
RFC links at the bottom of this article under resources. SOCKS have had different versions SOCKS4, SOCKS4a (added domain name support) and now SOCKS5 (added authentication support). You can view this from Tor Browser > Settings > Tor > View Logs…

When Tor Browser is used, behind the scene it setup Tor.exe as a socks proxy to listen on localhost port 9150. SOCKS proxy is not the same as HTTP proxy In the case of Tor browser, Tor component (tor.exe in Windows) listens on localhost (127.0.0.1) port 9050 by default and acts as a SOCKS proxy for the Tor Browser. SOCKS runs at Layer 5 of the OSI model (the session layer) between transport and presentation layer. A SOCKS server proxies TCP connections to an IP address, and provides a means for UDP packets to be forwarded. SOCKS5 additionally provides authentication so only authorized users may access a server. Socket Secure or in short SOCKS is an Internet Protocol that exchanges network packets between a client and server through a proxy server. Tor Relay shown in two different sessions from Tor Browser What is SOCKS ? How does the Tor Relay bouncing looks like? onion domain name and are not accessible from the Open Web unless you go through Tor. Its is a modified version of Firefox with some additions specific to support Tor Network. The next important component of Tor is called Tor Browser which is used commonly to browse DarkWeb. The Tor Project is a non-profit (charity) organization that maintains and develops the Tor software. This set of volunteer relays is called the Tor network. Also prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Tor is a program you can run on your computer that helps to keep you safe on the Internet. In this article we look at how its done using the latest.

There has been several projects on how to reach DarkWeb and consume the information. Its useful to gain insight and also to extract relevant data to make predictions for the future. This makes it interesting to mine data from DarkWeb and analyse it.

Threat Intelligence is a crucial part of Cyber Security domain and most of the threat actors hang out on the DarkWeb.
