SlideShare a Scribd company logo
The Potential of the
Hacker’s Search Engine
@TheHairyJ • Jamie • 4th Yr Cyber Security at Edinburgh Napier
What is Shodan?
● Search engine for Internet-
connected devices
● Can be filtered to find specific
devices
● Available on Shodan.io
Matherly, J. (2016). Complete Guide to Shodan. leanpub, p.3.
Matherly, J. (2014). Inside The World's Most Dangerous
Search Engine.
Overview
● Using distributed, randomized,
web crawlers that run 24/7
● Utilizes stateless scanning to
increase speed of scanning
● A form of passive recon!
● Making it a great OSINT tool
Randomizing
1. Generate a random IPv4
address
2. Generate a random port to test
from the list of ports Shodan
understands
3. Check this address on the
given port and if successful
grab the banner
4. Goto 1
Matherly, J. (2016). Complete Guide to Shodan. leanpub
Stateless
Scanning*
● No waiting for handshake
SYN
● x equals hash of the recipient IP
SYN-ACK
● once receiving x + 1
● recipient does x – 1 to reveal IP
SYN Cookies/Zmap/Massscan
*Simplified
● There is a delay!
● In 2014, reported multi day lag
● Timestamps can alleviate this
Latency
DISCLAIMER
The following slides showcase the extent of the unsecure internet. Slides will feature
pictures of devices. These pictures have been obtained passively by the presenter or
from other researchers’ work. No access to the devices featured has took place by
the presenter.
The presenter would like to make it abundantly clear that he is not responsible for you
being arrested, if you go actively pursuing access to devices like those featured. See
Computer Misuse Act 1990 Section 1.
The presenter would also like to make it clear, that taking publishing pictures of the
following ‘orange’ slides are at the photographers own risk.
How can Shodan
be used?
● “Search the Internet of Things,
perform market research and
check the external security of
your business.”
Shodan (@shodanhq) | Twitter
#ShodanSafari
“Universities are the most insecure organizations out there”
35,792
27,607
9,574
2,352
1,154
734
252
Massachusetts Institute of Technology
University of Texas
University of Oxford
University of Edinburgh
Strathclyde University
University of Glasgow
Edinburgh Napier University
Educational Institutions Results on
Shodan
Matherly, J. (2014). Inside The World's Most Dangerous Search Engine.
@EdinburghShodan
● Daily tweets of the total count
of devices Shodan can find in
Edinburgh .
● Also got one for Glasgow too!
0
10000
20000
30000
40000
50000
60000
70000
80000
@EdinburghShodan’s Daily Results
Trend Micro’s Cities Analysis via Shodan
Trend Micro - Cities Exposed in Shodan
@Viss + @achillean + Con Talks + #ShodanSafari
images.shodan.io
@Viss + News Sites
@Viss
https://www.shodan.io/about/products
You Should Follow
@shodanhq
@achillean
@viss
@EdinburghShodan
@GlasgowShodan
#ShodanSafari
● Honeypot Analysis
● ICS/SCADA
● Country/City Analysis
● ‘Real-time’ analysis of incidents
● Automated Vulnerability Identification*
Current Academic
Research
To Conclude…
● Discussed what Shodan is
● How it works
● What it can be used for
● What it can find
● Where it is currently growing
Any Questions?
Shout-outs:
2600Edinburgh – @Edinburgh2600
Edinburgh DEFCON - @DC44131
Rich MacFarlane - @rjmacfarlane
Napier Security Society - @_enusec_

More Related Content

Similar to The Potential of the Hacker's Search Engine

3i mind-open mind-web
3i mind-open mind-web3i mind-open mind-web
3i mind-open mind-webPublicLeaker
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
Deep Shankar Yadav
 
101+ Cybersecurity Tools List And Beyond by westwp.com.pdf
101+ Cybersecurity Tools List And Beyond by westwp.com.pdf101+ Cybersecurity Tools List And Beyond by westwp.com.pdf
101+ Cybersecurity Tools List And Beyond by westwp.com.pdf
Westwp
 
Development of Android/ IOS Based Application to Access Aadhar Database For U...
Development of Android/ IOS Based Application to Access Aadhar Database For U...Development of Android/ IOS Based Application to Access Aadhar Database For U...
Development of Android/ IOS Based Application to Access Aadhar Database For U...
dbpublications
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
ijtsrd
 
The art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineeringThe art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineering
Suraj Khetani
 
Toward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - PublicToward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - PublicCharles Lim
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Andrew Morris
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet version
Chandrapal Badshah
 
The Experiences of a Cyber Attack Victim
The Experiences of a Cyber Attack VictimThe Experiences of a Cyber Attack Victim
The Experiences of a Cyber Attack Victim
Shomiron Das Gupta
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Build your mobile app from a to z presentation
Build your mobile app from a to z presentationBuild your mobile app from a to z presentation
Build your mobile app from a to z presentation
Seyedmostafa Safavi
 
The indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internetThe indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internet
Charles Lim
 
Introduction to privacy feedback research @ DesRes2016
Introduction to privacy feedback research @ DesRes2016Introduction to privacy feedback research @ DesRes2016
Introduction to privacy feedback research @ DesRes2016
Alessandro Carelli
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
LIFARS
 
Artificial Intelligence for Goods: Cases and Tools
Artificial Intelligence for Goods: Cases and ToolsArtificial Intelligence for Goods: Cases and Tools
Artificial Intelligence for Goods: Cases and Tools
Oleksandr Krakovetskyi
 
Pydata Taipei 2020
Pydata Taipei 2020Pydata Taipei 2020
Pydata Taipei 2020
Tunghai University
 
Big Data & Machine Learning
Big Data & Machine LearningBig Data & Machine Learning
Big Data & Machine Learning
Angelo Mariano
 
Offensive Security basics part 1
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1
wharpreet
 
How to Build Your Future in the Internet of Things Economy. Jennifer Riggins
How to Build Your Future in the Internet of Things Economy. Jennifer RigginsHow to Build Your Future in the Internet of Things Economy. Jennifer Riggins
How to Build Your Future in the Internet of Things Economy. Jennifer Riggins
Future Insights
 

Similar to The Potential of the Hacker's Search Engine (20)

3i mind-open mind-web
3i mind-open mind-web3i mind-open mind-web
3i mind-open mind-web
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
101+ Cybersecurity Tools List And Beyond by westwp.com.pdf
101+ Cybersecurity Tools List And Beyond by westwp.com.pdf101+ Cybersecurity Tools List And Beyond by westwp.com.pdf
101+ Cybersecurity Tools List And Beyond by westwp.com.pdf
 
Development of Android/ IOS Based Application to Access Aadhar Database For U...
Development of Android/ IOS Based Application to Access Aadhar Database For U...Development of Android/ IOS Based Application to Access Aadhar Database For U...
Development of Android/ IOS Based Application to Access Aadhar Database For U...
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
 
The art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineeringThe art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineering
 
Toward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - PublicToward revealing Advanced Persistence Threats in your organization - Public
Toward revealing Advanced Persistence Threats in your organization - Public
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet version
 
The Experiences of a Cyber Attack Victim
The Experiences of a Cyber Attack VictimThe Experiences of a Cyber Attack Victim
The Experiences of a Cyber Attack Victim
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
Build your mobile app from a to z presentation
Build your mobile app from a to z presentationBuild your mobile app from a to z presentation
Build your mobile app from a to z presentation
 
The indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internetThe indonesia darknets revealed– mapping the uncharted territory of the internet
The indonesia darknets revealed– mapping the uncharted territory of the internet
 
Introduction to privacy feedback research @ DesRes2016
Introduction to privacy feedback research @ DesRes2016Introduction to privacy feedback research @ DesRes2016
Introduction to privacy feedback research @ DesRes2016
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
 
Artificial Intelligence for Goods: Cases and Tools
Artificial Intelligence for Goods: Cases and ToolsArtificial Intelligence for Goods: Cases and Tools
Artificial Intelligence for Goods: Cases and Tools
 
Pydata Taipei 2020
Pydata Taipei 2020Pydata Taipei 2020
Pydata Taipei 2020
 
Big Data & Machine Learning
Big Data & Machine LearningBig Data & Machine Learning
Big Data & Machine Learning
 
Offensive Security basics part 1
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1
 
How to Build Your Future in the Internet of Things Economy. Jennifer Riggins
How to Build Your Future in the Internet of Things Economy. Jennifer RigginsHow to Build Your Future in the Internet of Things Economy. Jennifer Riggins
How to Build Your Future in the Internet of Things Economy. Jennifer Riggins
 

Recently uploaded

Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 

Recently uploaded (16)

Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 

The Potential of the Hacker's Search Engine

  • 1. The Potential of the Hacker’s Search Engine @TheHairyJ • Jamie • 4th Yr Cyber Security at Edinburgh Napier
  • 2. What is Shodan? ● Search engine for Internet- connected devices ● Can be filtered to find specific devices ● Available on Shodan.io Matherly, J. (2016). Complete Guide to Shodan. leanpub, p.3. Matherly, J. (2014). Inside The World's Most Dangerous Search Engine.
  • 3. Overview ● Using distributed, randomized, web crawlers that run 24/7 ● Utilizes stateless scanning to increase speed of scanning ● A form of passive recon! ● Making it a great OSINT tool
  • 4. Randomizing 1. Generate a random IPv4 address 2. Generate a random port to test from the list of ports Shodan understands 3. Check this address on the given port and if successful grab the banner 4. Goto 1 Matherly, J. (2016). Complete Guide to Shodan. leanpub
  • 5. Stateless Scanning* ● No waiting for handshake SYN ● x equals hash of the recipient IP SYN-ACK ● once receiving x + 1 ● recipient does x – 1 to reveal IP SYN Cookies/Zmap/Massscan *Simplified
  • 6. ● There is a delay! ● In 2014, reported multi day lag ● Timestamps can alleviate this Latency
  • 7.
  • 8.
  • 9. DISCLAIMER The following slides showcase the extent of the unsecure internet. Slides will feature pictures of devices. These pictures have been obtained passively by the presenter or from other researchers’ work. No access to the devices featured has took place by the presenter. The presenter would like to make it abundantly clear that he is not responsible for you being arrested, if you go actively pursuing access to devices like those featured. See Computer Misuse Act 1990 Section 1. The presenter would also like to make it clear, that taking publishing pictures of the following ‘orange’ slides are at the photographers own risk.
  • 10. How can Shodan be used? ● “Search the Internet of Things, perform market research and check the external security of your business.” Shodan (@shodanhq) | Twitter
  • 12. “Universities are the most insecure organizations out there” 35,792 27,607 9,574 2,352 1,154 734 252 Massachusetts Institute of Technology University of Texas University of Oxford University of Edinburgh Strathclyde University University of Glasgow Edinburgh Napier University Educational Institutions Results on Shodan Matherly, J. (2014). Inside The World's Most Dangerous Search Engine.
  • 13.
  • 14. @EdinburghShodan ● Daily tweets of the total count of devices Shodan can find in Edinburgh . ● Also got one for Glasgow too!
  • 16. Trend Micro’s Cities Analysis via Shodan Trend Micro - Cities Exposed in Shodan
  • 17. @Viss + @achillean + Con Talks + #ShodanSafari
  • 19. @Viss + News Sites
  • 20. @Viss
  • 22. You Should Follow @shodanhq @achillean @viss @EdinburghShodan @GlasgowShodan #ShodanSafari ● Honeypot Analysis ● ICS/SCADA ● Country/City Analysis ● ‘Real-time’ analysis of incidents ● Automated Vulnerability Identification* Current Academic Research
  • 23. To Conclude… ● Discussed what Shodan is ● How it works ● What it can be used for ● What it can find ● Where it is currently growing
  • 24. Any Questions? Shout-outs: 2600Edinburgh – @Edinburgh2600 Edinburgh DEFCON - @DC44131 Rich MacFarlane - @rjmacfarlane Napier Security Society - @_enusec_

Editor's Notes

  1. what Shodan is How it works What it can be used for What it can find Where it is currently growing academically and practically
  2. If Google and Yellow Pages had a baby that did computer stuff Another way is to say A population Census of the internet
  3. Shodan is essentially a database Uses these methods to create a database of results Creating a passive approach
  4. Bias Blocking Mean Emails
  5. Saves Time which is important to give quality data High Failure rate
  6. Not the internet currently Maybe a day or so behind 3G/4G devices
  7. What Shodan.io looks like
  8. Backbone This is the output for the api too! So if you have just finished your scripting class, or learning regex, you might want to look into this for some extra-curricualar work
  9. This uses filtering – unable to do so unless you have an account. But don’t fret! Shodan is free if you have an ac.uk or any educational email address. Answers: 1 - iKettle 2 – CSGO Servers 3 – Minecraft Servers 4 – Mongolian MongoDBs 5 - Evil Corp servers from Mr Robot 6 – VoIP 7 – University of Glasgow
  10. 3 – Area 51
  11. Fringe drop / School term increase
  12. UK Western Europe French Cities German Cities US Cities
  13. 1 – Printer 2 – RDP 3 – Pub Camera 4 – House Camera 5 – Shop Camera 6 – Weed Grower 7 – PLC/Air Con/ Vent/ Temp 8 - ? Best answer wins 9 – Fluid Mgmt System(Pool) 10 – Butchers 11 – Cinema 12 – Train Toyset 13 – Xray 14 – French Hydro Electric Plant 15 - Crematorium
  14. Make sure to use filters to remove RDPs to get to the juicy bits
  15. 1 – Honeypot 2 – Deliotte RDP 3 – Active Directory
  16. 1 – FAA 2 – GOV RDP 3 – GOV TELNET
  17. REMEMBER ITS FREE IF YOU USE YOUR UNIVERSITY EMAIL