Cyber Lab demo: Demystifying the Dark Web

Overview

The below is a recorded version of our Demystifying the Dark Web session, a training presentation most recently delivered for an internal ‘Lunch and Learn’ session.

https://www.youtube.com/watch?v=rXkSQ5tA998

Follow Up

For our latest research, and for links and comments on other research, follow our Lab on Twitter.

Alternatively, get in touch if you’d like to chat to us.

Originally published at https://6point6.co.uk.

--

--

--

Leading with strategy, design and architecture, we connect cloud, data, and cyber to engineer and deliver large-scale, complex transformations.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The History of BlackGuard Stealer

Htc One M7 Fastboot Drivers

https://t.co/wjsY30YM6p https://t.co/Nz1fFi00G9

{UPDATE} Jewel Mash Hack Free Resources Generator

Running the Intel Meltdown Detection Tool

The Complete ‘Days of ICON’ Collection

{UPDATE} Snakes & Ladders Hack Free Resources Generator

What happens when you type a URL in your browser and hit ‘Enter’

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
6point6

6point6

Leading with strategy, design and architecture, we connect cloud, data, and cyber to engineer and deliver large-scale, complex transformations.

More from Medium

NarrowBand IoT (NB-IoT)

The Kernel is Calling a Zero(day) Pointer — CVE-2013–5065 — Ring Ring

Buffer overflow using Immunity Debugger

3 Machine lab — 2. ASM for Active directory