coding-image coding-image

< problem_statements />

Unlike previous years, this time Hac’KP aims to build a single application that can handle various requirements of the law and order organizations while working in the realm of Darknet. Our focus will be to hand pick individuals who has a will to work with us in building a robust solution based on the current requirements of our Police force in fighting crimes inside Darknet.  The final product/solution will equip the Police force to handle the following, and more!

Advanced Darknet Search Engine for LEA
Intelligent Darknet Monitoring
Dissecting Darkweb


As our focus this time is mainly result oriented, we will slightly change the very nature of this hackathon; instead of conducting this as a competition with multiple goals, this will mostly be like a community-based initiative of highly motivated personnel working with a goal to build a single application. Our selection process will aim to identify result-oriented individuals with intermediate to advanced skillset, who enjoy building innovative solutions. Our skilled mentors will provide them adequate directions and support to equip them with knowledge, resources, opportunities and conflict management  One team working for one solution!

Advanced Darknet Search Engine for LEA

  • Gather/Crawl details about all websites, chat rooms, shopping sites, and other information related to Dark Web.
  • In-depth analysis of the data collected using AI/ML to correlate and predict suspicious events.
  • Search for a specific keyword from the crawled database. Search results need to be filtered to reflect what is most relevant.
  • Language-based search using AI/ML also be supported.

  • Alerting mechanism for specific keywords that are repeatedly used in chatrooms, market place, and other Darknet sites.
  • A facility for searching a keyword in all the available Darknet Search Engines (e.g : notevil, candle, ahima, etc.) and categorize the output based on each Search Engine.

coding-image coding-image
coding-image coding-image

Intelligent Darknet Monitoring 

  • Trigger alerts on predefined tags based on the number of occurrences of the tag words.
  • A Dashboard with all the collected data alerts triggered and analysis results that would give an executive summary and in-depth analysis reports.
  • Time-line search and display status of onion sites – UP/DOWN.

  • Nodes list and graphical representation of nodes, including Geolocation.
  • Categorization of sites Eg. Drugs sites, Banking, Weapon selling, CSAM, Terrorism, etc.
  • Checks the Dark Web for compromised account credentials, stolen personal information, financial data, and other exposed databases.

Dissecting Darkweb

  • A network traffic monitor that can identify traffic from the Tor network.
  • An email address based threat scan on Dark Web (e.g : " Have I Been Pwned?" ).
  • Identify vulnerabilities available in every dark website.

  • Expose IP details of Darknet Sites and users.
  • Plotting Darknet Users on map and discover New Hacking Tools and Exploit Kits.
  • Uncover new cybercriminal tactics and tools used to automate attacks and test for weaknesses.

coding-image coding-image