Última atividade 1727326209

Revisão a0e548f0f0b7ba32e0e0657a9179681a3ca985d5

shodan-dorks.txt Bruto
1Shodan Dorks by twitter.com/lothos612
2Feel free to make suggestions
3
4Shodan Dorks
5Basic Shodan Filters
6city:
7Find devices in a particular city. city:"Bangalore"
8
9country:
10Find devices in a particular country. country:"IN"
11
12geo:
13Find devices by giving geographical coordinates. geo:"56.913055,118.250862"
14
15Location
16country:us country:ru country:de city:chicago
17
18hostname:
19Find devices matching the hostname. server: "gws" hostname:"google" hostname:example.com -hostname:subdomain.example.com hostname:example.com,example.org
20
21net:
22Find devices based on an IP address or /x CIDR. net:210.214.0.0/16
23
24Organization
25org:microsoft org:"United States Department"
26
27Autonomous System Number (ASN)
28asn:ASxxxx
29
30os:
31Find devices based on operating system. os:"windows 7"
32
33port:
34Find devices based on open ports. proftpd port:21
35
36before/after:
37Find devices before or after between a given time. apache after:22/02/2009 before:14/3/2010
38
39SSL/TLS Certificates
40Self signed certificates ssl.cert.issuer.cn:example.com ssl.cert.subject.cn:example.com
41
42Expired certificates ssl.cert.expired:true
43
44ssl.cert.subject.cn:example.com
45
46Device Type
47device:firewall device:router device:wap device:webcam device:media device:"broadband router" device:pbx device:printer device:switch device:storage device:specialized device:phone device:"voip" device:"voip phone" device:"voip adaptor" device:"load balancer" device:"print server" device:terminal device:remote device:telecom device:power device:proxy device:pda device:bridge
48
49Operating System
50os:"windows 7" os:"windows server 2012" os:"linux 3.x"
51
52Product
53product:apache product:nginx product:android product:chromecast
54
55Customer Premises Equipment (CPE)
56cpe:apple cpe:microsoft cpe:nginx cpe:cisco
57
58Server
59server: nginx server: apache server: microsoft server: cisco-ios
60
61ssh fingerprints
62dc:14:de:8e:d7:c1:15:43:23:82:25:81:d2:59:e8:c0
63
64Web
65Pulse Secure
66http.html:/dana-na
67
68PEM Certificates
69http.title:"Index of /" http.html:".pem"
70
71Tor / Dark Web sites
72onion-location
73
74Databases
75MySQL
76"product:MySQL" mysql port:"3306"
77
78MongoDB
79"product:MongoDB" mongodb port:27017
80
81Fully open MongoDBs
82"MongoDB Server Information { "metrics":" "Set-Cookie: mongo-express=" "200 OK" "MongoDB Server Information" port:27017 -authentication
83
84Kibana dashboards without authentication
85kibana content-legth:217
86
87elastic
88port:9200 json port:"9200" all:elastic port:"9200" all:"elastic indices"
89
90Memcached
91"product:Memcached"
92
93CouchDB
94"product:CouchDB" port:"5984"+Server: "CouchDB/2.1.0"
95
96PostgreSQL
97"port:5432 PostgreSQL"
98
99Riak
100"port:8087 Riak"
101
102Redis
103"product:Redis"
104
105Cassandra
106"product:Cassandra"
107
108Industrial Control Systems
109Samsung Electronic Billboards
110"Server: Prismview Player"
111
112Gas Station Pump Controllers
113"in-tank inventory" port:10001
114
115Fuel Pumps connected to internet:
116No auth required to access CLI terminal. "privileged command" GET
117
118Automatic License Plate Readers
119P372 "ANPR enabled"
120
121Traffic Light Controllers / Red Light Cameras
122mikrotik streetlight
123
124Voting Machines in the United States
125"voter system serial" country:US
126
127Open ATM:
128May allow for ATM Access availability NCR Port:"161"
129
130Telcos Running Cisco Lawful Intercept Wiretaps
131"Cisco IOS" "ADVIPSERVICESK9_LI-M"
132
133Prison Pay Phones
134"[2J[H Encartele Confidential"
135
136Tesla PowerPack Charging Status
137http.title:"Tesla PowerPack System" http.component:"d3" -ga3ca4f2
138
139Electric Vehicle Chargers
140"Server: gSOAP/2.8" "Content-Length: 583"
141
142Maritime Satellites
143Shodan made a pretty sweet Ship Tracker that maps ship locations in real time, too!
144
145"Cobham SATCOM" OR ("Sailor" "VSAT")
146
147Submarine Mission Control Dashboards
148title:"Slocum Fleet Mission Control"
149
150CAREL PlantVisor Refrigeration Units
151"Server: CarelDataServer" "200 Document follows"
152
153Nordex Wind Turbine Farms
154http.title:"Nordex Control" "Windows 2000 5.0 x86" "Jetty/3.1 (JSP 1.1; Servlet 2.2; java 1.6.0_14)"
155
156C4 Max Commercial Vehicle GPS Trackers
157"[1m[35mWelcome on console"
158
159DICOM Medical X-Ray Machines
160Secured by default, thankfully, but these 1,700+ machines still have no business being on the internet.
161
162"DICOM Server Response" port:104
163
164GaugeTech Electricity Meters
165"Server: EIG Embedded Web Server" "200 Document follows"
166
167Siemens Industrial Automation
168"Siemens, SIMATIC" port:161
169
170Siemens HVAC Controllers
171"Server: Microsoft-WinCE" "Content-Length: 12581"
172
173Door / Lock Access Controllers
174"HID VertX" port:4070
175
176Railroad Management
177"log off" "select the appropriate"
178
179Tesla Powerpack charging Status:
180Helps to find the charging status of tesla powerpack. http.title:"Tesla PowerPack System" http.component:"d3" -ga3ca4f2
181
182XZERES Wind Turbine
183title:"xzeres wind"
184
185PIPS Automated License Plate Reader
186"html:"PIPS Technology ALPR Processors""
187
188Modbus
189"port:502"
190
191Niagara Fox
192"port:1911,4911 product:Niagara"
193
194GE-SRTP
195"port:18245,18246 product:"general electric""
196
197MELSEC-Q
198"port:5006,5007 product:mitsubishi"
199
200CODESYS
201"port:2455 operating system"
202
203S7
204"port:102"
205
206BACnet
207"port:47808"
208
209HART-IP
210"port:5094 hart-ip"
211
212Omron FINS
213"port:9600 response code"
214
215IEC 60870-5-104
216"port:2404 asdu address"
217
218DNP3
219"port:20000 source address"
220
221EtherNet/IP
222"port:44818"
223
224PCWorx
225"port:1962 PLC"
226
227Crimson v3.0
228"port:789 product:"Red Lion Controls"
229
230ProConOS
231"port:20547 PLC"
232
233Remote Desktop
234Unprotected VNC
235"authentication disabled" port:5900,5901 "authentication disabled" "RFB 003.008"
236
237Windows RDP
23899.99% are secured by a secondary Windows login screen.
239
240"\x03\x00\x00\x0b\x06\xd0\x00\x00\x124\x00"
241
242C2 Infrastructure
243CobaltStrike Servers
244product:"cobalt strike team server" product:"Cobalt Strike Beacon" ssl.cert.serial:146473198 - default certificate serial number ssl.jarm:07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1 ssl:foren.zik
245
246Brute Ratel
247http.html_hash:-1957161625 product:"Brute Ratel C4"
248
249Covenant
250ssl:”Covenant” http.component:”Blazor”
251
252Metasploit
253ssl:"MetasploitSelfSignedCA"
254
255Network Infrastructure
256Hacked routers:
257Routers which got compromised hacked-router-help-sos
258
259Redis open instances
260product:"Redis key-value store"
261
262Citrix:
263Find Citrix Gateway. title:"citrix gateway"
264
265Weave Scope Dashboards
266Command-line access inside Kubernetes pods and Docker containers, and real-time visualization/monitoring of the entire infrastructure.
267
268title:"Weave Scope" http.favicon.hash:567176827
269
270Jenkins CI
271"X-Jenkins" "Set-Cookie: JSESSIONID" http.title:"Dashboard"
272
273Jenkins:
274Jenkins Unrestricted Dashboard x-jenkins 200
275
276Docker APIs
277"Docker Containers:" port:2375
278
279Docker Private Registries
280"Docker-Distribution-Api-Version: registry" "200 OK" -gitlab
281
282Pi-hole Open DNS Servers
283"dnsmasq-pi-hole" "Recursion: enabled"
284
285DNS Servers with recursion
286"port: 53" Recursion: Enabled
287
288Already Logged-In as root via Telnet
289"root@" port:23 -login -password -name -Session
290
291Telnet Access:
292NO password required for telnet access. port:23 console gateway
293
294Polycom video-conference system no-auth shell
295"polycom command shell"
296
297NPort serial-to-eth / MoCA devices without password
298nport -keyin port:23
299
300Android Root Bridges
301A tangential result of Google's sloppy fractured update approach. 🙄 More information here.
302
303"Android Debug Bridge" "Device" port:5555
304
305Lantronix Serial-to-Ethernet Adapter Leaking Telnet Passwords
306Lantronix password port:30718 -secured
307
308Citrix Virtual Apps
309"Citrix Applications:" port:1604
310
311Cisco Smart Install
312Vulnerable (kind of "by design," but especially when exposed).
313
314"smart install client active"
315
316PBX IP Phone Gateways
317PBX "gateway console" -password port:23
318
319Polycom Video Conferencing
320http.title:"- Polycom" "Server: lighttpd" "Polycom Command Shell" -failed port:23
321
322Telnet Configuration:
323"Polycom Command Shell" -failed port:23
324
325Example: Polycom Video Conferencing
326
327Bomgar Help Desk Portal
328"Server: Bomgar" "200 OK"
329
330Intel Active Management CVE-2017-5689
331"Intel(R) Active Management Technology" port:623,664,16992,16993,16994,16995 ”Active Management Technology”
332
333HP iLO 4 CVE-2017-12542
334HP-ILO-4 !"HP-ILO-4/2.53" !"HP-ILO-4/2.54" !"HP-ILO-4/2.55" !"HP-ILO-4/2.60" !"HP-ILO-4/2.61" !"HP-ILO-4/2.62" !"HP-iLO-4/2.70" port:1900
335
336Lantronix ethernet adapter’s admin interface without password
337"Press Enter for Setup Mode port:9999"
338
339Wifi Passwords:
340Helps to find the cleartext wifi passwords in Shodan. html:"def_wirelesspassword"
341
342Misconfigured Wordpress Sites:
343The wp-config.php if accessed can give out the database credentials. http.html:"* The wp-config.php creation script uses this file"
344
345Outlook Web Access:
346Exchange 2007
347"x-owa-version" "IE=EmulateIE7" "Server: Microsoft-IIS/7.0"
348
349Exchange 2010
350"x-owa-version" "IE=EmulateIE7" http.favicon.hash:442749392
351
352Exchange 2013 / 2016
353"X-AspNet-Version" http.title:"Outlook" -"x-owa-version"
354
355Lync / Skype for Business
356"X-MS-Server-Fqdn"
357
358Network Attached Storage (NAS)
359SMB (Samba) File Shares
360Produces ~500,000 results...narrow down by adding "Documents" or "Videos", etc.
361
362"Authentication: disabled" port:445
363
364Specifically domain controllers:
365"Authentication: disabled" NETLOGON SYSVOL -unix port:445
366
367Concerning default network shares of QuickBooks files:
368"Authentication: disabled" "Shared this folder to access QuickBooks files OverNetwork" -unix port:445
369
370FTP Servers with Anonymous Login
371"220" "230 Login successful." port:21
372
373Iomega / LenovoEMC NAS Drives
374"Set-Cookie: iomega=" -"manage/login.html" -http.title:"Log In"
375
376Buffalo TeraStation NAS Drives
377Redirecting sencha port:9000
378
379Logitech Media Servers
380"Server: Logitech Media Server" "200 OK"
381
382Example: Logitech Media Servers
383
384Plex Media Servers
385"X-Plex-Protocol" "200 OK" port:32400
386
387Tautulli / PlexPy Dashboards
388"CherryPy/5.1.0" "/home"
389
390Home router attached USB
391"IPC$ all storage devices"
392
393Webcams
394Generic camera search
395title:camera
396
397Webcams with screenshots
398webcam has_screenshot:true
399
400D-Link webcams
401"d-Link Internet Camera, 200 OK"
402
403Hipcam
404"Hipcam RealServer/V1.0"
405
406Yawcams
407"Server: yawcam" "Mime-Type: text/html"
408
409webcamXP/webcam7
410("webcam 7" OR "webcamXP") http.component:"mootools" -401
411
412Android IP Webcam Server
413"Server: IP Webcam Server" "200 OK"
414
415Security DVRs
416html:"DVR_H264 ActiveX"
417
418Surveillance Cams:
419With username:admin and password: :P NETSurveillance uc-httpd Server: uc-httpd 1.0.0
420
421Printers & Copiers:
422HP Printers
423"Serial Number:" "Built:" "Server: HP HTTP"
424
425Xerox Copiers/Printers
426ssl:"Xerox Generic Root"
427
428Epson Printers
429"SERVER: EPSON_Linux UPnP" "200 OK"
430
431"Server: EPSON-HTTP" "200 OK"
432
433Canon Printers
434"Server: KS_HTTP" "200 OK"
435
436"Server: CANON HTTP Server"
437
438Home Devices
439Yamaha Stereos
440"Server: AV_Receiver" "HTTP/1.1 406"
441
442Apple AirPlay Receivers
443Apple TVs, HomePods, etc.
444
445"\x08_airplay" port:5353
446
447Chromecasts / Smart TVs
448"Chromecast:" port:8008
449
450Crestron Smart Home Controllers
451"Model: PYNG-HUB"
452
453Random Stuff
454Calibre libraries
455"Server: calibre" http.status:200 http.title:calibre
456
457OctoPrint 3D Printer Controllers
458title:"OctoPrint" -title:"Login" http.favicon.hash:1307375944
459
460Etherium Miners
461"ETH - Total speed"
462
463Apache Directory Listings
464Substitute .pem with any extension or a filename like phpinfo.php.
465
466http.title:"Index of /" http.html:".pem"
467
468Misconfigured WordPress
469Exposed wp-config.php files containing database credentials.
470
471http.html:"* The wp-config.php creation script uses this file"
472
473Too Many Minecraft Servers
474"Minecraft Server" "protocol 340" port:25565
475
476Literally Everything in North Korea
477net:175.45.176.0/22,210.52.109.0/24,77.94.35.0/24