Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Dark Web Analysis

You're reading from   Hands-On Dark Web Analysis Learn what goes on in the Dark Web, and how to work with it

Arrow left icon
Product type Paperback
Published in Dec 2018
Publisher
ISBN-13 9781789133363
Length 210 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Sion Retzkin Sion Retzkin
Author Profile Icon Sion Retzkin
Sion Retzkin
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. Understanding the Deep and Dark Web FREE CHAPTER 2. Working with the Deep Web 3. The Future of the Dark Web 4. Installing a Linux Virtual Machine (VM) 5. Accessing the Dark Web with Tor Browser 6. Installing Tails OS 7. Installing Whonix 8. Installing Qubes OS 9. What Goes on in the Dark Web - Case Studies 10. The Dangers of the Dark Web 11. Using the Dark Web for Your Business 12. Assessment 13. Another Book You May Enjoy

Cybersecurity professionals


Cybersecurity professionals also use the Dark Web. They monitor sites, forums, and blogs, where hackers exchange information regarding new exploits and hacks, companies or individuals they've targeted, and more. This provides them with threat intelligence and insights into emerging threats, thus enabling them to better protect their organizations.

There are also many systems that collect threat intelligence, some collecting information from the Dark Web, such as Silobreaker, Webhose, RepKnight, Terbium labs, Massive, Recorded Future, Sixgill, Hold Security, and AlienVault, which provide information about new malware and exploits and also allow the user to detect whether there's jabber about a person or company, by searching for a credit card number or a social security number, among other capabilities. This allows them to detect new vulnerabilities and exploits, and also receive insights as to whether companies are being targeted or were hacked and had their information...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image