Hack only with Search Engines: A Beginner’s hand book

#Exploring the World of Internet-Connected Devices

Introduction: Unlocking the Secrets of Device Search Engines

In today’s interconnected world, the vast array of internet-connected devices presents both opportunities and challenges. While these devices enhance convenience and productivity, they also pose security risks if not properly secured. Device search engines have emerged as powerful tools to explore and monitor these devices, providing valuable insights for cybersecurity professionals, researchers, and law enforcement agencies. In this beginner’s guide, we delve into the world of device search engines, exploring their functionality, applications, and ethical considerations.

Understanding Device Search Engines: How They Work

Device search engines operate by crawling the internet for publicly accessible devices and network components. These search engines index information about devices such as computers, printers, video recorders, and NAS servers, making it possible to search for specific devices or vulnerabilities. While the primary users of these systems are cybersecurity professionals and researchers, they are also utilized by law enforcement agencies and, Hackers.

Exploring the Top Device Search Engines

Shodan: The Pioneer in Device Search

Shodan is hailed as the world’s first search engine for internet-connected devices. Its user-friendly interface allows users to search for devices based on various parameters such as city, country, operating system, and open ports. Shodan’s extensive database and powerful search capabilities make it a valuable tool for discovering exposed devices and potential vulnerabilities.

Shodan have it’s own command line interface. Also there is interesting tool using Shodan Api called SearchDiggity.

Example of use:
Find Apache servers in New York:

apache city:"New York"

Find Nginx servers in Germany:

nginx country:"DE"

Find Cisco devices on a particular subnet:

cisco net:"216.219.143.0/24"

The basic search filters you can use:

  • city: find devices in a particular city
  • country: find devices in a particular country
  • geo: you can pass it coordinates
  • hostname: find values that match the hostname
  • net: search based on an IP or /x CIDR
  • os: search based on operating system
  • port: find particular ports that are open
  • before/after: find results within a timeframe

Censys: Discover, Monitor, Analyze

Censys is a comprehensive platform designed to help information security practitioners discover, monitor, and analyze devices accessible from the internet. With its intuitive search interface, users can search for hosts based on specific criteria such as HTTP server headers, protocols, and geographic location. Censys provides valuable insights into the internet’s evolving landscape, enabling proactive security measures.

Example of use:
Search for hosts with the HTTP Server Header “Apache” in Germany

80.http.get.headers.server: Apache and location.country_code: DE
location.country_code: DE and protocols: ("23/telnet" or "21/ftp")

ZoomEye: Cyberspace Search Engine

ZoomEye is a versatile cyberspace search engine that records information about devices, websites, services, and components. Its extensive search filters allow users to narrow down results based on application, location, port, operating system, and more. ZoomEye’s intuitive interface and robust search capabilities make it a valuable asset for cybersecurity professionals seeking to monitor and analyze internet-connected assets.

Example of use:
Search by application:

app: application name
Search by location:
country: country code (for example: UK, IT, ES, FR, CN, JP..)
city: name of city

Search by port:
port: port number

Search by OS:
os: name of the operating system (for example os:linux)

Search by service:
service: service name

Search by hostname:
hostname: hostname (for example hostname:google.com)

Search by IP Address:
ip: ip address (for example ip:8.8.8.8)

Search by CIDR:
cidr: cidr segment (for example cidr:8.8.8.8/24)

Search by site:
site: domain name (for example site:google.com)

Search by HTTP Headers:
headers: headers in HTTP request

Search by SEO keywords:
keywords: keywords defined inside <meta name="Keywords">

Search by description:
desc: description inside <meta name="description">

Search by title:
title: title inside <title>

FoFa: The Chinese Equivalent of Shodan

FoFa is often referred to as the Chinese equivalent of Shodan and offers similar functionality with a focus on the Chinese market. Its search filters allow users to refine results based on titles, headers, IP addresses, protocols, and more. FoFa’s client version provides additional features and flexibility for advanced users seeking specific information about internet-connected devices.

Example of use:
Search for websites with specific titles:

title="abc"
title="abc"
header="abc"
body="abc"
domain="qq.com"
host=".gov.cn"
port="443"
ip="1.1.1.1"
protocol="https"
city="Beijing"
region="Zhejiang"
country="CN"
cert="google.com"
banner=users && protocol=ftp
type=service
os=windows
server=="Microsoft-IIS/7.5"

IVRE: Open-Source Network Reconnaissance

IVRE is an open-source framework for network reconnaissance, leveraging well-known tools such as Nmap, Zmap, Masscan, Bro, and p0f. IVRE gathers network intelligence, stores it in a MongoDB database, and provides tools for analysis. While IVRE requires installation and configuration, it offers unparalleled flexibility and customization for users seeking comprehensive network reconnaissance capabilities.

Example of use:
This tool is not available to the public. You need to install, configure, and gather data on your own before use.

Ethical Considerations and Best Practices

While device search engines offer valuable insights into internet-connected devices, it’s essential to use them responsibly and ethically. Avoid accessing devices without authorization or exploiting vulnerabilities for malicious purposes. Instead, focus on leveraging these tools to identify and mitigate security risks, enhance network visibility, and promote cybersecurity awareness.

Conclusion: Navigating the World of Device Search Engines

As the internet continues to evolve, device search engines play a crucial role in monitoring, analyzing, and securing internet-connected devices. By understanding how these search engines work and employing best practices, cybersecurity professionals can stay ahead of emerging threats and protect critical assets. Whether you’re a seasoned researcher or a novice enthusiast, exploring the world of device search engines offers endless possibilities for learning and discovery.