Dark Web Visit

I, myself, have zero interest in going out on the Dark Web, or even the Deep Web for that matter. I just can't reckon anything out there that I might want to see or acquire.

Play in the sewer - you're going to get dirty, that's my take.
It's a resource for threat intelligence and discovering if your data has been leaked in a breach. If that's not your thing, it's all good. Plenty of different roles and responsibilities in cybersecurity and IT.

On steering students' learning

1. The exam objectives clearly state the topics of the exam and the percentage of questions from each domain
2. Most CompTIA exams are variable length. You could get 85 questions, or 80, or 77, or 72.
3. The questions are randomly selected from the exam bank. No two exams will have the same topics in the same order.
4. Some topics may be covered on one person's exam and completely ignored on another person's exam.

I tell them to read the exam objectives. The topics I had on my exam are completely irrelevant to the topics you get on your exam. Not that I can remember what topics I had on my exam, which I probably passed last year or earlier.
  • Like
Reactions: Jill West

Dark Web Visit

I, myself, have zero interest in going out on the Dark Web, or even the Deep Web for that matter. I just can't reckon anything out there that I might want to see or acquire.

Play in the sewer - you're going to get dirty, that's my take.
I don't want to get dirty! I'm an adventurer - a modern day Sinbad the sailor! So, being one, with a child-like mind (i.e. having an insatiable curiosity), I've got to make the journey. If I don't return, you can at least feel comforted in knowing that you made a safer, alternative suggestion - sewer play :)
A few notes here. Accessing normal, safe sites, such as google and Amazon, on the dark web is super annoying. They are constantly asking if you are humal and if you have to log in, it is not anonymous. That should be a no brainer.

First, I would advise against going there, but if you do, do not use your daily driver machine on the dark web. Do your best to be anonymous; do not think a VPN and TOR are enough.

You should review this video - Login to view embedded media
Network Chuck also has a good video - Login to view embedded media - I do not think that running tails will be good enough. Never resize your browser or log into anything.

If you play there too much and not safely, you may get the attention of both hackers and government officials.

I am not an expert on the dark web. With my limited understanding... To get into any decent hacking sites, you need to provide something unethical and frequently not legal, so all of us good people do not get access.

Google Search "site=.onion" can get you started, but I wonder how many of those sites are government to catch people. Going to Defcon and getting them firsthand is more betta, but honestly, just stay off of it.
I'm going, so that's not an option! I'm just going for a visit, not to stay. Many thanks for the suggestions, warnings, and great videos!!
  • Like
Reactions: precious

Dark Web Visit

I work in the dark web as a certified investigator.
Its not a place that you really want to go to. just to pay a visit.

You might want to make sure you are on an empty stomach
Thank you Siegfried for the advanced warning! I'll go on a mini fast before I make the trip!!
By the way Siegried, how do you go about becoming a certified investigator to work in the dark web?

On steering students' learning

He mentions an old exam. If that old version is still live go study those objectives, period. If the old exam is not live study the new objectives, period, End of story.
That's not what person A was asking.

Person A is asking "based on exams you have taken before, which topics take priority?". They are basically asking me to point out the specific topics which I know appear a lot on the exam. Which I feel is off-limits.

CompTIA-published study guides and materials have exam tips and sample questions.
Person B is of the opinion that I, as a teacher, am allowed to say "I have seen topics A, B and C appear a lot on the exam". And I feel that's not correct.

Pending Email Change Request

Hi @Emmanuel Phakula Mandala thanks for reaching out. I will get your account updated and drop you an email with the update and new credentials. I will have to reset the password when I make the change.
@Stephen Schneiter I am also having issues with my email. I can not log in to my page through web browser but only apps. Please help.

Dark Web Visit

Tha
The Deep Web, the portion of the internet that isn't indexed by conventional search engines, includes the Dark Web. The Dark Web necessitates specialized software, the most popular of which is Tor (The Onion Router), in contrast to the Surface Web, which is what most people visit on a regular basis.

Here's a quick rundown of how one can access it:

Download Tor Browser: One of the most common ways to access the Dark Web is with the Tor browser. A modified version of Firefox, this program allows for anonymous web surfing by routing traffic through different servers. You can get it by visiting: https://www.torproject.org/. After downloading, install it like any other software. When you open it, it will automatically connect to the Tor network.

Locating Websites: Dark Web addresses, which finish in ".onion,"(for example y8b37g5rt3dq3xgt.onion) are typically lengthy strings of random characters and digits, in contrast to standard web addresses (such as "example.com"). Dark web search engines are challenging to navigate and often highly unreliable. This is partly because sellers of stolen data or illegal drugs frequently move to evade detection, causing their sites to appear and then vanish without warning. Since these aren't indexed as you might anticipate, individuals look for .onion links on specialized forums or directories like "The Hidden Wiki."

Here are links to explore more specialized forums or directories:
Privacy Savvy: Best Dark Web Sites
Wizcase: Safely Find the Best Dark Web Sites

Else search "Dark web sites unseen Onion and TOR links"

Look for verified .onion links in specialized forums or directories, paste them into the Tor Browser, and proceed with caution, avoiding dubious websites and according to safe browsing procedures.

Mechanics:​

1. Onion Routing: The browser encrypts data in layers (like an onion) when a user visits the Dark Web using Tor. Since every layer is decrypted at a distinct server (or "node") inside the Tor network, it is challenging to monitor because no single node is aware of the data's origin and destination.

2. Node Hopping: Tor uses three nodes to route traffic: an exit node, a relay node, and a guard node. merely the exit node is aware of the end destination (such as the onion website), whereas every other node merely knows the addresses of the nodes that come before and after it. It is quite difficult for anyone to track down the connection's origin because of this convoluted path.

3. Hidden Services: The Tor network additionally anonymizes websites on the Dark Web, which are referred to as hidden services. Random alphanumeric addresses are used by onion sites instead of IP addresses, and they are also encrypted utilizing many layers. This further protects user and site privacy by making the website itself "hidden" in the Tor network and only accessible via Tor.

4. Directory Authorities: To assist maintain the list of accessible Tor nodes, the Tor network has trustworthy servers known as directory authorities. By disseminating instructions on how to join the Tor network, these nodes enable users to swiftly identify open routes without jeopardizing their anonymity.

To guarantee anonymity and privacy on the Dark Web, the mechanisms rely on hidden service technology, multi-layered encryption, and routing through numerous nodes.
Thanks for sharing this important information
  • Love
Reactions: precious

On steering students' learning

I've been avoiding an online bickering with someone on Reddit. Thought I'd put it to my co-teachers instead.

The gist of it:
  • Person A asks "I have read the exam objectives, but what takes priority based off of the older exam?"
  • I respond that we cannot divulge such information due to our NDAs; we cannot say what the exam focuses on or covers.
  • Person A responds that they're not looking for dumps or cheat sheets, just for guidance on which topics to focus study on.
  • I counter again that this is still contrary to our NDAs: everything on the objectives is fair game and the objectives provide weighting per objective.
  • Person B chastises me, saying "Instructors and fellow learners can absolutely make suggestions on topics that should be focused on, like Linux file permissions".
That's where I cut out and decide not to continue.

Me personally I hard disagree with B, because that would still be using my inside knowledge to steer someone's learning. I know exactly which topics were focused on in the exams I took, but I'm not going to tell because that laser focuses the students the "the right" parts of the exam. Sure the exam objectives are supposed to be evenly used, but from experience I know certain topics will get priority.

So what's your take on this?
I would look for guidance in other areas. Example:

CompTIA-published study guides and materials have exam tips and sample questions. I would advise you to have a copy or two of those around that you can use to point learners in the right direction.

My office is packed up, or I would look at my book, but I half expect to see a tip that says what Person B said. We do need to be careful and follow the rules. There is some room there as you can point them to material that will help them, which is sanctioned. Exam dumps are a no-go, but https://www.amazon.com/CompTIA-Complete-Study-Guide-220-1101/dp/1119862914 and https://www.amazon.com/CompTIA-Complete-Practice-Tests-220-1001/dp/1119516978 are fine.

Dark Web Visit

A few notes here. Accessing normal, safe sites, such as google and Amazon, on the dark web is super annoying. They are constantly asking if you are humal and if you have to log in, it is not anonymous. That should be a no brainer.

First, I would advise against going there, but if you do, do not use your daily driver machine on the dark web. Do your best to be anonymous; do not think a VPN and TOR are enough.

You should review this video - Login to view embedded media
Network Chuck also has a good video - Login to view embedded media - I do not think that running tails will be good enough. Never resize your browser or log into anything.

If you play there too much and not safely, you may get the attention of both hackers and government officials.

I am not an expert on the dark web. With my limited understanding... To get into any decent hacking sites, you need to provide something unethical and frequently not legal, so all of us good people do not get access.

Google Search "site=.onion" can get you started, but I wonder how many of those sites are government to catch people. Going to Defcon and getting them firsthand is more betta, but honestly, just stay off of it.

CompTIA Restructure

The way I see it, we don't really *know* what's going to happen - a lot of conjecture arguments out there based on anecdotal information, steeped in a light coating of cynicism. We've all invested a lot of time and energy into this market so it's quite easy to feel a sense of fear and trepidation.

For me, I'm in a 'wait and see' mode. Maybe it will be good, maybe a disaster. Let's see what happens.

To paraphrase Lord of the Rings:

Aragorn: Frodo's fate is no longer in our hands.
Gimli : Then it has all been in vain. The fellowship has failed.
Aragorn : Not if we hold true to each other...

In my uncharacteristic attempt at being positive about things, I believe that CompTIA, for all it does and is doing, is built on the people, the professionals in the industry that do the hard work of training each other and students. I want to believe that CompTIA will make this a good move for the training sector, so I'm going to believe that until I see something definitive.

But that's another 2 cents (that I don't have - so put it on @Trevor Chandler 's tab)

/r

Dark Web Visit

Hello CINners,

Have you been to the Dark Web? How did you get there?
I'd like to pay it a visit.. What's are the logistics? What is
the process? What are the mechanics? What's the address?

I'm looking for responses from those who have ACTUALLY
been. Please don't provide me a response that you retrieved
from your favorite search engine!!!!

Thank you
I work in the dark web as a certified investigator.
Its not a place that you really want to go to. just to pay a visit.

You might want to make sure you are on an empty stomach

H.I.G. Capital and Thoma Bravo to Acquire CompTIA Brand and Products

All of this reminds me just how lucky I am, having reached a point where I'm retired (from a monetary perspective), and my current involvement is in the form of serving as a "volunteer" instructor in situations where I see value in my participation. As to content authoring, given the limited shelf life of technology-related books because of rapid technology changes, I abandoned those efforts before the turn of the century because of the low compensation for the workload.

H.I.G. Capital and Thoma Bravo to Acquire CompTIA Brand and Products

In Africa, we are watching this CompTIA operation with concern. If this operation leads to a search for money, it means that the costs of content and certifications will increase. Our learners in Africa often have difficulty accessing official content, which pushes them to violate copyrights by accessing CompTIA content illegally. This parallel market impacts us instructors who want to remain legal. So I hope that this operation will not further degrade the recognition of CompTIA content and certifications.

Dark Web Visit

The Deep Web, the portion of the internet that isn't indexed by conventional search engines, includes the Dark Web. The Dark Web necessitates specialized software, the most popular of which is Tor (The Onion Router), in contrast to the Surface Web, which is what most people visit on a regular basis.

Here's a quick rundown of how one can access it:

Download Tor Browser: One of the most common ways to access the Dark Web is with the Tor browser. A modified version of Firefox, this program allows for anonymous web surfing by routing traffic through different servers. You can get it by visiting: https://www.torproject.org/. After downloading, install it like any other software. When you open it, it will automatically connect to the Tor network.

Locating Websites: Dark Web addresses, which finish in ".onion,"(for example y8b37g5rt3dq3xgt.onion) are typically lengthy strings of random characters and digits, in contrast to standard web addresses (such as "example.com"). Dark web search engines are challenging to navigate and often highly unreliable. This is partly because sellers of stolen data or illegal drugs frequently move to evade detection, causing their sites to appear and then vanish without warning. Since these aren't indexed as you might anticipate, individuals look for .onion links on specialized forums or directories like "The Hidden Wiki."

Here are links to explore more specialized forums or directories:
Privacy Savvy: Best Dark Web Sites
Wizcase: Safely Find the Best Dark Web Sites

Else search "Dark web sites unseen Onion and TOR links"

Look for verified .onion links in specialized forums or directories, paste them into the Tor Browser, and proceed with caution, avoiding dubious websites and according to safe browsing procedures.

Mechanics:​

1. Onion Routing: The browser encrypts data in layers (like an onion) when a user visits the Dark Web using Tor. Since every layer is decrypted at a distinct server (or "node") inside the Tor network, it is challenging to monitor because no single node is aware of the data's origin and destination.

2. Node Hopping: Tor uses three nodes to route traffic: an exit node, a relay node, and a guard node. merely the exit node is aware of the end destination (such as the onion website), whereas every other node merely knows the addresses of the nodes that come before and after it. It is quite difficult for anyone to track down the connection's origin because of this convoluted path.

3. Hidden Services: The Tor network additionally anonymizes websites on the Dark Web, which are referred to as hidden services. Random alphanumeric addresses are used by onion sites instead of IP addresses, and they are also encrypted utilizing many layers. This further protects user and site privacy by making the website itself "hidden" in the Tor network and only accessible via Tor.

4. Directory Authorities: To assist maintain the list of accessible Tor nodes, the Tor network has trustworthy servers known as directory authorities. By disseminating instructions on how to join the Tor network, these nodes enable users to swiftly identify open routes without jeopardizing their anonymity.

To guarantee anonymity and privacy on the Dark Web, the mechanisms rely on hidden service technology, multi-layered encryption, and routing through numerous nodes.

Cyber Threats

I started this Monday ritual a couple of years ago. If there is a Monday holiday, it shifts to Tuesday morning.

The first thing I do is check for any updates to the software I use on my business systems. That's Windows 10 and 11 Pro AND a list of applications that I rely on. I also check my cloud accounts at AWS, Google, and Azure (in that order). The next thing I do is look at the NVD dashboard at https://nvd.nist.gov/general/nvd-dashboard.

Some students have asked why I look at the NVD early in the week since the site reports the number of CVEs filed weekly. I'm focused on 'This Month,' 'Last Month,' and 'This Year' data. I view the daily or weekly data as insignificant because it fluctuates wildly. I also look at the 'Last 20 scored..' data to see if any of the software or solutions I use have recently posted or updated CVEs.

My next stop is the KEV Catalog https://www.cisa.gov/known-exploited-vulnerabilities-catalog . The Known Exploited Vulnerabilities Catalog is an intel data source that didn't make the Security+ SY0-701 objective cut (much to my disappointment). The KEV Catalog is an extremely valuable tool to identify what vulnerabilities threat actors are using now.

I maintain a list of software I use in a spreadsheet (with the Support URL and end date if the software is licensed) and keep telling myself that I should spend the time to automate this process. I haven't gotten around to that yet.

So, my long answer to Professor Chandler's question about the top cyber threats is 'the ones that can hurt me.'
Mr. Brian Ford, your response fits in the category of "Out-of-the-box" thinking!!! Very orginal, and most insightful!
I'll bet there weren't many in the CIN community saw that coming!

You provided me with so much more, with the mentioning of NVD dashboard, and the KEV Catalog. The next time there is a security-based TTT, I'm going to ask, those in attendance, if they are aware of these two resources. Even as an optimist, I'm speculating that less than 5% will respond in the affirmative.

Since the KEV Catalog didn't make its way into the Sec+ exam objectives, I have to believe that you weren't a part of the SME group that participated in the exam development! Maybe it will show up on the CASTP+ objectives one day.

Thank you for your "long" answer. It certainly provided me with much more than I could have ever expected!!!!

Dark Web Visit

Hello CINners,

Have you been to the Dark Web? How did you get there?
I'd like to pay it a visit.. What's are the logistics? What is
the process? What are the mechanics? What's the address?

I'm looking for responses from those who have ACTUALLY
been. Please don't provide me a response that you retrieved
from your favorite search engine!!!!

Thank you

H.I.G. Capital and Thoma Bravo to Acquire CompTIA Brand and Products

I guess that's fitting then. I've never regarded CompTIA study guides as products I'd recommend to self-studying students, over study guides from those aforementioned bodies.

Speaking of AI, AI, AI and more AI...

Weren't we supposed to get all kinds of announcements and new products around July?

https://cin.comptia.org/threads/ai-essentials-and-ai-expansions.1928/
My prediction is that everything that's not ready to go live will be canceled. I took the CloudNetX beta August 9. That might be the last new certification after SecurityX goes live.

H.I.G. Capital and Thoma Bravo to Acquire CompTIA Brand and Products

Disclaimer: I'm an author of several books related to certification. And I can confidently say that the publishers I've written for have never regarded CertMaster and CompTIA training materials as competing products.
I guess that's fitting then. I've never regarded CompTIA study guides as products I'd recommend to self-studying students, over study guides from those aforementioned bodies.

Speaking of AI, AI, AI and more AI...

Weren't we supposed to get all kinds of announcements and new products around July?

https://cin.comptia.org/threads/ai-essentials-and-ai-expansions.1928/
https://cin.comptia.org/threads/comptia-ai-add-ons.1886/

H.I.G. Capital and Thoma Bravo to Acquire CompTIA Brand and Products

After reading this thread, are we going to have a TTT for Acquisition+ at any time in the future?
I think I need to attend it to understand everything...
a Sneak Peak for 2 hours would help. A Short TTT seems not possible, since the Content is not covered in previous TTT. ;)

Filter