SlideShare a Scribd company logo
Playing with SHODAN
Scan,Try,Pwn!!
*The presenter or NULL-Hyd is not responsible for you actions and abuse of the Cyber Securit
#about me
• I’m U.M.K. Dikshit 21yr Coder, Hacker and student.
• Microsoft Certified and World Finalist for NASA Space Apps 2014.
• Selected for SpaceX Project by NASA.
• Volunteer for Mozilla Firefox,CFI and many more…
• Tech enthusiast, Gaming freak and books lover.
fb.me/kalyan.dikshit| @dikshit_umk | dikshitrocks93@gmail.com
#Agenda
• History of SHODAN
• What is SHODAN?
• Tools used by SHODAN
• Search terms
• Basic Operations by SHODAN
#history
• #searchinwikipedia
SHODAN (Sentient Hyper-Optimized Data Access Network) is a fictional artificial
intelligence and the main antagonist of the cyberpunk-horror themed action role-
playing video games System Shock and System Shock 2.
• Developed by John Matherly (@achillean)and launched in 2009 but conceived
the idea in 2003.
• Search for computers based on software, geography, operating system, IP
address and more.
#What is SHODAN?
• Typical search engines crawl for data on web pages and then index
it for searching
• SHODAN interrogates ports and grabs the resulting banners, then
indexes the banners (rather than the web content) for searching
• Rather than to locate specific content on a particular search term,
SHODAN is designed to help the user find specific nodes
(desktops, servers, routers, switches, etc.) with specific content in
their banners
• Optimizing search results requires some basic knowledge of
banners
#What is SHODAN? (2)
• Raw Search Engine used for scanning devices that are connected to Internet.
• Some excerpts
By @achillean on Reddit.
The 2 main purposes of Shodan are:
Security research/ Penetration testing
Business/ Market intelligence
• If you want to find out how many vulnerable embedded web servers there are, use
Shodan.
• If you want to find out which countries have the most home automation systems,
use Shodan.
• If you want to see which company has the biggest presence in a region for a type of
software (apache vs nginx in China?), you can use Shodan.
#tools used by SHODAN
• Bulk searching and processing of SHODAN queries can be performed
using SHODAN Diggity (part of SearchDiggity, Bishop Fox's free search engine
attack tool suite).
• This free tool provides an easy-to-use scanning interface to the popular hacking
search engine via the SHODAN API.
• SHODAN Diggity comes equipped with convenient list of 167 search queries
ready in a pre-made dictionary file, known as the SHODAN Hacking Database
(SHDB).
• This dictionary helps target various technologies including webcams,
printers, VoIP devices, routers, switches, and even SCADA/Industrial Control
Systems (ICS) to name just a few
#search terms
• Unlike other Search Engines’s where we type a problem which is like a sentence,but in SHODAN we
use search terms.
• They may be device manufacturer ,model name,product ver., services.
• Some search terms are:
 Dir-60x
 Cisco-ios 200
 Netgear
 IIS x.0
 Zhone SLMS
 Default+admin
 Raspberry
 Raspbian x.0 and many more..
#Operations
Search:
 Search terms are entered into a text box.
 Quotation marks can narrow a search.
 Boolean operators + and – can be used to include and exclude query terms (+ is implicit
default).
Login:
 Create and login using a SHODAN account; or
 Login using one of several other options (Google, Twitter, Yahoo, AOL, Facebook, OpenID
 Login is not required, but country and net filters are not available unless you login
 Export requires you to be logged in
Filters:
 Country: Filters results by two letter country code
 Hostname: Filters results by specified text in the hostname or domain
 Net: Filter results by a specific IP range or subnet
 OS: Search for specific operating systems
 Port: Narrow the search for specific services
 State/Postal Code: Search with the State or Postal Code.
#Operations (2)
Hostname Filter:
 Search results can be filtered using any portion of a hostname or domain name
 Ex: “apache hostname:.nist.gov” Find “apache” servers in the .nist.gov domain
Net/OS Filter:
 The net filter allows you to refine your searches by IP/CIDR notation.
 The OS filter allows you to refine searches by operating system
Port Filter:
 SHODAN can filter your search results by port
 More ports/services coming (send requests to the developer via Twitter).
Export:
 SHODAN lets you export up to 1,000 results per credit in XML format
 Credits can be purchased online
 Sample data export file is available
#Products
SHODAN has many projects under it, which is started by many people and contributed
code to the “GitHub” .
#Demo Time

More Related Content

PPTX
Shodan- That Device Search Engine
PDF
Shodan
 
PPTX
Playing with shodan
PDF
Searching Shodan For Fun And Profit
PPTX
SHODAN search Engine
PDF
Shodan Search Engine: Amphion Forum San Francisco
PDF
SHODAN- Defcon 18-schearer-shodan
PDF
What is shodan
Shodan- That Device Search Engine
Shodan
 
Playing with shodan
Searching Shodan For Fun And Profit
SHODAN search Engine
Shodan Search Engine: Amphion Forum San Francisco
SHODAN- Defcon 18-schearer-shodan
What is shodan

Viewers also liked (20)

PPT
Whats app forensic
PPTX
IS3101 Tutorial Task 2
 
PDF
Guia definitiva de shodan
PDF
wp-us-cities-exposed
PDF
Investor alert—investment scams exploit immigrant investor program
PPTX
Security News Bytes
PDF
z/OS Through V2R1Communications Server Performance Functions Update
DOC
SAmador CV
PPTX
Example problems Binomial Multiplication
DOC
So you want to retire in florida 1997 far
PPTX
Internet safety presentation
PPTX
Ted talk newest
PPTX
Example problems
PPTX
Mobile application security 101
PPTX
Pengenalan Pillow Lava di Berbah,Sleman,Yogyakarta
DOC
Buying a business in florida
PDF
Heartbleed by-danish amber
PPTX
Example problems Binomials
PPTX
UGA Guest Lecture: Social Media 101
Whats app forensic
IS3101 Tutorial Task 2
 
Guia definitiva de shodan
wp-us-cities-exposed
Investor alert—investment scams exploit immigrant investor program
Security News Bytes
z/OS Through V2R1Communications Server Performance Functions Update
SAmador CV
Example problems Binomial Multiplication
So you want to retire in florida 1997 far
Internet safety presentation
Ted talk newest
Example problems
Mobile application security 101
Pengenalan Pillow Lava di Berbah,Sleman,Yogyakarta
Buying a business in florida
Heartbleed by-danish amber
Example problems Binomials
UGA Guest Lecture: Social Media 101
Ad

Similar to Null HYD Playing with shodan null (20)

PPTX
shodan.pptx
PDF
Exploring the Potential of Shodan From Networking to Cybercrime.pdf
PPTX
Introduction to shodan
PPTX
Automated tools for penetration testing
PPTX
The Potential of the Hacker's Search Engine
PPTX
what is shodan a full presentation pptx
PPTX
Tools for Open Source Intelligence (OSINT)
PDF
Laura Garcia - Shodan API and Coding Skills [rooted2019]
PPTX
Country domination - Causing chaos and wrecking havoc
PPTX
osint - open source Intelligence
PDF
Owasp modern information gathering
 
PDF
10th SANS ICS Security Summit Project SHINE Presentation
PDF
OSINT for Attack and Defense
PPTX
PDF
OSINT: Open Source Intelligence - Rohan Braganza
PPTX
Reconnaissance - For pentesting and user awareness
PPTX
Shmoocon XV - Analyzing Shodan Images with Optical Character Recognition
PDF
Tenacious Diggity - Skinny Dippin in a Sea of Bing
PDF
technical-information-gathering-slides.pdf
PDF
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
shodan.pptx
Exploring the Potential of Shodan From Networking to Cybercrime.pdf
Introduction to shodan
Automated tools for penetration testing
The Potential of the Hacker's Search Engine
what is shodan a full presentation pptx
Tools for Open Source Intelligence (OSINT)
Laura Garcia - Shodan API and Coding Skills [rooted2019]
Country domination - Causing chaos and wrecking havoc
osint - open source Intelligence
Owasp modern information gathering
 
10th SANS ICS Security Summit Project SHINE Presentation
OSINT for Attack and Defense
OSINT: Open Source Intelligence - Rohan Braganza
Reconnaissance - For pentesting and user awareness
Shmoocon XV - Analyzing Shodan Images with Optical Character Recognition
Tenacious Diggity - Skinny Dippin in a Sea of Bing
technical-information-gathering-slides.pdf
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
Ad

More from Raghunath G (18)

PPSX
Securitynewsbytes
PPTX
Seh based exploitation
PPSX
Securitynewsbytes april2015-150418153901-conversion-gate01
PDF
Raspberry pi 2
PPTX
Analysis of malicious pdf
PPTX
Is iso 27001, an answer to security
PDF
Null HYD VRTDOS
PPTX
Metasploit
PPTX
Newsbytes_NULLHYD_Dec
PPT
Null dec 2014
PDF
Null July - OWTF - Bharadwaj Machiraju
PDF
Security News Bytes
PPTX
Decoy documents
PDF
Spear phishing attacks-by-hari_krishna
PDF
Social engineering by-rakesh-nagekar
PDF
Netcat 101 by-mahesh-beema
PDF
Xss 101 by-sai-shanthan
PDF
The art of_firewalking-by-sujay
Securitynewsbytes
Seh based exploitation
Securitynewsbytes april2015-150418153901-conversion-gate01
Raspberry pi 2
Analysis of malicious pdf
Is iso 27001, an answer to security
Null HYD VRTDOS
Metasploit
Newsbytes_NULLHYD_Dec
Null dec 2014
Null July - OWTF - Bharadwaj Machiraju
Security News Bytes
Decoy documents
Spear phishing attacks-by-hari_krishna
Social engineering by-rakesh-nagekar
Netcat 101 by-mahesh-beema
Xss 101 by-sai-shanthan
The art of_firewalking-by-sujay

Recently uploaded (20)

PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
01-Introduction-to-Information-Management.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Computing-Curriculum for Schools in Ghana
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
VCE English Exam - Section C Student Revision Booklet
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Sports Quiz easy sports quiz sports quiz
Insiders guide to clinical Medicine.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Final Presentation General Medicine 03-08-2024.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
01-Introduction-to-Information-Management.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
O7-L3 Supply Chain Operations - ICLT Program
Pharmacology of Heart Failure /Pharmacotherapy of CHF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Computing-Curriculum for Schools in Ghana
GDM (1) (1).pptx small presentation for students
human mycosis Human fungal infections are called human mycosis..pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Complications of Minimal Access Surgery at WLH
Supply Chain Operations Speaking Notes -ICLT Program
VCE English Exam - Section C Student Revision Booklet

Null HYD Playing with shodan null

  • 1. Playing with SHODAN Scan,Try,Pwn!! *The presenter or NULL-Hyd is not responsible for you actions and abuse of the Cyber Securit
  • 2. #about me • I’m U.M.K. Dikshit 21yr Coder, Hacker and student. • Microsoft Certified and World Finalist for NASA Space Apps 2014. • Selected for SpaceX Project by NASA. • Volunteer for Mozilla Firefox,CFI and many more… • Tech enthusiast, Gaming freak and books lover. fb.me/kalyan.dikshit| @dikshit_umk | dikshitrocks93@gmail.com
  • 3. #Agenda • History of SHODAN • What is SHODAN? • Tools used by SHODAN • Search terms • Basic Operations by SHODAN
  • 4. #history • #searchinwikipedia SHODAN (Sentient Hyper-Optimized Data Access Network) is a fictional artificial intelligence and the main antagonist of the cyberpunk-horror themed action role- playing video games System Shock and System Shock 2. • Developed by John Matherly (@achillean)and launched in 2009 but conceived the idea in 2003. • Search for computers based on software, geography, operating system, IP address and more.
  • 5. #What is SHODAN? • Typical search engines crawl for data on web pages and then index it for searching • SHODAN interrogates ports and grabs the resulting banners, then indexes the banners (rather than the web content) for searching • Rather than to locate specific content on a particular search term, SHODAN is designed to help the user find specific nodes (desktops, servers, routers, switches, etc.) with specific content in their banners • Optimizing search results requires some basic knowledge of banners
  • 6. #What is SHODAN? (2) • Raw Search Engine used for scanning devices that are connected to Internet. • Some excerpts By @achillean on Reddit. The 2 main purposes of Shodan are: Security research/ Penetration testing Business/ Market intelligence • If you want to find out how many vulnerable embedded web servers there are, use Shodan. • If you want to find out which countries have the most home automation systems, use Shodan. • If you want to see which company has the biggest presence in a region for a type of software (apache vs nginx in China?), you can use Shodan.
  • 7. #tools used by SHODAN • Bulk searching and processing of SHODAN queries can be performed using SHODAN Diggity (part of SearchDiggity, Bishop Fox's free search engine attack tool suite). • This free tool provides an easy-to-use scanning interface to the popular hacking search engine via the SHODAN API. • SHODAN Diggity comes equipped with convenient list of 167 search queries ready in a pre-made dictionary file, known as the SHODAN Hacking Database (SHDB). • This dictionary helps target various technologies including webcams, printers, VoIP devices, routers, switches, and even SCADA/Industrial Control Systems (ICS) to name just a few
  • 8. #search terms • Unlike other Search Engines’s where we type a problem which is like a sentence,but in SHODAN we use search terms. • They may be device manufacturer ,model name,product ver., services. • Some search terms are:  Dir-60x  Cisco-ios 200  Netgear  IIS x.0  Zhone SLMS  Default+admin  Raspberry  Raspbian x.0 and many more..
  • 9. #Operations Search:  Search terms are entered into a text box.  Quotation marks can narrow a search.  Boolean operators + and – can be used to include and exclude query terms (+ is implicit default). Login:  Create and login using a SHODAN account; or  Login using one of several other options (Google, Twitter, Yahoo, AOL, Facebook, OpenID  Login is not required, but country and net filters are not available unless you login  Export requires you to be logged in Filters:  Country: Filters results by two letter country code  Hostname: Filters results by specified text in the hostname or domain  Net: Filter results by a specific IP range or subnet  OS: Search for specific operating systems  Port: Narrow the search for specific services  State/Postal Code: Search with the State or Postal Code.
  • 10. #Operations (2) Hostname Filter:  Search results can be filtered using any portion of a hostname or domain name  Ex: “apache hostname:.nist.gov” Find “apache” servers in the .nist.gov domain Net/OS Filter:  The net filter allows you to refine your searches by IP/CIDR notation.  The OS filter allows you to refine searches by operating system Port Filter:  SHODAN can filter your search results by port  More ports/services coming (send requests to the developer via Twitter). Export:  SHODAN lets you export up to 1,000 results per credit in XML format  Credits can be purchased online  Sample data export file is available
  • 11. #Products SHODAN has many projects under it, which is started by many people and contributed code to the “GitHub” .