Using Dark Web in Bug Bounty

Muhammad Mater
5 min readJun 25, 2023


Hi Hackers,

como estas?

In this article, I’ll talk about some findings and bugs that I’ve reported recently by using CTI and Dark web

At first, I like to say that I love cybersecurity in every detail.

Offensive & Defensive

I like to understand most security tracks, whether offensive or defensive, there are always some cross-skills that can be used for both defensive and offensive paths, like OSINT.

I learned Osint two years ago and became addicted to it

I loved to follow the threats that occurred and the breaches that occurred.

And I discovered that there is a cybersecurity path for these things called CTI OR Cyber threat intelligence

CTI refers to the knowledge and information about potential or ongoing cyber threats, including the tactics, techniques, and procedures (TTPs) used by threat actors. It involves collecting, analyzing, and disseminating actionable intelligence to organizations, enabling them to understand and mitigate risks posed by cyber threats.

CTI got me into the world of the Dark Web

The dark web is a part of the internet that is intentionally hidden and accessible only through specific software, such as Tor. It is often associated with illegal activities, including the sale of stolen data, hacking tools, drugs, counterfeit goods, and various other illicit services.

The relationship between cyber threat intelligence and the dark web lies in the fact that the dark web is a common platform for threat actors to exchange information, tools, and services related to cyber threats. It serves as a marketplace for cybercriminals, where they can buy and sell valuable data, exploit kits, zero-day vulnerabilities, Data Base, and other resources that can be used in cyber attacks.

I wanted to know how this data was stolen and keep myself up-to-date with

The new threats and attack vectors are analysed to understand how they target the victim.

I’m starting to understand that there’s some kind of malware called an info stealer

info stealer malware is a type of malicious software designed to infiltrate a victim’s system and steal sensitive information.

It can capture data through methods such as keylogging, screen capturing, clipboard monitoring, form grabbing, and memory scraping.

Info stealers are typically distributed through malicious email attachments, compromised websites, or as payloads delivered by other malware.

In Bug Bounty Many tools like Cracked Burp suite is an infostealer malware

These Data belong to bug hunters hh

Hackers have been hacked

These stolen data are sold on the dark web or dark forums AND some telegram channels

I started to learn how I collect and monitor this data From The Dark web By Making Bot get data from Telegram channels and underground hacking forums and parsing the logs to search by the domain of the target

So I decided to use these data in bug bounty Because I’m a Bug hunter.

at first, I tried this on vdp programs

So I started to target the emails of the company employees by a punch of search engines such as

get all emails for company employees

Then, I searched for any leaks for this Company or any old breach to the company,

And Get leaked data from the dark web.

Ok How?

To monitor the dark web:

Utilize dark web search engines like Grams, Torch, or Ahmia to find websites and hacking forums.

Leverage specialized dark web monitoring tools such as DarkOwl, Flashpoint, or Recorded Future to automate monitoring and analyze content.

There are paid products that offer this service
You can search the hacking forums as I did and used more than one forum to collect data from many resources like me (Telgram, Hackingfourms, Data Breaches)

Exercise caution when joining dark web forums and communities, ensuring to prioritize legal and ethical practices and avoiding engagement in illegal activities or accessing illegal content.

check if any email in leaked or not , after get data with credentials

The next step is searching for any login portal using Dorks inurl:"login"

and tools such as ,

logsensor searches about any login panels of the target.

I tried to log in with almost all login panels and portals even the mail portal panel.

Again and Again

And Finally, I hacked an employee

Another scenario that happened I reached the company’s admin panel with one of the credentials.

There are some important tips to be mentioned :

1- not all programs will accept this as a bug, some of them will consider it as an NA or informative so make sure to understand the program policy.

2- most of the triage team if they find out that the data is vailed will ask for additional information to know the source of this information and how you got it:

Can you please provide additional details such as what method of OSINT did you use to identify this finding and what OSINT tool you used? Also, can you please provide steps to reproduce? “ here you will just explain the whole process.

3- try to get the impact of the data don’t just report them.

I want to make a note:

I explained the idea to you and told you how to exploit it and get bounty from it

I did not publish names for hacking forums because this information can be misused away from bug Bounty or black hat activity


My Linkedin :

My Twitter :

Support me :



Muhammad Mater

Just a Boy Loves Infosec (REDTEAM, CTI, OSINT, Bug Bounty) And Security Analyst