Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities.
We have discussed several times about the Tor anonymizer network and the way it is exploited by criminal crews to sell any kind of illegal product and service.
Last week, an automated scanner dubbed PunkSPIDER was launched in the Tor network to uncover security issues in hidden services.
PunkSPIDER was developed by the hackers Alejandro Caceres and Amanda Towler in an effort to improve the overall security of the serviced hosted on the popular anonymizing networks.
We’re just beginning, but the potential of PunkSPIDER is remarkable. A few years ago I have developed something similar, the Artemis Project, and I strongly believe that such a project can provide amazing results.
PunkSPIDER scanned about 7,000 .onion domains in only three hours.
“You might notice that’s not a lot of sites. If there’s one thing we’ve learned from Memex it’s that the number of Hidden Services [sites that hide their server location using the Tor network]up at any time has been greatly overestimated.” Caceres told to Forbes.
The experts made available the results of the crawling activity in a Google-like search tool, such kind of results could aid security experts and law enforcement in the fight against illegal activities in the Dark Web. The discovery of a security hole in a hidden service could be exploited by hackers to compromise these websites and investigate on their operators.
The experts provided as example the case of one vulnerable site crawled by the PunkSPIDER that contained “a weird subset of child porn”.
“After looking through them there is at least one that we’d like to share with law enforcement before releasing it publicly.” Caceres told FORBES.
Let’s give a look to the findings of the scan made by the researchers, on 7,000 scanned domains nearly 2,100 were affected by more than 50 security vulnerabilities.
“Of those 2,100 sites roughly 50 had vulnerabilities, with 100 flaws uncovered in total. “This is lower than our normal dataset, I suspect because many .onion sites are just single-page websites with static HTML on them and hardly any kind of attack surface on the application side. Some sites were also just totally blank.” said Careces.