The dark web consists of hidden servers that are both run and accessed anonymously. In this video, Mike Chapple explains the role of hidden servers on the dark web.
- [Instructor] Hidden sites are one of the most well known … services provided by Tor, … and they're what people generally refer to … when they speak of the Dark Web. … Hidden sites are web servers running on the Internet … that route all of their communications … through the Tor network. … Users wanting to access a hidden site … connect to it through Tor, … but they access it in an indirect fashion … that provides two-way anonymity. … The user doesn't know the true IP address … of the hidden site, … and the hidden site doesn't know the true IP address … of the user. … To create these links, … hidden sites use special URLs known as onion addresses. … The onion address … is a randomly generated alphanumeric address … that uniquely identifies the web server, … and takes the place of a normal domain name. … We'll look more at onion addresses in the next video. … Let's talk first about … how someone goes about creating a hidden site. … First, they build a web server … just like they would …
Author
Released
5/29/2019- What is the dark web and who uses it?
- The purpose of the Tor Browser
- Cryptography and perfect forward secrecy
- Installing the Tor Browser
- Accessing the standard internet with the Tor Browser
- Safeguarding privacy on Tor
- The role of hidden servers on the dark web
- Locating and accessing hidden websites
- Vulnerabilities in Tor
Skill Level Beginner
Duration
Views
Related Courses
-
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Intermediate -
Transitioning to a Career in Cybersecurity
with Marc Menninger1h 10m Intermediate
-
Introduction
-
Anonymous browsing with Tor1m 28s
-
-
1. Welcome to the Dark Web
-
What is the dark web?3m 2s
-
Who uses the dark web?2m 34s
-
The history of Tor2m 31s
-
The Tor Browser2m 40s
-
Keeping it legal42s
-
-
2. Cryptographic Basics
-
Understanding encryption3m 35s
-
Perfect forward secrecy4m 17s
-
-
3. The Tor Network
-
Tor nodes3m 13s
-
Directory servers1m 23s
-
Relays and bridges2m 12s
-
-
4. Browsing the Regular Web Anonymously
-
Installing Tor Browser1m 17s
-
Safeguarding privacy on Tor2m 37s
-
-
5. Hidden Servers and the Dark Web
-
Accessing hidden sites2m 30s
-
6. Potential Vulnerabilities in Tor
-
Attacks against Tor2m 8s
-
User behavior analysis2m 35s
-
Passive traffic analysis2m 9s
-
Circuit reconstruction4m 8s
-
Circuit shaping1m 57s
-
-
Conclusion
-
What's next?46s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Hidden sites and two-way anonymity