- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 174字
- 2021-07-02 21:04:14
Shodan and censys.io
In an ocean of vulnerable hosts, where to find it? Often, attackers utilize existing vulnerabilities to gain access to the system without much effort, so one of the easiest ways to do so is to search in Shodan. Shodan is one of the craziest search engines that lets anyone on the internet find devices connected to the internet using a variety of filters. It can be accessed by visiting https://www.shodan.io/. This is one of the selected websites consulted for information around the globe. If the name of a company is searched for, it will provide any relevant information that it has in its database, such as IP address, port numbers, and the service that was running.
The following is a sample screenshot from https://www.shodan.io/ for hosts that are running IIS 5.0:

Similar to Shodan attackers, now, we can also utilize the scans.io API for relevant information gathering or Censys.io, which can provide more information about IPv4 hosts, websites, certifications, and other stored information. The following screenshot provides information about Microsoft.com:

- 基于Java技術的Web應用開發
- Reactive Programming With Java 9
- Effective Python Penetration Testing
- Salesforce Reporting and Dashboards
- Tableau 10 Bootcamp
- ServiceNow:Building Powerful Workflows
- Visual FoxPro 6.0程序設計
- Python Web自動化測試設計與實現
- ASP.NET Core 2 High Performance(Second Edition)
- HTML5+CSS+JavaScript深入學習實錄
- MySQL數據庫應用技術及實戰
- Testing Practitioner Handbook
- Learning Unity Physics
- HTML 5與CSS 3權威指南(第3版·下冊)
- Mastering Predictive Analytics with R(Second Edition)