Using Shodan to Find Vulnerable Devices

Sdílet
Vložit
  • čas přidán 27. 06. 2024
  • Using Shodan to Find Vulnerable Devices
    Shodan is a search engine that lets the user find specific types of devices (webcams, routers, servers, etc.) connected to the Internet using a variety of search filters.
    Unlike traditional search engines such as Google, which help you find websites, Shodan enables you to find information about desktops, servers, IoT devices, and more by grabbing service banners, which are metadata that the server sends back to the client.
    Typical uses of Shodan include network security, market research, cyber risk, scanning IoT
    devices, and tracking ransomware. Shodan was created by John C. Matherly in 2009.
    Udemy course discount coupons
    Digital Forensics for Pentesters - Hands-on Learning
    www.udemy.com/course/digital-...
    Ethical Hacking - Hands-On Training - Part I
    www.udemy.com/course/hacking-...
    Ethical Hacking - Hands-on Training - Part II
    www.udemy.com/course/ethical-...
    Ethical Hacking - Capture the Flag Walkthroughs - V1
    www.udemy.com/course/ethical-...
    Ethical Hacking - Capture the Flag Walkthroughs - V2
    www.udemy.com/course/ethical-...
    Ethical Hacking - Capture the Flag Walkthroughs - V3
    www.udemy.com/course/ethical-...
    Microsoft Windows 10 Pro - Hands-on Training
    www.udemy.com/course/microsof...
    Microsoft Word 2016 for Everyone
    www.udemy.com/course/microsof...
    Microsoft Windows Server 2019 - Hands-on Training Part I
    www.udemy.com/course/microsof...
    Microsoft Windows Server 2019 - Hands-on Training Part II
    www.udemy.com/course/microsof...
    Microsoft Windows Server 2016 - Hands-on Training Part I
    www.udemy.com/course/server-2...
    Microsoft Windows Server 2016 - Hands-on Training Part II
    www.udemy.com/course/microsof...
    Microsoft Server 2012 R2 - Hands-on Training Part I
    www.udemy.com/course/windows-...
    Microsoft Server 2012 R2 - Hands-on Training Part II
    www.udemy.com/course/windows-... www.udemy.com/user/cliftonlkr...

Komentáře • 11

  • @Kinoti9
    @Kinoti9 Před 2 lety

    Beautiful explanation

  • @InfoSecDojo
    @InfoSecDojo Před 3 lety

    really informative..thanks

  • @user-do3ss3kn7e
    @user-do3ss3kn7e Před rokem

    ayooooo this is legit prof, thanks.

  • @Free.Education786
    @Free.Education786 Před 3 lety +1

    Awesome professor but How to see real ip of cloudflare WAF protected web site ? How to upload reverse shell when there is not a upload option or SQLi error '... Hope to get juicy reply with VIDEO tutorial soon. Love you uncle professor 🤝💐♥️💚💙👍

    • @krah8052
      @krah8052  Před 3 lety +3

      You need to go around and come in through the back door. Most attacks are going to originate from inside the network for this very reason. The front door is locked down. Finding the organizational chart or email addresses of the organizations employees is where you start. You would want to discover any social networking accounts used by the organization and/or it's employees. This is all part of your passive recon. You need to find an opening in the back door and that would be an end user.
      Once you have identified a group or an individual, you target them using smishing, vishing or a phishing campaign. In the lab it looks easy but in real life in can months to find a target and then longer to gain access. You need to get access or someone on the inside to complete the reverse shell connection.

    • @Free.Education786
      @Free.Education786 Před 3 lety

      @@krah8052 I got this error while installing AutoSploit on parrotsec os 4.10..Please educate how to fix this error. Thanks
      The following packages have unmet dependencies:
      python-pip : Depends: python-pip-whl (= 20.0.2-5kali1) but 20.1.1-2 is to be installed
      Recommends: python-all-dev (>= 2.6) but it is not going to be installed
      Recommends: python-setuptools but it is not going to be installed
      Recommends: python-wheel but it is not installable
      E: Unable to correct problems, you have held broken packages.
      ./install.sh: line 15: pip2: command not found

    • @krah8052
      @krah8052  Před 3 lety +1

      @@Free.Education786 The error says it needs depends on Python packages that are missing.

  • @user-sw8uw6mt5v
    @user-sw8uw6mt5v Před 5 měsíci +1

    isn't what you just did illigal...

    • @user-sw8uw6mt5v
      @user-sw8uw6mt5v Před 5 měsíci

      ooo ops i posted that befor you sead you wouldn't do it, sorry