Hacking the hackers

Does a “Shodan” exist for the Dark Web?

Mapping the Dark Web and identifying vulnerabilities in Dark Web services can be a challenging task due to the anonymous and decentralized nature of the Dark Web. It requires specialized skills, tools, and techniques, and it is typically done by experts in the field of Dark Web intelligence. Moreover, accessing the Dark Web and gathering intelligence from it can be legally and ethically complicated.

A service that scans the Internet for network info, open ports, CMS, metadata, header information, vulnerabilities is commonly referred to as a “vulnerability scanner” or “network scanner.” These types of services are used by organizations to identify vulnerabilities in their networks and systems that can be exploited by attackers. They typically use various techniques such as port scanning, banner grabbing, and vulnerability assessment to identify potential weaknesses and provide recommendations for remediation. There are several commercial and open-source vulnerability scanning tools available in the market that can be used for this purpose.

Shodan is a search engine designed to help researchers and security professionals discover and monitor internet-connected devices and systems. Unlike traditional search engines like Google, Shodan searches for devices based on their specific attributes such as IP address, operating system, open ports, and services running on those ports.

Shodan scans the Internet for devices such as servers, routers, webcams, and other internet-connected devices and systems. It then stores the information it finds in a database, which can be searched using various criteria. The information provided by Shodan can be used by security researchers to identify potential vulnerabilities in internet-connected devices and systems and to monitor for security breaches.

Shodan can also be used to search for specific devices or systems that may be vulnerable to attacks. This makes it a useful tool for both offensive and defensive security purposes. Keep in mind, though, that using Shodan for malicious purposes is illegal and unethical.

But does anyone do this on the Dark Web?

The first obvious step is access to the Dark Web. The Dark Web can only be accessed using specialized software such as Tor or I2P, which provide anonymity and encryption. A cybersecurity company would need to have the technical expertise and tools to access the Dark Web easily and in stealth mode.

Then deep web crawlers and scrapers must be unleashed on the hidden pages of the Dark Web for consistent and meaningful data gathering. If this has not been an ongoing process for years, there are simply no databases to work from. Cybersecurity companies can use specialized tools like web crawlers and scrapers to extract information from the Dark Web. These tools are designed to navigate the complex networks and hidden services of the Dark Web and collect information such as metadata, header information, and other relevant data.

Another important aspect is human expertise. Gathering information from the Dark Web requires human expertise in the field of Dark Web intelligence. Cybersecurity companies need to have experienced analysts who can navigate the complexities of the Dark Web, interpret the data collected, and identify potential threats.

Dark Mapper

Hacking the hackers

Dark Mapper by Cyber Intel Matrix, an Axalton Group company, has been developed specifically to answer the needs in this market of Dark Web network mapping.

It scans the Dark Web hidden services for network info, open ports, CMS (Content Management System) data, metadata, header information, and vulnerabilities. Unlike Shodan, this is mostly intel on Dark Web services, web servers, not connected devices, PLCs, or IoT.

This data does not exist anywhere else in the world.

It includes vulnerabilities of Dark Web pages (WordPress and other CMS) users, open ports, CMS vulnerabilities, headers, as well as general info even from the content.

Dark Mapper provides lots of actionable information, also historical – for example investigators can see that an electrical components store used to be a weapons store just two weeks ago.

The service is provided as a feed into an existing SIEM, but manual searches using queries are also possible.

The target market for Dark Mapper is Law Enforcement Agencies (LEA), SOC operators, and cybersecurity companies providing Dark-Web-related services.