Ethical Hacking | Introduction To Deep and Dark Web

 Deep And Dark Web

In Today's digital world, most of the people only know about the internet which consists of website and applications like You tube, Facebook, twitter, etc. Internet is also known as surface web which is only 4% of the original web. But deep down, it consists of dark and deep web which is the remaining 96% part of the internet. It is not possible to access the Deep and dark web with normal browser like chrome, firefox, etc. It can only be accessed by Tor Browser. Now, what is to TOR browser lets discuss....


Q1) What is Tor Browser and why we use TOR browser ?

Answer) Tor is a free and open source software used to provide anonymous communication. Full form of TOR is The Onion Router. It was developed in the late 1990's by the US Government to provide anonymity in their communication with other country's. As the name suggest, it is a router that connects from one to node to another node to provide anonymity.


Q2) How did normal people came to know about the Tor Project ?

Answer) The Tor browser was first only used by the US government. But later the anonymous group hackers came to know about this project. And they leaked the information.  


Q3) How does the TOR browser works ?

Answer) Now, we will be discussing about the working of the Tor browser which is as follows :- 

The first coating: Entry-Point

The entry stage or the first node (computer) in the tor receives IP address from the PC. The tor then connects our personal computer to some other server (server 2), the node. All the information is encrypted on the way for this node.

 

The Second coating: TOR nodes

The node (server 2) knows the IP address of your entrance node not your personal IP address. The information sent through this node is encrypted and can’t be read by the other node. Besides the entrance stage ( ke ilava) , the tor node only knows the exit node (Server 3 -- The host that connects you to the page ).

 

The Third Twist or Final: Exit Node

The exit node (server 3) connects us to the internet where the page is located. The extension of the site is .onion. Except of the tor community, services with .onion expansion aren’t available.

 

The Goal: Internet Server

It helps to reach us to the end of destination. Here, the deep web page you want is saved. The internet only knows the IP Address of the exit node not your personal PC. The information point between the notebook and entrance point are all encrypted. The entry points gets encrypted package, repacks it, adds the speech (url or link) of this tor node and its sender IP address. It then sends the package to the tor node, which essentially does the exact same thing. The another node doesn’t open the package, but flags its IP address as the sender. Also sender sends entire thing on into the speech of the exit node. The IP address of the devices stays secure.

We can also get ordinary or even clear web pages with the help of TOR.For normal web pages tor acts like ordinary web browser. In the case of profound web pages, it is something different. Given sophistication and higher number of links required, obtaining profound web pages considerably takes longer time to access the web page.


Q4) Is the user highly protected with TOR?

Similar programs like TOR browser make the taken information anonymous. Therefore, information sent via it isn’t necessarily protected. Even, when tor is used information like credit-card , log-in info or address can be extracted when inputting data into web. The anonymity of TOR communicating may also get affected if a person gains access into the TOR browser and can be manipulated easily just like other application.


👉 In the above article, we saw what is TOR browser, its working and which browser can we use to access deep and dark web. Now, we will see what actually is Deep and Dark web.


Q5) What is Deep Web ?

Answer) After the Surface web which top web, then comes the second web which is actually the deep web. The Information which is available in deep web cannot be accessed or is not available over the seep web. It is one layer that is removed from the public web. Deep web is something apart from surface web which is only available below ocean. Deep web contains the government confidential files, academic databases, medical records, financial records, legal documents, scientific report, organizational report and many more stuff. 


Q6) What is dark web ?

Answer) The third and the last web is the dark web. As the name suggests dark web, it contains information which is dark mean illegal. The dark web contains information like political protect, drug trafficking, non-licensed weapons, terrorism, phishing and scams, child pornography and many more illegal stuff. Here, you will mostly see black hat hackers, journalism, news and government organizations like FBI, CIA, Europol, department of Justice, etc roaming or moving on the dark web. These organization seizes the website which they illegal.   


I hope you liked our post on the topic Introduction to deep and dark web... What did you feel about our post, please feel free to tell in the comment section....

Comments

Popular Posts