Site Metadata Transforms
Extract and search by HTTP-level metadata from hidden servers, including page titles, detected technologies, and doppelganger fingerprints for identifying cloned or related sites.
Overview
Site metadata transforms query the HTTP response data collected from hidden servers. This includes:
- Page Titles - HTML titles from all pages crawled on a site
- Technology - Server software, frameworks, and libraries detected
- Doppelganger Fingerprints - Content-based hashes that identify sites with identical or near-identical page structures
These transforms help analysts quickly understand what a site is, what it’s built with, and whether other sites share the same content.
FetchTitles
Transform Name: FetchTitles
Description
Extracts all page titles found across the crawled pages of a specified onion site.
Input Entity
hades.v2.onion- An onion site address
Output Entities
maltego.Phrase- Page titles
Use Cases
- Quickly identify what a site is about without visiting it
- Discover sub-sections or hidden pages on a site
- Identify sites that have changed purpose over time (multiple different titles)
- Find descriptive keywords for further investigation
Investigation Tips
- Sites often have different titles on different pages (e.g., homepage vs. login vs. feedback)
- Titles can reveal the site’s purpose, language, and target audience
- Comparing titles over time can show site evolution or takeover
- Generic titles (e.g., “Home”) are less useful than descriptive ones
FetchTechnology
Transform Name: FetchTechnology
Description
Extracts all detected web technologies from a specified onion site, including server software, frameworks, CMS platforms, and libraries.
Input Entity
hades.v2.onion- An onion site address
Output Entities
maltego.BuiltWithTechnology- Detected technologies
Use Cases
- Identify the technology stack used by a hidden server
- Find sites using the same framework or CMS (potential shared operator)
- Assess the technical sophistication of a site operator
- Identify vulnerable technologies for threat assessment
Investigation Tips
- Sites using the same uncommon technology stack may be related
- Outdated technologies can indicate abandoned or neglected sites
- Custom or unusual stacks can be strong fingerprinting signals
- Technology detection is based on HTTP headers, response content, and known signatures
FetchDoppelganger
Transform Name: FetchDoppelganger
Description
Extracts the doppelganger title fingerprint from a specified onion site. The doppelganger fingerprint is a SHA-256 hash of the site’s title content, used to identify sites with identical page structures.
Input Entity
hades.v2.onion- An onion site address
Output Entities
hades.v2.doppelganger- Doppelganger title fingerprint (SHA-256 hash)
What is a Doppelganger Fingerprint?
The doppelganger system generates content-based hashes from a site’s title. Sites that produce the same hash have identical title content, which can indicate:
- Cloned or copied sites
- Mirror sites operated by the same entity
- Sites built from the same template
- Scam sites impersonating legitimate services
Use Cases
- Detect cloned or copycat sites
- Identify official mirror domains
- Find sites using the same template or framework
- Track site migrations to new onion addresses
- Detect phishing/impersonation attempts
Investigation Tips
- A matching doppelganger hash is a strong indicator of related sites, but should be confirmed with other transforms
- Template-based matches (many sites with same hash) indicate shared templates rather than direct relationships
- Combine with
FetchSHVfor stronger infrastructure correlation
SearchByDoppelganger
Transform Name: SearchByDoppelganger
Description
Finds all onion sites that share the same doppelganger title fingerprint. This reveals sites with identical page content structure.
Input Entity
hades.v2.doppelganger- A doppelganger title fingerprint
Output Entities
hades.v2.onion- Onion site addresses
Use Cases
- Find all clones or mirrors of a specific site
- Identify networks of sites built from the same template
- Discover scam sites impersonating a legitimate marketplace
- Track an operator’s portfolio of identical sites
- Monitor for unauthorized copies of a site
What Shared Doppelganger Hashes Mean
Strong Indicators:
- 2-5 sites with same hash - Likely mirrors, clones, or closely related operations
- Same hash + same SHV - Very high confidence same operator or template
- Same hash + same crypto wallets - Confirmed same operator
Moderate Indicators:
- Many sites (10+) with same hash - Likely a popular template or framework default page
- Same hash but different content - Hash collision (rare) or template match
Investigation Required:
- Cross-reference with infrastructure transforms (SHV, SSH)
- Check cryptocurrency addresses for financial links
- Review communication channels for operator overlap
Investigation Workflow Examples
Site Identification and Profiling
-
Quick site assessment
- Input:
targetsite123abc.onion - Run:
FetchTitles - Result: Page titles reveal site purpose (e.g., “Automated PayPal and Credit Card Market”)
- Input:
-
Technology profiling
- Run:
FetchTechnology - Result: Technology stack (e.g., nginx, PHP, WordPress)
- Assess operator sophistication and potential vulnerabilities
- Run:
-
Clone detection
- Run:
FetchDoppelganger - Result: Doppelganger fingerprint hash
- Run:
SearchByDoppelgangeron the hash - Result: All sites with identical content structure
- Run:
Clone and Mirror Network Discovery
-
Get doppelganger fingerprint
- Input: Known marketplace or service
- Run:
FetchDoppelganger - Result: Content fingerprint hash
-
Find all matching sites
- Input: Doppelganger hash
- Run:
SearchByDoppelganger - Result: All sites with identical title content
-
Classify the matches
- Official mirrors - Same operator, same crypto wallets, same contacts
- Scam clones - Different wallets, attempting to steal funds
- Template matches - Unrelated sites using same framework
-
Verify with other transforms
- Run
FetchBitcoinAddresseson each match - Run
FetchSSHFingerprintsto check infrastructure - Run
FetchSHVfor JavaScript fingerprint comparison
- Run
Technology-Based Correlation
-
Identify unusual technology
- Run:
FetchTechnologyon target site - Note any uncommon frameworks or configurations
- Run:
-
Cross-reference
- Sites using the same uncommon technology stack may share:
- Same developer or operator
- Same hosting provider
- Same site template or builder tool
- Sites using the same uncommon technology stack may share:
-
Combine with doppelganger
- Same technology + same doppelganger = strong relationship
- Same technology + different doppelganger = possible shared developer
- Different technology + same doppelganger = unlikely (investigate further)