Shodan.io — TryHackme

Amol Rangari
2 min readApr 28, 2022

--

The device enumeration

Hello amazing hackers, I came up with another cool blog based on enumeration. So without wasting any time let’s get into the blog.

Shodan is used to enumerate the devices which are publicly available on the internet. Then it is used to find vulnerabilities in a range of IP addresses by using the shodan monitor.

We can use Shodan Dorking which would be useful for content discovery.

How do we find Eternal Blue exploits on Shodan?

vuln:ms17–010

What is the top operating system for MYSQL servers in Google’s ASN?

5.6.40–84.0-log

What is the 2nd most popular country for MYSQL servers in Google’s ASN?

Netherlands

Under Google’s ASN, which is more popular for nginx, Hypertext Transfer Protocol or Hypertext Transfer Protocol with SSL?

Hypertext Transfer Protocol

Under Google’s ASN, what is the most popular city?

Mountain View

Under Google’s ASN in Los Angeles, what is the top operating system according to Shodan?

PAN-OS

Using the top Webcam search from the explore page, does Google’s ASN have any webcams? Yay / nay

Nay

By Shodan monitor is used to monitor your own devices any vulnerability or open ports and always keep track of the information whether your own information gets leaked or not. But this feature is only available for premium users.

Notable examples include:

The Best Open Ports (most common)

The Most Dangerous Vulnerabilities (stuff we need to deal with right away)

Ports of Interest (unusual ports that are open)

Possibilities for Vulnerabilities

Notable Intellectual Property (things we should investigate in more depth).

The interesting part is that you can use this to monitor other people’s networks. You can save a list of IPs for bug bounties, and Shodan will email you if it finds any problems.

What URL takes you to Shodan Monitor?

https://monitor.shodan.io/dashboard

Shodan Dorks is used to finding useful information from websites.

What dork lets us find PCs infected by Ransomware?

has_screenshot: true encrypted attention

--

--

Amol Rangari
Amol Rangari

Written by Amol Rangari

I am Cyber Security Expert, Security Researcher and bug hunter

No responses yet