Dark Web Search Engines

Author: Martin Voelk
December 16, 2015

So after many months of inactivity, we will resume blogging. Sorry for the absence, but we were just to busy with Pentests and Security work.

Today, we would like to introduce a search engine, which allows to search the dark web from the clear web.




The shocking truth of the Deep Web

Author: Martin Voelk
April 7, 2015

The Deep Web / Dark Web was originally invented to help individuals and regime critics to voice their opinion and overcome government surveillance of communication. It also helped journalists to report the truth in countries which are heavily censored. However over the years it become a playground for Cyber criminals from all over the world.

We conduct a lot of Cyber Intelligence work as part of our services to businesses where we look specifically for Intel concerning their business interests. We think we have seen it all, but even we get surprised what we sometimes find on the Dark Web.

  • Hacked online stores where criminals share the Admin credentials
  • Corrupt employees who work for retailers and sell customer details along with their credit cards
  • Auctions for access to email accounts of business owners and high ranking managers in business
  • The trade of 0day exploits (vulnerabilities and exploits) to issues unknown to the public yet
  • Training courses for Cyber Criminals

The list goes on and on.

The most shocking discoveries are, in our own opinion, corrupt and fraudulent employees selling customer data. This is very hard to tackle. The company they work for may be PCI compliant, may have the greatest perimeter defenses, may encrypt all stored data. Yet their customer data is exposed by a corrupt employee. People with legitimate access to customer or other confidential information who sell this information to Cyber Criminals on the dark web.

The industry needs a shift in mindset. All the big companies like Cisco, Juniper, Fortinet, Symantec etc. are concerned about is selling more of their hardware and software. Yes, of course IT Security / Logical Security is improved with their products, but what about the human aspect? The human is the easiest way into a company by employing social engineering techniques, but the fraudulent employee is also not stopped by Firewalls when doing screenshots of confidential information and uploading those to their USBs or putting those on dropbox. Screenshots are just JPGs and not detected as threats as such. This is what many Security Policies seem to fail to address these days.


December 17, 2014

Surely most of our readers have heard and even regularly use Wikipedia. A fantastic library at your fingertips. Sometimes you may even find some semi-legal information on Wikipedia, but all in all it’s a great library.

Probably few people have heard of something called the “Hidden Wiki”. Well, it has nothing to do with the original Wikipedia and even though it very much looks alike the real Wikipedia from a design perspective, it’s very different.

The Hidden Wiki is not accessible through the “normal” Internet. It resides on various .onion domains which are only accessible through a special proxy chain VPN network called TOR. The Hidden Wiki is a repository of the criminal underworld. You will find anything from financial fraud to hacking, copyright infringement, drugs, illegal materials and so on. A Wikipedia for criminals. Often the leaks from the celebrity hacks etc. end up somewhere on the hidden Wiki.

Now the hidden Wiki is often changing it’s URL. As of December 16th 2014 the current URL is: http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page

A word of caution. If you ever go onto the deep web (TOR), run it from a sandbox only. i.e. install a Linux or Windows distribution in VMware and only use it to surf the deep web. There are a lot of dangers on the deep web incl. malware surf-by websites and the likes.

It’s an interesting world in there. The origins of the TOR network were not malicious at all. It was created to allow journalists in restricted countries to access resources which were filtered. These days a lot of people in Germany use it, because Youtube music is not readily available to the folks over there due to some laws. We in the US enjoy the freedom of entering an artist and song into Youtube and listen to the song. People in Germany get: “Sorry due to XYZ the title is not available in your country”. If you use TOR you will use an IP address from a different Geography and likely overcome those restrictions.

Unfortunately TOR is also being used by criminals to disguise their real identity (IP) rather effectively.

As with every aspect in life, there are always good and bad to anything.


November 30, 2014