Home
International Journal of Science and Research Archive
International, Peer reviewed, Open access Journal ISSN Approved Journal No. 2582-8185

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • IJSRA CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN Approved Journal || eISSN: 2582-8185 || CODEN: IJSRO2 || Impact Factor 8.2 || Google Scholar and CrossRef Indexed

Peer Reviewed and Referred Journal || Free Certificate of Publication

Research and review articles are invited for publication in March 2026 (Volume 18, Issue 3) Submit manuscript

Darknet and Zero-Day Exploit Analysis

Breadcrumb

  • Home
  • Darknet and Zero-Day Exploit Analysis

Bogdan Barchuk *

Independent researcher.

Research Article

International Journal of Science and Research Archive, 2023, 08(02), 799-811.
Article DOI: 10.30574/ijsra.2023.8.2.0222
DOI url: https://doi.org/10.30574/ijsra.2023.8.2.0222

Received on 08 February 2023; revised on 25 April 2023; accepted on 28 April 2023

On the darknet, people can buy and sell illegal digital goods such as zero-day exploits, which are not yet made public. Cybercriminals value these vulnerabilities since they allow for weaknesses in security systems that pass unnoticed. In this underground community, traders, auctioneers, or leaksters can move exploits that are later used in large-scale cyber-attacks. With the help of botnets and automated tools, it is now easy for attackers to scan and hack many vulnerable systems in just a few minutes. Due to the large number of users who use them and don’t update them properly, WordPress, Joomla, and Drupal are often attacked. Many times, individuals or groups that aim to harm or damage companies use these zero-day tools because the effect is strong and immediate. Because there is less distinction now between hobbyists and criminal groups, the darknet is having a bigger impact on current cybersecurity. In this paper, we discuss the way the darknet works, how zero-day exploits develop throughout their lifespan, and the increasing risk posed by tools that automate attack methods.

Darknet marketplaces; Zero-day exploits; Automated bots; CMS vulnerabilities; Mass \\defacements; Vulnerability chaining

https://ijsra.net/sites/default/files/fulltext_pdf/IJSRA-2023-0222.pdf

Preview Article PDF

Bogdan Barchuk. Darknet and Zero-Day Exploit Analysis. International Journal of Science and Research Archive, 2023, 08(02), 799-811. Article DOI: https://doi.org/10.30574/ijsra.2023.8.2.0222

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

          

   

Copyright © 2026 International Journal of Science and Research Archive - All rights reserved

Developed & Designed by VS Infosolution