- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 174字
- 2021-07-02 21:04:14
Shodan and censys.io
In an ocean of vulnerable hosts, where to find it? Often, attackers utilize existing vulnerabilities to gain access to the system without much effort, so one of the easiest ways to do so is to search in Shodan. Shodan is one of the craziest search engines that lets anyone on the internet find devices connected to the internet using a variety of filters. It can be accessed by visiting https://www.shodan.io/. This is one of the selected websites consulted for information around the globe. If the name of a company is searched for, it will provide any relevant information that it has in its database, such as IP address, port numbers, and the service that was running.
The following is a sample screenshot from https://www.shodan.io/ for hosts that are running IIS 5.0:

Similar to Shodan attackers, now, we can also utilize the scans.io API for relevant information gathering or Censys.io, which can provide more information about IPv4 hosts, websites, certifications, and other stored information. The following screenshot provides information about Microsoft.com:

- Visual FoxPro程序設計教程
- Lua程序設計(第4版)
- Nginx Essentials
- INSTANT Django 1.5 Application Development Starter
- Unity 2D Game Development Cookbook
- PLC應用技術(三菱FX2N系列)
- Unity 3D腳本編程:使用C#語言開發跨平臺游戲
- Go語言底層原理剖析
- Emotional Intelligence for IT Professionals
- PHP+MySQL動態網站開發從入門到精通(視頻教學版)
- UML軟件建模
- Mobile Forensics:Advanced Investigative Strategies
- Spring Boot從入門到實戰
- PHP動態網站開發實踐教程
- 計算機程序的構造和解釋(JavaScript版)