Shodan Cheat Sheet: Keep IoT in your Pocket
Shodan Dorks that will help you to use the Shodan search engine like a pro. It will help you to get targeted results easily.
It is very different than content search engines like Google, Bing, or Yahoo. This type of search engines crawl for data on web pages and then index it for searching while Shodan interrogates ports and grabs the resulting banners, then indexes the banners for searching.
If you are in the Cybersecurity field, you should well known about the Shodan search engine. Shodan is an IoT search engine that helps find specific types of computers (routers, webcams, servers, etc.) on the internet using a variety of filters. It’s a great resource to provide passive reconnaissance on a target or as a measuring tool.
Just open https://shodan.io/ and start firing the commands from this shodan cheat sheet.
Shodan Cheat Sheet
Server:
Find the devices or servers that contain a specific server header flag. You can research for vulnerable servers.
server: "apache 2.2.3"
or you can use directly the flag
apache 2.2.3
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/server-1024x490.png)
hostname:
Find devices with specific hostname worldwide. The hostname is a label that’s assigned to a device connected to a network that is used to spot the device in various kinds of transmission, like World Wide Web. You can use multiple filters altogether included in the shodan cheat sheet to narrow your search.
server: "apache" hostname:"google"
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/hostname-1024x497.png)
net:
Find devices or machines based on an IP address or /x CIDR. This filter can also be used to find the IP range or certain IP address and subnet mask.
net:34.98.0.0/16
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/net-1024x483.png)
os:
Find devices based on the operating system. You can find all the devices that have some specific operating systems. It will help penetration testers to find for vulnerable machines with specific operating system filter.
os:"windows xp"
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/os-1024x463.png)
port:
Find devices based on open ports. “port” filter will allow narrows the search the machines with some specific open ports.
proftpd port:21
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/proftpd-1024x500.png)
org:
This filter will allows you to locate the devices of any specific organizations.
org:"Google"
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/org-1024x498.png)
You can use multiple filters shown in the shodan cheat sheet with org filter to narrow the search or sort the results among the millions.
city:
Find devices in a particular city. For example, if you want to narrow the search for Mumbai city only then you can use,
city:"Mumbai"
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/city-1024x492.png)
country:
Find devices in a particular country. For example, if you want to narrow the search for India only then you can use,
country:"IN"
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/country-1024x490.png)
geo:
Find devices by giving geographical coordinates according to certain longitudes and latitudes that are within a given radius.
geo:"48.1667,-100.1667"
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/geo-cordinates-1024x497.png)
before/after:
The ‘after’ and ‘before’ filter helps you to devices after and before a particular date.
The format allowed is dd/mm/yyyy
nginx before:13/04/2020 after:13/04/2018
has_screenshot
This filter will only returns results that have a screenshot available.
has_screenshot:true city:"George Town"
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/has_screenshot-1024x494.png)
Wifi Passwords:
Helps to find the cleartext wifi passwords in Shodan.
html:"def_wirelesspassword"
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/def_wirelesspassword_1-1024x492.png)
Surveillance Cams:
Get the data for surveillance cams with username: admin and password: password
NETSurveillance uc-httpd
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/surveillance-webcam-1024x492.png)
Or you can also use below command
Android Webcam Server
Citrix:
Find Citrix Gateway.
title:"citrix gateway"
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/citrix_gateway-1024x495.png)
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/citrix_gateway-2-1024x334.png)
Windows RDP Password:
But may contain secondary windows auth
"\x03\x00\x00\x0b\x06\xd0\x00\x00\x124\x00"
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/Windows-RDP-Password-1024x497.png)
Misconfigured WordPress Sites:
The wp-config.php if accessed can give out the database credentials.
http.html:"* The wp-config.php creation script uses this file"
You can access the main wordpress configuration file and capture sensitive information like credentials or AUTH_KEY of misconfigured site.
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/misconfigured_wordpress_sites-1024x495.png)
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/misconfigured_wordpress_sites-2-1024x385.png)
Mongo DB servers:
This dork filter will give you info about mongo DB servers.
"MongoDB Server Information" port:27017 -authentication
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/mongoDB-1024x498.png)
FTP servers allowing anonymous access:
Get the data for fully Anonymous access.
"220" "230 Login successful." port:21
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/anon_access-1024x496.png)
Jenkins:
Find for all Jenkins Unrestricted Dashboard
x-jenkins 200
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/x-jenkins-1024x490.png)
Open ATM:
This filter will allow for ATM Access availability.
NCR Port:"161"
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/open_atm-ncr-1024x489.png)
Android Root Bridge:
Find android root bridges with port 5555.
"Android Debug Bridge" "Device" port:5555
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/android_debug_bridge-1024x475.png)
Telnet Access:
Find devices that required password for telnet access.
port:23 console gateway
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/Telnet_Access-1024x492.png)
Etherium Miners:
Shows the miners running ETH.
"ETH - Total speed"
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/Etherium_Miners-1024x491.png)
Shodan Command-Line Interface Cheat Sheet
The shodan command-line interface (CLI) is a command-line library for Shodan IoT search engine. You can install using this simple python’s pip command,
$ pip install shodan
Once the shodan tool is installed you need to initialize the environment variable with the private API key, you can get form shodan account settings.
$ shodan init PRIVATE_API_KEY
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Command line Interface(CLI) for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/api-key-get-1024x465.png)
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Command line Interface(CLI) for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/shodan-key-init.png)
Shodan CLI Cheat Sheet
you can run just shodan command to get the help. This is most popular command, will give you the full list of commands that can be used futher for recon process.
$ shodan
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Command line Interface(CLI) for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/shodan-main.png)
myip
This command will provide users public internet-facing ip address.
$ shodan myip
49.34.120.0
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Command line Interface(CLI) for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/myip.png)
host
Get the information about the host. You can get information like where it’s located, what ports are open, and which organization owns the IP.
$ shodan host shodan host 63.X.X.X
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Command line Interface(CLI) for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/host-1024x473.png)
count
It will Returns the number of results for a search query.
$ shodan count Apache Tomcat/8.5.13
106
$ shodan port:22 country:IN
348612
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Command line Interface(CLI) for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/count.png)
search
Shodan search command lets you search Shodan and view the results in a terminal-friendly and user friendly way. By default it will display data of fields in specific format of (the IP, port, hostnames and data). You can use the –fields parameter to specify the fields you want to view the result in.
*Note: You need “Shodan Pro” to use this command.
$ shodan search --fields ip_str,port,org Apache Tomcat/8.5.13
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Command line Interface(CLI) for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/search-1.png)
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Command line Interface(CLI) for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/search-2.png)
download
Search for Shodan results and download the results into a file that is JSON formated banner lines.
By default the limit of results is set to 1,000 results, if you want to download more than that then you can use –limit flag with your query.
Shodan command it lets you save the results in file and you can process them afterwards using the parse command.
$ shodan download Apache Tomcat/8.5.13
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Command line Interface(CLI) for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/downlaod.png)
parse
You can use parse command to analyze a file that was generated using the download command. Shodan command line interface lets you filter out the fields that you’re interested in, convert the JSON to use defined format.
Use –fields flags to specify the fields you are interested in. Flag –separator can be used for specify the use defined separator between the fields specified.
$ shodan parse --fields ip_str,port,org --separator " - " Apache.json.gz
![Shodan Cheat Sheet: Keep IoT in your Pocket Shodan Cheat Sheet & Shodan Command line Interface(CLI) for IoT Search Engine](https://thedarksource.com/wp-content/uploads/2020/08/parse.png)
*Note: You need “Shodan Pro” to use some of above shodan command line commands.
Final Words,
You can use all these all shodan filters for your recon research and penetration testing works. This filter can be used as advanced filters by using combined multiple filters together.
No comments:
Post a Comment