-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathshodan.html
More file actions
75 lines (69 loc) · 3.21 KB
/
shodan.html
File metadata and controls
75 lines (69 loc) · 3.21 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
<html>
<head>
<title>Using Shodan</title>
<link rel='stylesheet' style='text/css' href='css/skeleton.css'/>
<link rel='stylesheet' style='text/css' href='css/skeleton.css' media='print'/>
<script src='js/jquery.js'></script>
<script src='js/main.js'></script>
</head>
<body>
<div class="container">
<div id='header'>
<div id='header_info'>
<center><h1>Cyberpaths</h1></center>
</div>
</div>
<div id='site_body'>
<div id='actual_content'>
<center><h5>- Introduction to Shodan -</h5></center><br><br>
<div class='title_bg'><h3>Prerequisites</h3></div><hr>
<div class='subcontent'>
<ol class='instructions'>
<li> Read the following blog about shodan <a href=https://danielmiessler.com/study/shodan/ target="_blank"> here</a>.</li>
<li> Understand ports, services, and IoT. </li>
</ol>
</div>
<br><div class='title_bg'><h3>Instructions</h3></div><hr>
<div class='subcontent'>
<ol>
<center><img class="u-max-full-width" src="img/screenshots/shodan.jpg"></center><br>
<li><b>Find all the machines that listen to port 80.</b>
<ul>
<li>What type of machines are these?</li>
<li>Should port 80 be open?</li>
<li>Paste the search string in your report.</li>
</ul>
</li>
<li><b>Find all the Apache servers located in your city. Browse some of these sites. Are there any businesses that you know?
</b><ul>
<li>Click on one of the results details. Read the header and describe what information it gives. Try to explain in your own words this information. Look up any words that you may not understand.</li>
<li>Think as a hacker: find information in the header that could be taken advantage of. For example, what version of software, what encryption algorithm is used etc.?</li>
<li>Paste the search string in your report.</li>
</ul>
</li>
<li><b>Look for an Amazon Echo.</b>
<ul>
<li>Click on one of the links. What kind of site is this and how can a malicious actor use it?
<li>THow should the owners if this site and devices protect themselves?</li>
<li>Paste the search string in your report.</li>
</ul>
</li>
<li><b>Search for electric grid equipment in your city.</b>
<ul>
<li>Hint1: you may search for wind, solar, or other devices that produce energy.</li>
<li>Hint2: look for PLC and SCADA. Understand what these devices are and how you can search and connect to them.</li>
<li>Why is it bad for electric grid equipment to be searchable?</li>
<li>Paste the search string in your report.</li>
</ul>
</li>
<li><b>Search for game servers of your favorite video game.</b>
<ul>
<li>Paste the search string in your report.</li>
</ul>
</li>
</div>
</div>
</div>
</div>
</body>
</html>