PASSWORDS
Cracking passwords
External services store user passwords in encrypted form. If such a dataset is leaked after a hack, the encryptions must first be cracked. Hackers do this publicly on cracking forums. We monitor whether your organisation's passwords are cracked and measure how much time hackers spend doing this.
Hacker Requests
Activities on marketplaces
On hacker marketplaces, time and talent come together. Some hackers specialise in social engineering by creating profiles of people. Others are experts in cracking rare hashes. We monitor activity and transactions on these marketplaces related to your organisation.
Hacker Targets
Target Lists
The ultimate thrill on the dark web is to hack another hacker, as proof of your skills. After such a hack, the hacker's data is leaked. We search this data to investigate whether accounts of your organisation are on internal target lists of the hacker.