Dark Network Guide!

Profile image for ajatshatru
September 22, 2017 | Views: 7860

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

TOR Browser / Tails OS

  1. Setup Virtual Machine, install Linux OS (fully updated and patched)
  2. Configure VPN software for hiding your location on your host OS (disable geolocation, clear all log, change your OS default language to some other country)
  3. Configure proxy switcher for your tor browser on VM (Linux)
  4. Start your TOR browser (Y)
  5. Follow all TOR instruction for anonymity
  6. Use only cryptocurrency (Monero / Dash / Bitcoin) money using ring signature / darksend / mixer (make sure your service provider are not maintaining any log) for many available things or services you want to buy on deep web

PS: Make sure your VPN and Proxy Switcher service provider is not maintaining any logs. Do not even buy this software from your credit or debit card or online bank transaction 😉 Also make sure that while buying this software you hide your real identity. Do not leave any kind of log so that no one can trace it back to you. Do not install any kind of extension/add-on/flash or anything on your TOR browser, do not download anything from the TOR browser until it’s necessary. If you download it, do not open it while you have an active network connection. Also, avoid using torrent or any other services running in the background on your host OS, and put tape on your camera/microphone 🙂

Now you’re ready for some crazy s**t!

For more info watch the “Silk Road” Documentary 🙂

For setting up Deep Web server / secure hosting in Cyber Bunker (with *.onion Domain ) or any other things, you can ask me for help 🙂 [ONLY FOR EDUCATIONAL PURPOSES]

I’m NOT RESPONSIBLE FOR ANY KIND OF UNETHICAL ACTS performed by others.

Share and Earn Cybytes
FacebookTwitterGoogle+LinkedInEmail
Save
+1
16
11
Use Cybytes and
Tip the Author!
Join
Share and Earn
Cybytes
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
Be the Best at Whatever You Do.
We Have the Tools to Get You There.
Visit the NEW Marketplace of Over 500 Skill Enhancement Tools.
11 Comments
  1. you are right and The browser does not completely anonymous people from us?

  2. So is this how you become the most anonymous while hacking?

    • yes sure, but using VPN + Proxy Switcher + TOR will slow down your Internet Speed because it’s protecting you on three different level.

      Use tails OS over TOR Brower, also you need to be very careful about do’s and don’t guideline related to TOR Network

  3. it’s a basic guide very helpful

  4. Can you please share the article ajatshatru

  5. how can i get this guide?(Dark Network Guide)

    • This is not a book, its simple article about “How to use darknet in a secure way”.

      • I thought Tor was not secure correct me if I’m wrong

        • Tor is actually highly secure with one major fault… who ever controls your exit node controls you. That is how the NSA, I believe, shook the dark web.

        • Only using TOR is not secure also it’s not an encrypted channel, so any Govt. or ISP will easily identify you if you are using TOR services. For encryption, you can use VPN, it’ll also help you to hide your geolocation over the Internet.

          if you are very careful about every do’s and don’t then nobody can track you back.

          • I thought you only needed the vpn and your good to go? BTW like the classes your taking because doing the same ones too.

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

DUHK: The Technique That Got the VPN Compromised
Views: 703 / December 10, 2017
What is Docker? [Series]
Views: 1604 / December 9, 2017
Wanna-Cry Ransomware
Views: 1569 / December 9, 2017
The Abyssal Depth of the Deep Web
Views: 1653 / December 8, 2017
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel