SlideShare a Scribd company logo
1 of 24
The Potential of the
Hacker’s Search Engine
@TheHairyJ • Jamie • 4th Yr Cyber Security at Edinburgh Napier
What is Shodan?
● Search engine for Internet-
connected devices
● Can be filtered to find specific
devices
● Available on Shodan.io
Matherly, J. (2016). Complete Guide to Shodan. leanpub, p.3.
Matherly, J. (2014). Inside The World's Most Dangerous
Search Engine.
Overview
● Using distributed, randomized,
web crawlers that run 24/7
● Utilizes stateless scanning to
increase speed of scanning
● A form of passive recon!
● Making it a great OSINT tool
Randomizing
1. Generate a random IPv4
address
2. Generate a random port to test
from the list of ports Shodan
understands
3. Check this address on the
given port and if successful
grab the banner
4. Goto 1
Matherly, J. (2016). Complete Guide to Shodan. leanpub
Stateless
Scanning*
● No waiting for handshake
SYN
● x equals hash of the recipient IP
SYN-ACK
● once receiving x + 1
● recipient does x – 1 to reveal IP
SYN Cookies/Zmap/Massscan
*Simplified
● There is a delay!
● In 2014, reported multi day lag
● Timestamps can alleviate this
Latency
DISCLAIMER
The following slides showcase the extent of the unsecure internet. Slides will feature
pictures of devices. These pictures have been obtained passively by the presenter or
from other researchers’ work. No access to the devices featured has took place by
the presenter.
The presenter would like to make it abundantly clear that he is not responsible for you
being arrested, if you go actively pursuing access to devices like those featured. See
Computer Misuse Act 1990 Section 1.
The presenter would also like to make it clear, that taking publishing pictures of the
following ‘orange’ slides are at the photographers own risk.
How can Shodan
be used?
● “Search the Internet of Things,
perform market research and
check the external security of
your business.”
Shodan (@shodanhq) | Twitter
#ShodanSafari
“Universities are the most insecure organizations out there”
35,792
27,607
9,574
2,352
1,154
734
252
Massachusetts Institute of Technology
University of Texas
University of Oxford
University of Edinburgh
Strathclyde University
University of Glasgow
Edinburgh Napier University
Educational Institutions Results on
Shodan
Matherly, J. (2014). Inside The World's Most Dangerous Search Engine.
@EdinburghShodan
● Daily tweets of the total count
of devices Shodan can find in
Edinburgh .
● Also got one for Glasgow too!
0
10000
20000
30000
40000
50000
60000
70000
80000
@EdinburghShodan’s Daily Results
Trend Micro’s Cities Analysis via Shodan
Trend Micro - Cities Exposed in Shodan
@Viss + @achillean + Con Talks + #ShodanSafari
images.shodan.io
@Viss + News Sites
@Viss
https://www.shodan.io/about/products
You Should Follow
@shodanhq
@achillean
@viss
@EdinburghShodan
@GlasgowShodan
#ShodanSafari
● Honeypot Analysis
● ICS/SCADA
● Country/City Analysis
● ‘Real-time’ analysis of incidents
● Automated Vulnerability Identification*
Current Academic
Research
To Conclude…
● Discussed what Shodan is
● How it works
● What it can be used for
● What it can find
● Where it is currently growing
Any Questions?
Shout-outs:
2600Edinburgh – @Edinburgh2600
Edinburgh DEFCON - @DC44131
Rich MacFarlane - @rjmacfarlane
Napier Security Society - @_enusec_

More Related Content

Similar to The Potential of the Hacker's Search Engine

Toward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - PublicToward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - Public
Charles Lim
 

Similar to The Potential of the Hacker's Search Engine (20)

OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
101+ Cybersecurity Tools List And Beyond by westwp.com.pdf
101+ Cybersecurity Tools List And Beyond by westwp.com.pdf101+ Cybersecurity Tools List And Beyond by westwp.com.pdf
101+ Cybersecurity Tools List And Beyond by westwp.com.pdf
 
Development of Android/ IOS Based Application to Access Aadhar Database For U...
Development of Android/ IOS Based Application to Access Aadhar Database For U...Development of Android/ IOS Based Application to Access Aadhar Database For U...
Development of Android/ IOS Based Application to Access Aadhar Database For U...
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
 
The art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineeringThe art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineering
 
Toward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - PublicToward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - Public
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet version
 
The Experiences of a Cyber Attack Victim
The Experiences of a Cyber Attack VictimThe Experiences of a Cyber Attack Victim
The Experiences of a Cyber Attack Victim
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
Build your mobile app from a to z presentation
Build your mobile app from a to z presentationBuild your mobile app from a to z presentation
Build your mobile app from a to z presentation
 
The indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internetThe indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internet
 
Introduction to privacy feedback research @ DesRes2016
Introduction to privacy feedback research @ DesRes2016Introduction to privacy feedback research @ DesRes2016
Introduction to privacy feedback research @ DesRes2016
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
 
Artificial Intelligence for Goods: Cases and Tools
Artificial Intelligence for Goods: Cases and ToolsArtificial Intelligence for Goods: Cases and Tools
Artificial Intelligence for Goods: Cases and Tools
 
Pydata Taipei 2020
Pydata Taipei 2020Pydata Taipei 2020
Pydata Taipei 2020
 
Big Data & Machine Learning
Big Data & Machine LearningBig Data & Machine Learning
Big Data & Machine Learning
 
Offensive Security basics part 1
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1
 
How to Build Your Future in the Internet of Things Economy. Jennifer Riggins
How to Build Your Future in the Internet of Things Economy. Jennifer RigginsHow to Build Your Future in the Internet of Things Economy. Jennifer Riggins
How to Build Your Future in the Internet of Things Economy. Jennifer Riggins
 
OWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfOWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdf
 

Recently uploaded

100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
musaddumba454
 
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
Fi
 
一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书
A
 
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
AS
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样
A
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
AS
 
原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样
原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样
原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样
AS
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
AS
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
SS
 

Recently uploaded (20)

100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
 
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书
 
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirt
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
 
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
TOP 100 Vulnerabilities Step-by-Step Guide HandbookTOP 100 Vulnerabilities Step-by-Step Guide Handbook
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
 
原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样
原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样
原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
Subdomain enumeration is a crucial phase in cybersecurity, particularly durin...
Subdomain enumeration is a crucial phase in cybersecurity, particularly durin...Subdomain enumeration is a crucial phase in cybersecurity, particularly durin...
Subdomain enumeration is a crucial phase in cybersecurity, particularly durin...
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
Dan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat HoodieDan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat Hoodie
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303
 

The Potential of the Hacker's Search Engine

  • 1. The Potential of the Hacker’s Search Engine @TheHairyJ • Jamie • 4th Yr Cyber Security at Edinburgh Napier
  • 2. What is Shodan? ● Search engine for Internet- connected devices ● Can be filtered to find specific devices ● Available on Shodan.io Matherly, J. (2016). Complete Guide to Shodan. leanpub, p.3. Matherly, J. (2014). Inside The World's Most Dangerous Search Engine.
  • 3. Overview ● Using distributed, randomized, web crawlers that run 24/7 ● Utilizes stateless scanning to increase speed of scanning ● A form of passive recon! ● Making it a great OSINT tool
  • 4. Randomizing 1. Generate a random IPv4 address 2. Generate a random port to test from the list of ports Shodan understands 3. Check this address on the given port and if successful grab the banner 4. Goto 1 Matherly, J. (2016). Complete Guide to Shodan. leanpub
  • 5. Stateless Scanning* ● No waiting for handshake SYN ● x equals hash of the recipient IP SYN-ACK ● once receiving x + 1 ● recipient does x – 1 to reveal IP SYN Cookies/Zmap/Massscan *Simplified
  • 6. ● There is a delay! ● In 2014, reported multi day lag ● Timestamps can alleviate this Latency
  • 7.
  • 8.
  • 9. DISCLAIMER The following slides showcase the extent of the unsecure internet. Slides will feature pictures of devices. These pictures have been obtained passively by the presenter or from other researchers’ work. No access to the devices featured has took place by the presenter. The presenter would like to make it abundantly clear that he is not responsible for you being arrested, if you go actively pursuing access to devices like those featured. See Computer Misuse Act 1990 Section 1. The presenter would also like to make it clear, that taking publishing pictures of the following ‘orange’ slides are at the photographers own risk.
  • 10. How can Shodan be used? ● “Search the Internet of Things, perform market research and check the external security of your business.” Shodan (@shodanhq) | Twitter
  • 12. “Universities are the most insecure organizations out there” 35,792 27,607 9,574 2,352 1,154 734 252 Massachusetts Institute of Technology University of Texas University of Oxford University of Edinburgh Strathclyde University University of Glasgow Edinburgh Napier University Educational Institutions Results on Shodan Matherly, J. (2014). Inside The World's Most Dangerous Search Engine.
  • 13.
  • 14. @EdinburghShodan ● Daily tweets of the total count of devices Shodan can find in Edinburgh . ● Also got one for Glasgow too!
  • 16. Trend Micro’s Cities Analysis via Shodan Trend Micro - Cities Exposed in Shodan
  • 17. @Viss + @achillean + Con Talks + #ShodanSafari
  • 19. @Viss + News Sites
  • 20. @Viss
  • 22. You Should Follow @shodanhq @achillean @viss @EdinburghShodan @GlasgowShodan #ShodanSafari ● Honeypot Analysis ● ICS/SCADA ● Country/City Analysis ● ‘Real-time’ analysis of incidents ● Automated Vulnerability Identification* Current Academic Research
  • 23. To Conclude… ● Discussed what Shodan is ● How it works ● What it can be used for ● What it can find ● Where it is currently growing
  • 24. Any Questions? Shout-outs: 2600Edinburgh – @Edinburgh2600 Edinburgh DEFCON - @DC44131 Rich MacFarlane - @rjmacfarlane Napier Security Society - @_enusec_

Editor's Notes

  1. what Shodan is How it works What it can be used for What it can find Where it is currently growing academically and practically
  2. If Google and Yellow Pages had a baby that did computer stuff Another way is to say A population Census of the internet
  3. Shodan is essentially a database Uses these methods to create a database of results Creating a passive approach
  4. Bias Blocking Mean Emails
  5. Saves Time which is important to give quality data High Failure rate
  6. Not the internet currently Maybe a day or so behind 3G/4G devices
  7. What Shodan.io looks like
  8. Backbone This is the output for the api too! So if you have just finished your scripting class, or learning regex, you might want to look into this for some extra-curricualar work
  9. This uses filtering – unable to do so unless you have an account. But don’t fret! Shodan is free if you have an ac.uk or any educational email address. Answers: 1 - iKettle 2 – CSGO Servers 3 – Minecraft Servers 4 – Mongolian MongoDBs 5 - Evil Corp servers from Mr Robot 6 – VoIP 7 – University of Glasgow
  10. 3 – Area 51
  11. Fringe drop / School term increase
  12. UK Western Europe French Cities German Cities US Cities
  13. 1 – Printer 2 – RDP 3 – Pub Camera 4 – House Camera 5 – Shop Camera 6 – Weed Grower 7 – PLC/Air Con/ Vent/ Temp 8 - ? Best answer wins 9 – Fluid Mgmt System(Pool) 10 – Butchers 11 – Cinema 12 – Train Toyset 13 – Xray 14 – French Hydro Electric Plant 15 - Crematorium
  14. Make sure to use filters to remove RDPs to get to the juicy bits
  15. 1 – Honeypot 2 – Deliotte RDP 3 – Active Directory
  16. 1 – FAA 2 – GOV RDP 3 – GOV TELNET
  17. REMEMBER ITS FREE IF YOU USE YOUR UNIVERSITY EMAIL