eCPPTv2-PTP-Notes
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 📝eCPPTv2 / PTP - Notes
  • 1️⃣1 - ​System Security
    • 1.1 Architecture Foundamentals
    • 1.2 Assemblers and Tools
    • 1.3 Buffer Overflow
    • 1.4 Cryptography
    • 1.5 Malware
    • 1.6 Shellcoding
  • 2️⃣2 - Network Security
    • 2.1 System/Host Based Attacks
      • 2.1.1 Windows Vulnerabilities
    • 2.2 Network Based Attacks
    • 2.3 The Metasploit Framework (MSF)
      • MSF Introduction
      • Information Gathering & Enumeration
      • Vulnerability Scanning
      • Client-Side Attacks
      • Post Exploitation
      • Armitage
    • 2.4 Exploitation
    • 2.5 - Post Expolitation / Pivoting
      • 2.5.1 Pivoting Guidelines
      • 2.5.2 Pivoting Example (3 Targets)
    • 2.6 Social Engineering
  • 3️⃣3 - PowerShell for PT
    • 3.1 PowerShell
  • 4️⃣4 - Linux Exploitation
    • 4.1 Linux Vulnerabilities
    • 4.2 Linux Exploitation
    • 4.3 Linux Post-Exploitation
    • 4.4 Linux Privilege Escalation
      • 4.4.1 Kernel Exploitation
      • 4.4.2 SUID Exploitation
      • 4.4.3 CronJobs
  • 5️⃣5 - Web App Security
    • 5.1 - Web App Concepts
      • 5.1.1 HTTP/S Protocol
      • 5.1.2 Encoding
      • 5.1.3 Same Origin
      • 5.1.4 Cookies
      • 5.1.5 Session
      • 5.1.6 Web App Proxies
    • 5.2 - Information Gathering
      • 5.2.1 Gathering Information on Your Targets
      • 5.2.2 Infrastructure
      • 5.2.3 Fingerprinting Frameworks and Applications
      • 5.2.4 Fingerprinting Custom Applications
      • 5.2.5 Enumerating Resources
      • 5.2.6 Information Disclosure Through Misconfiguration
      • 5.2.7 Google Hacking
      • 5.2.8 Shodan HQ
    • 5.3 - Cross Site Scripting
      • 5.3.1 XSS Anatomy
      • 5.3.2 Reflected XSS
      • 5.3.3 Stored XSS
      • 5.3.4 DOM-Based XSS
      • 5.3.5 Identifying & Exploiting XSS with XSSer
    • 5.4 - SQL Injection
      • 5.4.1 Introduction to SQL Injection
      • 5.4.2 Finding SQL Injection
      • 5.4.3 Exploiting In-Band SQL Injection
      • 5.4.4 Exploiting Error-Based SQL Injection
      • 5.4.5 Exploiting Blind SQL Injection
      • 5.4.6 SQLMap
      • 5.4.7 Mitigation Strategies
      • 5.4.8 From SQLi to Server Takeover
    • 5.5 - Other Common Web Attacks
      • 5.5.1 Session Attacks
      • 5.5.2 CSRF
  • 6️⃣6 - ​Wi-Fi Security
    • 6.1 Traffic Analysis
  • 7️⃣7 - ​Metasploit & Ruby
    • 7.1 Metasploit
  • 📄Report
    • How to write a PT Report
  • 🛣️RoadMap & My Experience
  • 📔eCPPT Cheat Sheet
Powered by GitBook
On this page
  • Shodan HQ
  • Additional Tips
  1. 5 - Web App Security
  2. 5.2 - Information Gathering

5.2.8 Shodan HQ

Shodan HQ

Shodan HQ is a specialized search engine that differs from traditional ones like Google, Yahoo, or Bing. Instead of crawling web pages, Shodan scans the entire Internet and collects information from banners by interrogating ports. This approach allows it to focus on various protocols, including HTTP(S), SSH, SNMP, MySQL/MongoDB, RDP, FTP, Telnet, and more.

Shodan Search Capabilities

Shodan can be utilized to:

  • Identify devices with default usernames and passwords.

  • View the configuration of a device.

  • Detect server versions and much more.

Boolean Operators and Filters

Shodan supports Boolean operators and filters, enabling users to refine search results. Some useful filters include:

  • [before/after] day/month/year: Search for data collected before or after a specific date.

  • hostname: Filter results for hosts that contain a specific value in their hostname.

  • port: Narrow the search for specific services.

  • OS: Search for devices with a specific operating system.

Example Searches

Suppose you want to find all devices running Apache in Italy (IT):

shCopy codeapache country:IT

This search provides a list of matching devices, and clicking on "Details" offers more in-depth information about a particular host.

Additional Tips

  • Shodan requires an account for advanced features and filters.

  • Experiment with refining searches based on hostname, ports, and other criteria.

  • Explore the tool to grasp its full capabilities and potential applications.

Shodan HQ serves as a powerful resource for cybersecurity professionals and researchers, offering unique insights into the online landscape by focusing on device banners and protocols.

Previous5.2.7 Google HackingNext5.3 - Cross Site Scripting

Last updated 1 year ago

5️⃣