The Tor Browser provides users with the ability to access hidden websites. In this video, Mike Chapple explains the process for locating and accessing these sites.
- [Instructor] Once a hidden site is up and running, … it's available for users to access. … Users do this through a fairly complex process … that protects the anonymity … of both the user and the hidden server. … First, the user must know the onion address … of the site that they wish to access. … They might learn this address on the standard Internet, … or through a directory of hidden sites. … They look up this address in the onion database … and learn the introduction points for that hidden site. … Next, the user's browser selects a Tor node … to serve as the rendezvous point for the connection. … This rendezvous node will not know the identity … of the user or the hidden site, … but it will serve as the relay … for all communications between the user and the site. … The user's browser then creates an introductory message … disclosing the location of the rendezvous point … and a secret key. … This message is encrypted … using a public key belonging to the hidden site … that is stored in the onion database. …
Author
Released
5/29/2019- What is the dark web and who uses it?
- The purpose of the Tor Browser
- Cryptography and perfect forward secrecy
- Installing the Tor Browser
- Accessing the standard internet with the Tor Browser
- Safeguarding privacy on Tor
- The role of hidden servers on the dark web
- Locating and accessing hidden websites
- Vulnerabilities in Tor
Skill Level Beginner
Duration
Views
Related Courses
-
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Intermediate -
Transitioning to a Career in Cybersecurity
with Marc Menninger1h 10m Intermediate
-
Introduction
-
Anonymous browsing with Tor1m 28s
-
-
1. Welcome to the Dark Web
-
What is the dark web?3m 2s
-
Who uses the dark web?2m 34s
-
The history of Tor2m 31s
-
The Tor Browser2m 40s
-
Keeping it legal42s
-
-
2. Cryptographic Basics
-
Understanding encryption3m 35s
-
Perfect forward secrecy4m 17s
-
-
3. The Tor Network
-
Tor nodes3m 13s
-
Directory servers1m 23s
-
Relays and bridges2m 12s
-
-
4. Browsing the Regular Web Anonymously
-
Installing Tor Browser1m 17s
-
Safeguarding privacy on Tor2m 37s
-
-
5. Hidden Servers and the Dark Web
-
Accessing hidden sites2m 30s
-
6. Potential Vulnerabilities in Tor
-
Attacks against Tor2m 8s
-
User behavior analysis2m 35s
-
Passive traffic analysis2m 9s
-
Circuit reconstruction4m 8s
-
Circuit shaping1m 57s
-
-
Conclusion
-
What's next?46s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Accessing hidden sites