to the Dark Web!
The Hidden Wiki is one of the oldest link directories on the dark web. Famous for listing all important .onion links. From drug marketplaces to financial services you can find all the important deep web services listed here. If you are looking for the best dark web sites, the Hidden Wiki has them all in one place.
There is one more thing I need to explain. Maybe you have asked yourself what is .onion? “.onion” is a special-use top level domain name designating an anonymous onion service, which was formerly known as a “hidden service”, reachable via the Tor network.
We have access to the Dark Web and everything is going well. So how do we stay hidden? There are two concepts we need to know about this subject. Let’s examine these concepts now.
-ProxyChains
-SOCKS
ProxyChains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any other SOCKS4, SOCKS5 or HTTP proxies. It is an open-source project for GNU/Linux systems.
-Strict Chain: User request for a server must go through defined sequence of chains of proxies connection is lost if anyone fails.
-Dynamic Chain: User request for a server must go through defined sequence of chains of proxies connection is NOT lost if anyone fails.
-Random Chain: User request for a server can.
SOCKS (Socket Secure) is an Internet protocol that exchanges network packets between a client and server through a proxy server.
Proxy Chain Configuration
Step 1: You can open the configuration file using a text editor.
Step 2: If you know programming, you know that hash creates a comment line. (Just a little information..)
Step 3: If you say what are dynamic chain and strict chain? Go up!
Step 4: Do you remember what is “SOCKS”?
Step 5: Run the “service tor start” command to start the tor service.
Step 6: It’s time to disappear!
Step 7: Check your IP address!
-dns leak test
-what’s my ip
I guess I live in Germany from now on. I’ll miss my home..
It’s your turn! Send another request and check what has changed. You can review what has changed after each request you send. There is no limit to what you can do. But remember what I said about privacy at first and don’t go too deep. Finally, research more and learn more.
Thank you for your time. See you soon! Until that time.. Happy Hacking ❤
Resources:
https://www.kaspersky.com/resource-center/threats/deep-web
https://en.wikipedia.org/wiki/Tor_(network)
https://tb-manual.torproject.org/installation
https://hacksheets.in/all-categories/useful-resources-main/proxychains