ISFT Individual Assignment (TP069597)
ISFT Individual Assignment (TP069597)
Contents
1.Introduction...........................................................................................................................3
2.Steps on how to surf into the dark web site securely.........................................................4
3.Steps on decoding for each evidence. What tools are using?............................................5
4.List of evidences.....................................................................................................................7
5.Solution.................................................................................................................................13
6.Conclusion............................................................................................................................14
7.Individual Reflection...........................................................................................................15
8.References............................................................................................................................16
2
1.Introduction
A specialised web browser is required to access the hidden network of websites known as the
dark web. It is employed to preserve the secrecy and anonymity of online behaviour, which is
beneficial for both legal and illegal purposes. Even while some people utilise it to evade
government surveillance, its usage for severely criminal actions has also been reported.
(Kaspersky, 2022)
The dark web does have some benefits. In areas that the surface web frequently fails short of,
the dark web can assist in preserving users’ privacy. Users can post news about their nation’s
events while avoiding official censorship, for instance. Many times, informants use the dark
web to locate partners who can take their information and disseminate it in a more open
forum. (mpeluso, 2020)
Due to its anonymity, the dark web is sometimes used for nefarious and even illegal
activities. They include trading in illegal goods like drugs, guns, identities, and passwords as
well as other potentially dangerous items. (Elmwood Campus, 2021) As it is not governed,
the dark web offers users less protection. So, opening links or downloading data makes it
simple to infect your computer.
3
2.Steps on how to surf into the dark web site securely
First step is getting Tor browser. The Tor Browser is the simplest way to access Tor. It is
available for free download and installation.
Employ a VPN for increased safety. Since Tor node Ips are made public, internet service
providers and websites may tell when Tor is being used. Despite the fact that websites and
ISPs cannot read your encrypted internet traffic, they may detect when Tor is being utilised.
This can speak rumours and attract unwelcome attention. So, when utilising a VPN for the
dark web, only an encrypted tunnel to a VPN server will be visible to your ISP, not that you
are connected to a Tor node.
4
3.Steps on decoding for each evidence. What tools are using?
Tools are using:
First, convert Hex to ASCII Text String using an online converter. For an example,
5
Then using the output convert to Text
a.
6
4.List of evidences
a. What command is used in the Console to generate valid credentials?
Ans: I used the command generateUserCredentials() on the login page to get the
required login details. With the username and password provided by the IF block, I
was able to gain access to the code for the login function. Then successful in gaining
access to the website using the username and password I had copied.
Username: KF7ybuD1
Password: Alyhfot0V9VIWm6W
7
c. What is the suspect's site username?
Ans: DarkChest984
8
f. What is the date of the first post related to drug trafficking?
Ans: 26/11/20XX
9
Ans: 51°56'59.2'' N 1°19'26.1''E (Dock Road, Felixstowe, IP11 3TG, United
Kingdom)
k. What is the name of the seaport where the shipment is being delivered?
Ans: Felixstowe Port is the name of the seaport utilised for the shipping.
l. What are other potential crimes that you found and what are their username?
Selling reptiles
CyreKohf66 – He trades in reptiles. He offers for slae every kind of stuffed reptile on that
page. According to the website, his articles are for sale and include items like
‘turtles’,’snakes’,’Komodo dragons’,’lizards’,etc.
10
Guns
Sealithed1997 – This user loves weapons a lot. He has a strong interest in guns. His family
has a strong obsession with guns since he was a toddler. His family’s business is gathering
weapons. In addition, he stated in his post that he would instruct everyone on how to select an
excellent weapon and gain access to firepower.
11
Selling Drugs
Youdger – The user even identifies themselves as a dealer while writing about the value of
supporting regional retailers. “thisisnotarealwebstie.oxlsda” is the link user provide, where
interested parties can sign up and do business.
12
5.Solution
Authorities in each state and locality need to be made more aware of the dark web by law
enforcement. To help investigators recognise dark web evidence and behaviour, start
providing more and better training, Special investigative units need advanced information
about darknet techniques and activities, according to law enforcement authorities. Since the
dark web is so covert, many state and local law enforcement authorities frequently aren’t
aware of it or how it can contribute to crime in their areas. (Taking on the Dark Web: Law
Enforcement Experts ID Investigative Needs, 2023)
If a user discovers an illegal website on the dark web, users can also contact local police force
to report the crime.
13
6.Conclusion
In conclusion, the Dark Web poses a cyber-security danger to every internet user. Although
while using the Dark Web to look for personal information is not advised, understanding how
it could aid in criminal activity is essential for developing a robust cyber-security system. A
preventative approach could include limiting the sharing of personal information, keeping up
with current cyberthreats like ransomware, and taking precautions after high-profile data
breaches. Also, being aware of the dangers that come with using dubious ‘gateway’ sites to
access the Dark Web can help protect you and your family from its dangers. (Some Thoughts
on the Dark Web—and How It Affects You, 2018)
14
7.Individual Reflection
Users of the dark web, including law enforcement and other public servants, ought to use it
wisely, in my opinion. Considering that data acquisition on the dark web is quick and simple.
The use of the dark web for illicit activities like the purchase and sale of drugs, human
trafficking, etc is in my opinion, discouraged. That irrational behaviour will kill several
innocent people in an indirect manner.
(1087 words)
15
8.References
1. Kaspersky. (2022, October 21). What is the Deep and Dark Web? Retrieved March
15, 2023, from www.kaspersky.com website:
https://www.kaspersky.com/resource-center/threats/deep-web
2. Elmwood Campus. (2021, June 29). Tulane School of Professional Advancement.
https://sopa.tulane.edu/blog/everything-you-should-know-about-dark-web
3. mpeluso. (2020, June 3). Five Things to Know About the Dark Web | Peraton.
Peraton.
https://www.peraton.com/news/five-things-to-know-about-the-dark-web/
4. How to Access the Dark Web Safely: Updated for 2023. (2023). Comparitech.com.
https://www.comparitech.com/blog/vpn-privacy/access-dark-web-safely-vpn/
5. Taking on the Dark Web: Law Enforcement Experts ID Investigative Needs. (2023).
National Institute of Justice.
https://nij.ojp.gov/topics/articles/taking-dark-web-law-enforcement-experts-id-
investigative-needs
6. Some Thoughts on the Dark Web—and How It Affects You. (2018). Irmi.com.
https://www.irmi.com/articles/expert-commentary/some-thoughts-on-the-dark-web-
and-how-it-affects-you
16