SlideShare a Scribd company logo
WHAT IS SHODAN.IO?
The search engine for refrigerators
27-Jul-17
Koen Van Impe – koen.vanimpe@cudeso.be
What is Shodan.IO?
•  A search engine
•  Of devices and applications
•  That crawls the internet (just like Google)
•  Parses the banners returned by devices and applications
•  No "vulnerability scanning", it parses what is publicly available
•  And lets you search its database (just like Google)
•  Filter the data for country, strings, networks
•  You can use it for good or bad (just like Google)
•  Manual queries
•  Use the API : automation and include it in your own tools
27-Jul-17
What is Shodan.IO? 2
What is Shodan.IO?
27-Jul-17
What is Shodan.IO? 3
Free, or for a limited fee
•  Basic usage is free
•  Limited results
•  Limited filters
•  Membership for $49
•  Improved API plan
•  Access to for example Shodan Images
•  Download search results
27-Jul-17
What is Shodan.IO? 4
Don't put it on the Internet!
•  Shodan does not hack your systems!
•  What could possibly go wrong if we connect it to the net?
•  Internet connected, unprotected -> Shodan can find it
•  Many of these devices shouldn't even be online at all!
•  Firewalled -> Shodan can not find it
•  Search query
•  Simple banner string
•  Refine the results with 2-3 steps
•  Goldmine!
27-Jul-17
What is Shodan.IO? 5
Showcase : the scary stuff
•  Let's search for "a thing"
•  Honeywell
•  Building / housing
•  "Connected Services"
•  Network connector to
"physical" device
27-Jul-17
What is Shodan.IO? 6
Search results
•  Search for "Honeywell Building Network Adapter (BNA)"
27-Jul-17
What is Shodan.IO? 7
Refine results / 1
•  Refine for country:be
27-Jul-17
What is Shodan.IO? 8
Refine results / 2
•  Refine for only telnet
•  Available filters
•  city:
•  country:
•  geo:
•  hostname:
•  net:
•  os:
•  port:
•  before/after:
27-Jul-17
What is Shodan.IO? 9
Inspect results
•  Zoom in on one host
•  Open network ports and services
•  With banner details
•  Geomap
27-Jul-17
What is Shodan.IO? 10
Zoom further
•  Even Google insists!
27-Jul-17
What is Shodan.IO? 11
Read the manual
•  PDF available on the Honeywell website
•  Seriously???
27-Jul-17
What is Shodan.IO? 12
Verify, but don't abuse
27-Jul-17
What is Shodan.IO? 13
•  2 search queries
•  Shodan
•  Google
•  One PDF with vendor information
•  One connection attempt
5' work
torify telnet <ip>
It's not hacking!
•  Every tool can be either used or abused
•  It's not about vulnerabilities. It's about misconfiguration.
•  Or negligence
•  Google is not a hacking tool either!
•  Google Dorks
•  Neither is curl
27-Jul-17
What is Shodan.IO? 14
Prepared queries
27-Jul-17
What is Shodan.IO? 15
Shodan Images
27-Jul-17
What is Shodan.IO? 16
Shodan ICS Radar
27-Jul-17
What is Shodan.IO? 17
API
•  Python library
27-Jul-17
What is Shodan.IO? 18
Why would you use the API?
•  Useful for pentesters
•  Passive reconnaissance
•  CSIRTs or SOCs
•  Monitor their constituency
•  Vulnerability management
•  Get alerted when your device is listed
27-Jul-17
What is Shodan.IO? 19
Make Shodan work for you!
•  Use the API
•  Scan your networks for newly detected services
•  Query the Shodan API for new services in your network
•  Have they been detected by your vulnerability scanner?
•  What is the rating of your vulnerability on the disclosed services?
•  High rating + Shodan : create trouble ticket
•  Verify if firewall rules are correct
•  Don't do security by obscurity by changing banner strings
•  Fix the ACL
27-Jul-17
What is Shodan.IO? 20

More Related Content

What's hot

Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
Sudhanshu Chauhan
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
Security Bootcamp
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
Deep Shankar Yadav
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
whitehat 'People'
 
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
festival ICT 2016
 
Malware Detection using Machine Learning
Malware Detection using Machine Learning	Malware Detection using Machine Learning
Malware Detection using Machine Learning
Cysinfo Cyber Security Community
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Ajin Abraham
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
Santosh Khadsare
 
50 Shades of Sigma
50 Shades of Sigma50 Shades of Sigma
50 Shades of Sigma
Florian Roth
 
Osint
OsintOsint
Malware forensic
Malware forensicMalware forensic
Malware forensic
SumeraHangi
 
Snort
SnortSnort
Snort
Rahul Jain
 
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
Michael Gough
 
Android security
Android securityAndroid security
Android security
Midhun P Gopi
 
Automated API pentesting using fuzzapi
Automated API pentesting using fuzzapiAutomated API pentesting using fuzzapi
Automated API pentesting using fuzzapi
Abhijeth D
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)
Molfar
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
n|u - The Open Security Community
 
iOS: Overview, Architecture, Development & Versions
iOS: Overview, Architecture, Development & Versions iOS: Overview, Architecture, Development & Versions
iOS: Overview, Architecture, Development & Versions
Sandra Kerbage
 

What's hot (20)

Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
 
Malware Detection using Machine Learning
Malware Detection using Machine Learning	Malware Detection using Machine Learning
Malware Detection using Machine Learning
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
50 Shades of Sigma
50 Shades of Sigma50 Shades of Sigma
50 Shades of Sigma
 
Osint
OsintOsint
Osint
 
Malware forensic
Malware forensicMalware forensic
Malware forensic
 
Snort
SnortSnort
Snort
 
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
 
Android security
Android securityAndroid security
Android security
 
Automated API pentesting using fuzzapi
Automated API pentesting using fuzzapiAutomated API pentesting using fuzzapi
Automated API pentesting using fuzzapi
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
 
iOS: Overview, Architecture, Development & Versions
iOS: Overview, Architecture, Development & Versions iOS: Overview, Architecture, Development & Versions
iOS: Overview, Architecture, Development & Versions
 

Similar to What is shodan

Automated tools for penetration testing
Automated tools for penetration testingAutomated tools for penetration testing
Automated tools for penetration testing
devanshdubey7
 
Null HYD Playing with shodan null
Null HYD Playing with shodan nullNull HYD Playing with shodan null
Null HYD Playing with shodan null
Raghunath G
 
Introduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring projectIntroduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring project
Richard King
 
The Key Concepts of App Tracking for Developers
The Key Concepts of App Tracking for DevelopersThe Key Concepts of App Tracking for Developers
The Key Concepts of App Tracking for Developers
Sergii Zhuk
 
Opening OSGi to the world- Simple integration of services not written in Java...
Opening OSGi to the world- Simple integration of services not written in Java...Opening OSGi to the world- Simple integration of services not written in Java...
Opening OSGi to the world- Simple integration of services not written in Java...
mfrancis
 
Mobeers waterloo-2011
Mobeers waterloo-2011Mobeers waterloo-2011
Mobeers waterloo-2011
Brian LeRoux
 
IoT is Something to Figure Out
IoT is Something to Figure OutIoT is Something to Figure Out
IoT is Something to Figure Out
Peter Hoddie
 
Not another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigueNot another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigue
Ramin Firoozye
 
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Rob Ragan
 
Pulp Google Hacking
Pulp Google HackingPulp Google Hacking
Pulp Google Hacking
Bishop Fox
 
Delivering Search for Today's Local, Social, and Mobile Applications
Delivering Search for Today's Local, Social, and Mobile ApplicationsDelivering Search for Today's Local, Social, and Mobile Applications
Delivering Search for Today's Local, Social, and Mobile Applications
Amazon Web Services
 
Osgeo incubation-2014
Osgeo incubation-2014Osgeo incubation-2014
Osgeo incubation-2014
Jody Garnett
 
Untangling spring week2
Untangling spring week2Untangling spring week2
Untangling spring week2
Derek Jacoby
 
How Graphs Changed The Way Hackers Attack
How Graphs Changed The Way Hackers AttackHow Graphs Changed The Way Hackers Attack
How Graphs Changed The Way Hackers Attack
Andy Robbins
 
Dayton webusers creatinghybridapps-webedition
Dayton webusers creatinghybridapps-webeditionDayton webusers creatinghybridapps-webedition
Dayton webusers creatinghybridapps-webedition
Martin Davis III
 
Electronic governance steps in the right direction?
Electronic governance   steps in the right direction?Electronic governance   steps in the right direction?
Electronic governance steps in the right direction?
Bozhidar Bozhanov
 
Playing with shodan
Playing with shodanPlaying with shodan
Playing with shodan
decode _dev
 
Hack attack pulp google
Hack attack pulp googleHack attack pulp google
Hack attack pulp google
sourav6388
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
Osama Ellahi
 
Open Data Briefing for Alameda County Data Sharing Committee
Open Data Briefing for Alameda County Data Sharing CommitteeOpen Data Briefing for Alameda County Data Sharing Committee
Open Data Briefing for Alameda County Data Sharing Committee
Urban Strategies Council
 

Similar to What is shodan (20)

Automated tools for penetration testing
Automated tools for penetration testingAutomated tools for penetration testing
Automated tools for penetration testing
 
Null HYD Playing with shodan null
Null HYD Playing with shodan nullNull HYD Playing with shodan null
Null HYD Playing with shodan null
 
Introduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring projectIntroduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring project
 
The Key Concepts of App Tracking for Developers
The Key Concepts of App Tracking for DevelopersThe Key Concepts of App Tracking for Developers
The Key Concepts of App Tracking for Developers
 
Opening OSGi to the world- Simple integration of services not written in Java...
Opening OSGi to the world- Simple integration of services not written in Java...Opening OSGi to the world- Simple integration of services not written in Java...
Opening OSGi to the world- Simple integration of services not written in Java...
 
Mobeers waterloo-2011
Mobeers waterloo-2011Mobeers waterloo-2011
Mobeers waterloo-2011
 
IoT is Something to Figure Out
IoT is Something to Figure OutIoT is Something to Figure Out
IoT is Something to Figure Out
 
Not another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigueNot another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigue
 
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
 
Pulp Google Hacking
Pulp Google HackingPulp Google Hacking
Pulp Google Hacking
 
Delivering Search for Today's Local, Social, and Mobile Applications
Delivering Search for Today's Local, Social, and Mobile ApplicationsDelivering Search for Today's Local, Social, and Mobile Applications
Delivering Search for Today's Local, Social, and Mobile Applications
 
Osgeo incubation-2014
Osgeo incubation-2014Osgeo incubation-2014
Osgeo incubation-2014
 
Untangling spring week2
Untangling spring week2Untangling spring week2
Untangling spring week2
 
How Graphs Changed The Way Hackers Attack
How Graphs Changed The Way Hackers AttackHow Graphs Changed The Way Hackers Attack
How Graphs Changed The Way Hackers Attack
 
Dayton webusers creatinghybridapps-webedition
Dayton webusers creatinghybridapps-webeditionDayton webusers creatinghybridapps-webedition
Dayton webusers creatinghybridapps-webedition
 
Electronic governance steps in the right direction?
Electronic governance   steps in the right direction?Electronic governance   steps in the right direction?
Electronic governance steps in the right direction?
 
Playing with shodan
Playing with shodanPlaying with shodan
Playing with shodan
 
Hack attack pulp google
Hack attack pulp googleHack attack pulp google
Hack attack pulp google
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
Open Data Briefing for Alameda County Data Sharing Committee
Open Data Briefing for Alameda County Data Sharing CommitteeOpen Data Briefing for Alameda County Data Sharing Committee
Open Data Briefing for Alameda County Data Sharing Committee
 

Recently uploaded

Why Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAEWhy Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAE
adelewhite125
 
Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...
APNIC
 
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
mahigarg2024#G05
 
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
ffg01100
 
Trading Strategy for London silver bullet
Trading Strategy for London silver bulletTrading Strategy for London silver bullet
Trading Strategy for London silver bullet
OkgatoSemadi1
 
Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...
Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...
Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...
samyanvichadda
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
Zsolt Nemeth
 
Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...
Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...
Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...
paridubey2024#G05
 
UMN degree offer diploma Transcript
UMN degree offer diploma TranscriptUMN degree offer diploma Transcript
UMN degree offer diploma Transcript
cenocb
 
Portugal Dreamin 24 - How to easily use an API with Flows
Portugal Dreamin 24  - How to easily use an API with FlowsPortugal Dreamin 24  - How to easily use an API with Flows
Portugal Dreamin 24 - How to easily use an API with Flows
Thierry TROUIN ☁
 
Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...
Edward Blurock
 
DASH, presented by Elly Tawhai at PacNOG 33
DASH, presented by Elly Tawhai at PacNOG 33DASH, presented by Elly Tawhai at PacNOG 33
DASH, presented by Elly Tawhai at PacNOG 33
APNIC
 
Iot-Internet-of-Things_Industrial revolution 4.0-ppt.pptx
Iot-Internet-of-Things_Industrial revolution 4.0-ppt.pptxIot-Internet-of-Things_Industrial revolution 4.0-ppt.pptx
Iot-Internet-of-Things_Industrial revolution 4.0-ppt.pptx
DeepakKumar862274
 
@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...
@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...
@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...
shamrisumri
 
Software Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical ImplementationsSoftware Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical Implementations
Bangladesh Network Operators Group
 
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai AvailableChennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
shamrisumri
 
Network Layer and its protocols mod .pptx
Network Layer and its protocols mod .pptxNetwork Layer and its protocols mod .pptx
Network Layer and its protocols mod .pptx
cossykin19
 
Lordsexch ID: An Ultimate Online Cricket ID Provider In India
Lordsexch ID: An Ultimate Online Cricket ID Provider In IndiaLordsexch ID: An Ultimate Online Cricket ID Provider In India
Lordsexch ID: An Ultimate Online Cricket ID Provider In India
exchangeid32
 
Information Systems Auditing, Controls and Assurance , tanapat limsaiprom
Information Systems Auditing, Controls and Assurance , tanapat limsaipromInformation Systems Auditing, Controls and Assurance , tanapat limsaiprom
Information Systems Auditing, Controls and Assurance , tanapat limsaiprom
TanapatLimsaiprom1
 
Build a Professional Resume using Canva , Tanapat Limsaiprom
Build a Professional Resume using Canva , Tanapat LimsaipromBuild a Professional Resume using Canva , Tanapat Limsaiprom
Build a Professional Resume using Canva , Tanapat Limsaiprom
TanapatLimsaiprom1
 

Recently uploaded (20)

Why Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAEWhy Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAE
 
Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...
 
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
 
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
 
Trading Strategy for London silver bullet
Trading Strategy for London silver bulletTrading Strategy for London silver bullet
Trading Strategy for London silver bullet
 
Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...
Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...
Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
 
Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...
Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...
Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...
 
UMN degree offer diploma Transcript
UMN degree offer diploma TranscriptUMN degree offer diploma Transcript
UMN degree offer diploma Transcript
 
Portugal Dreamin 24 - How to easily use an API with Flows
Portugal Dreamin 24  - How to easily use an API with FlowsPortugal Dreamin 24  - How to easily use an API with Flows
Portugal Dreamin 24 - How to easily use an API with Flows
 
Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...
 
DASH, presented by Elly Tawhai at PacNOG 33
DASH, presented by Elly Tawhai at PacNOG 33DASH, presented by Elly Tawhai at PacNOG 33
DASH, presented by Elly Tawhai at PacNOG 33
 
Iot-Internet-of-Things_Industrial revolution 4.0-ppt.pptx
Iot-Internet-of-Things_Industrial revolution 4.0-ppt.pptxIot-Internet-of-Things_Industrial revolution 4.0-ppt.pptx
Iot-Internet-of-Things_Industrial revolution 4.0-ppt.pptx
 
@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...
@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...
@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...
 
Software Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical ImplementationsSoftware Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical Implementations
 
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai AvailableChennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
 
Network Layer and its protocols mod .pptx
Network Layer and its protocols mod .pptxNetwork Layer and its protocols mod .pptx
Network Layer and its protocols mod .pptx
 
Lordsexch ID: An Ultimate Online Cricket ID Provider In India
Lordsexch ID: An Ultimate Online Cricket ID Provider In IndiaLordsexch ID: An Ultimate Online Cricket ID Provider In India
Lordsexch ID: An Ultimate Online Cricket ID Provider In India
 
Information Systems Auditing, Controls and Assurance , tanapat limsaiprom
Information Systems Auditing, Controls and Assurance , tanapat limsaipromInformation Systems Auditing, Controls and Assurance , tanapat limsaiprom
Information Systems Auditing, Controls and Assurance , tanapat limsaiprom
 
Build a Professional Resume using Canva , Tanapat Limsaiprom
Build a Professional Resume using Canva , Tanapat LimsaipromBuild a Professional Resume using Canva , Tanapat Limsaiprom
Build a Professional Resume using Canva , Tanapat Limsaiprom
 

What is shodan

  • 1. WHAT IS SHODAN.IO? The search engine for refrigerators 27-Jul-17 Koen Van Impe – koen.vanimpe@cudeso.be
  • 2. What is Shodan.IO? •  A search engine •  Of devices and applications •  That crawls the internet (just like Google) •  Parses the banners returned by devices and applications •  No "vulnerability scanning", it parses what is publicly available •  And lets you search its database (just like Google) •  Filter the data for country, strings, networks •  You can use it for good or bad (just like Google) •  Manual queries •  Use the API : automation and include it in your own tools 27-Jul-17 What is Shodan.IO? 2
  • 4. Free, or for a limited fee •  Basic usage is free •  Limited results •  Limited filters •  Membership for $49 •  Improved API plan •  Access to for example Shodan Images •  Download search results 27-Jul-17 What is Shodan.IO? 4
  • 5. Don't put it on the Internet! •  Shodan does not hack your systems! •  What could possibly go wrong if we connect it to the net? •  Internet connected, unprotected -> Shodan can find it •  Many of these devices shouldn't even be online at all! •  Firewalled -> Shodan can not find it •  Search query •  Simple banner string •  Refine the results with 2-3 steps •  Goldmine! 27-Jul-17 What is Shodan.IO? 5
  • 6. Showcase : the scary stuff •  Let's search for "a thing" •  Honeywell •  Building / housing •  "Connected Services" •  Network connector to "physical" device 27-Jul-17 What is Shodan.IO? 6
  • 7. Search results •  Search for "Honeywell Building Network Adapter (BNA)" 27-Jul-17 What is Shodan.IO? 7
  • 8. Refine results / 1 •  Refine for country:be 27-Jul-17 What is Shodan.IO? 8
  • 9. Refine results / 2 •  Refine for only telnet •  Available filters •  city: •  country: •  geo: •  hostname: •  net: •  os: •  port: •  before/after: 27-Jul-17 What is Shodan.IO? 9
  • 10. Inspect results •  Zoom in on one host •  Open network ports and services •  With banner details •  Geomap 27-Jul-17 What is Shodan.IO? 10
  • 11. Zoom further •  Even Google insists! 27-Jul-17 What is Shodan.IO? 11
  • 12. Read the manual •  PDF available on the Honeywell website •  Seriously??? 27-Jul-17 What is Shodan.IO? 12
  • 13. Verify, but don't abuse 27-Jul-17 What is Shodan.IO? 13 •  2 search queries •  Shodan •  Google •  One PDF with vendor information •  One connection attempt 5' work torify telnet <ip>
  • 14. It's not hacking! •  Every tool can be either used or abused •  It's not about vulnerabilities. It's about misconfiguration. •  Or negligence •  Google is not a hacking tool either! •  Google Dorks •  Neither is curl 27-Jul-17 What is Shodan.IO? 14
  • 19. Why would you use the API? •  Useful for pentesters •  Passive reconnaissance •  CSIRTs or SOCs •  Monitor their constituency •  Vulnerability management •  Get alerted when your device is listed 27-Jul-17 What is Shodan.IO? 19
  • 20. Make Shodan work for you! •  Use the API •  Scan your networks for newly detected services •  Query the Shodan API for new services in your network •  Have they been detected by your vulnerability scanner? •  What is the rating of your vulnerability on the disclosed services? •  High rating + Shodan : create trouble ticket •  Verify if firewall rules are correct •  Don't do security by obscurity by changing banner strings •  Fix the ACL 27-Jul-17 What is Shodan.IO? 20