Operation Statistics
On 01 March 2026, during active Pakistan-Afghanistan hostilities (Operation Ghazab Lil Haq), ODINT conducted a 3-hour passive reconnaissance sweep of Pakistani government and academic digital infrastructure. All data was extracted through Tor using entirely open-source methods — no exploits, no authentication bypass.
The Wartime Context
Pakistan's digital infrastructure cracked in two on 01 March 2026. Core government — the President's Office, Parliament, the Nuclear Commission (PAEC), the State Bank, the Federal Board of Revenue, national railway, NADRA's public services — went completely silent. Whether through deliberate defensive shutdown or genuine infrastructure collapse under the weight of Operation Ghazab Lil Haq, 35+ major .gov.pk domains returned no response.
What remained standing tells its own story. The institutions Pakistan did not protect — its universities, a provincial government, an open data portal, two federal admin panels — were left fully exposed, with no additional WAF deployment, no IP restriction, and in some cases running web servers seven years out of date.
Pakistan prioritized protecting its nuclear and financial infrastructure. It forgot its universities, its poorest province, and its open data platform entirely.
Infrastructure Collapse: What Went Down
Of 57+ Pakistani domains scanned during active hostilities, 65% were completely unreachable, 17% were behind WAFs blocking Tor, and only 21% remained accessible and functional.
Completely Unreachable (>35 domains)
| Domain | Organization | Status |
|---|---|---|
| pakistan.gov.pk | Federal Government Portal | DOWN |
| pmo.gov.pk | Prime Minister's Office | DOWN |
| senate.gov.pk / na.gov.pk | Parliament (both chambers) | DOWN |
| paec.gov.pk | Pakistan Atomic Energy Commission | DOWN |
| nescom.gov.pk | Nuclear & Missile Development | DOWN |
| sbp.org.pk | State Bank of Pakistan | DOWN |
| fbr.gov.pk / iris.fbr.gov.pk | Federal Board of Revenue / IRIS 2.0 | DOWN |
| mail.ntc.net.pk | Federal Government Email (Zimbra) | DOWN |
| punjab.gov.pk / sindh.gov.pk | Punjab & Sindh Provinces | DOWN |
| nadra.gov.pk (e-services) | National Identity Database (public) | DOWN |
Behind WAF — Tor Blocked (10 domains)
| Domain | WAF | Status |
|---|---|---|
| ispr.gov.pk | Cloudflare | 403 BLOCKED |
| paknavy.gov.pk | Cloudflare | 403 BLOCKED |
| nust.edu.pk | Cloudflare | 403 BLOCKED |
| comsats.edu.pk | Cloudflare | 403 BLOCKED |
| gcu.edu.pk | Sucuri/Cloudproxy | 403 BLOCKED |
Full wartime infrastructure status with all 57+ domains: Wartime Infrastructure Status
Live Targets: What Stayed Open
Twelve domains remained accessible and were subjected to deep enumeration. The institutions left exposed reveal a pattern of neglect that no wartime defensive posture corrected.
WordPress REST API: Three Government Installations Fully Exposed
Three Pakistani organizations expose their complete WordPress REST API without authentication: Quaid-i-Azam University, the Government of Balochistan, and Balochistan's Science & IT Department. Combined extraction: 13.4 MB of structured government and academic data.
admin_bal) manages both balochistan.gov.pk and sit.balochistan.gov.pk — confirmed by an identical gravatar hash across both installations. Compromising one email account falls both sites. wp-login.php is directly accessible on the SIT domain.
Personnel Intelligence: 340+ Named Individuals
Across all targets, 340+ individuals were identified with varying degrees of personal contact information. All data was extracted from publicly accessible sources without authentication.
Balochistan Divisional Commissioners
Eight senior provincial administrators were identified by name and division from WordPress page content — including the commissioner for Makran Division (Dawood Khan Khilji), which borders Iran and hosts Gwadar Port, the centerpiece of CPEC.
QAU Staff Directories — Sample
The following is a partial sample of data extracted from publicly accessible QAU staff pages. Direct phone extensions, institutional and personal email addresses, and organizational positions were recovered for 65+ individuals.
Open Data Portal: 1,471 Government Datasets
Pakistan's Open Data Portal (opendata.com.pk) runs CKAN 2.8.3 on a server dating from October 2017. Despite declaring /api/ off-limits in robots.txt, the entire API is freely accessible without authentication.
Exposed Federal Admin Panels
Two federal government websites expose administrative login panels directly to the internet with no WAF, no IP restriction, and no CAPTCHA — during an active military conflict.
/trace.axd returns a 403 (not a 404), confirming ASP.NET request tracing is enabled on the server. HQ-level operations management accessible without restriction.
Server Configuration Disclosure: LUMS phpinfo.php
Lahore University of Management Sciences exposes a phpinfo.php page (96 KB) revealing the complete server stack: hostname, kernel, OS version, PHP extensions, database config, and file system paths — a complete fingerprint for targeted exploitation.
lumswebsite-websrv1, kernel 5.4.17-2136.350.3.2.el8uek.x86_64 (Oracle UEK), RHEL 8.10, Apache 2.4.66, PHP 8.1.34. PHP SSH2 and LDAP extensions confirm the server connects to other LUMS infrastructure — potential pivot paths.
Balochistan: Province in the Crosshairs
Balochistan is Pakistan's largest province by area (44% of Pakistan's territory), its strategic corridor for CPEC, and the host of Gwadar Port — China's Indian Ocean access point. During the Pakistan-Afghanistan war, it became a critical frontline zone. It was also the only remaining live provincial government.
The provincial WordPress API exposed divisional commissioner appointments across all 8 Balochistan divisions, complete budget documents from 2020 to 2026, legislation from 14+ departments, and the staffing list for Gwadar's surveillance infrastructure. The dual-TLD situation (.gov.pk and .gob.pk) creates additional impersonation risk.
Government Digital Infrastructure
Pakistan's government digital infrastructure is centralized around a small number of critical systems. During wartime, all were either offline or locked down. The following represents the post-war targeting landscape.
NADRA — National Identity Under Wartime Lockdown
NADRA's Nishan API platform — which powers Verisys (demographic verification), Biosys (biometric fingerprint), Multi-biometric (fingerprint + facial), and Proof-of-Life services for 220+ million Pakistani citizens — went completely dark. All six public-facing NADRA endpoints returned errors ranging from 403 to 500.
NADRA's CNIC number format encodes province, district, tehsil, union council, family lineage, and gender in 13 digits. A compromised CNIC dataset does not just expose an ID number — it maps a person's entire administrative geography.
Historical Breach Timeline
Pakistan's current exposure sits on top of a documented history of serious incidents.
| Date | Incident | Impact |
|---|---|---|
| 2019–2023 | NADRA insider data theft by employees | 2.7M citizen records sold (Argentina, Romania) |
| 2024 | NADRA breach public disclosure | Fraudulent IDs issued to Afghan nationals |
| 2025 | Global credential breach | 180M Pakistani internet user credentials |
| 2025 | SIM data leak | Federal ministers' call records exposed |
| 2025 | Afghan Cyber Army campaign | 100 high-profile .gov.pk sites defaced |
Data Inventory
| Category | Size | Key Contents |
|---|---|---|
| qau-full-dump/ | 6.6 MB | 200 pages, 484 posts, 603 media, staff directories |
| pu-full-dump/ | 8.3 MB | 101 files, 18,460 URLs, 19 departments |
| ckan-dump/ | 8.9 MB | 1,471 datasets, 36 users, 22 organizations |
| balochistan-wp-dump/ | 5.9 MB | 149 gov pages, 1,297 media, commissioners, budgets |
| pak-wp-dumps/ | 6.3 MB | SIT WP, LUMS phpinfo, admin pages |
| pak-universities/ | 2.5 MB | 7 university probes (LUMS, AIOU, UOS, others) |
| pak-deep-probe/ | 957 KB | Initial target reconnaissance |
| pak-priority/ | 216 KB | NADRA, NTC, NITB, FBR probes |
| pak-admin-panels/ | 32 KB | FSP, EP admin login analysis |
| TOTAL | 46 MB | 9 target categories |
Detailed Technical Annexes
Nine specialized reports cover each area of the operation in full technical depth.
Methodology & Scope
All data documented in this report was obtained through passive open-source intelligence techniques using publicly accessible interfaces. No authentication was bypassed, no vulnerability was exploited, and no unauthorized access was performed. All data was available without credentials at the time of collection.
Reconnaissance was conducted via proxychains4/Tor from anonymized infrastructure (CT105, 10.0.0.99). The operation window was 07:27–09:45 UTC on 01 March 2026.
ODINT publishes this research to support transparency, journalistic accountability, and informed public discourse on government digital security posture. Disclosure of this material is consistent with ODINT's Ethics Policy and Methodology.