![]() Of course there is more and you can also combine this queries to make better results. Example: apache **port:**8080īefore/after: - Find devices before or after between a given time. Port: - Find devices based on open ports. Os: - Find devices based on operating system. Net: - Find devices based on an IP address or /x CIDR. ![]() Hostname: - Find devices matching the hostname. Geo: - Find devices by giving geographical coordinates. Example: city:“México”Ĭountry: - Find devices in a particular country. Basic Shodan QueriesĬity: - Find devices in a particular city. Thanks to Shodan we can check the information on the stage of intelligence gathering ( OSINT), leave no traces of our intelligence, without arousing the suspicion of our target. It’s like running nmap and doing active reconnaissance for the entire Internet. Google indexes pages and materials hosted on Not only web servers, but also printers and network devices, webcams, voip phones, washing machines, refrigerators, gas station pumps, whole IoT and other strange things connected to the Internet. ![]() Similar principle of operation only on different input data. It also reminds me of the Google Hacks I wrote about yesterday. I’m not sure if Shodan Hacks is a good name, but I like it. Yes, everyone knows Shodan (and who does not know, and wants to hack, should know).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |