Naposledy aktivní 1727326209

shodan-dorks.txt Raw
1Shodan Dorks by twitter.com/lothos612
2Feel free to make suggestions
3From: https://github.com/lothos612/shodan
4
5Shodan Dorks
6Basic Shodan Filters
7city:
8Find devices in a particular city. city:"Bangalore"
9
10country:
11Find devices in a particular country. country:"IN"
12
13geo:
14Find devices by giving geographical coordinates. geo:"56.913055,118.250862"
15
16Location
17country:us country:ru country:de city:chicago
18
19hostname:
20Find devices matching the hostname. server: "gws" hostname:"google" hostname:example.com -hostname:subdomain.example.com hostname:example.com,example.org
21
22net:
23Find devices based on an IP address or /x CIDR. net:210.214.0.0/16
24
25Organization
26org:microsoft org:"United States Department"
27
28Autonomous System Number (ASN)
29asn:ASxxxx
30
31os:
32Find devices based on operating system. os:"windows 7"
33
34port:
35Find devices based on open ports. proftpd port:21
36
37before/after:
38Find devices before or after between a given time. apache after:22/02/2009 before:14/3/2010
39
40SSL/TLS Certificates
41Self signed certificates ssl.cert.issuer.cn:example.com ssl.cert.subject.cn:example.com
42
43Expired certificates ssl.cert.expired:true
44
45ssl.cert.subject.cn:example.com
46
47Device Type
48device:firewall device:router device:wap device:webcam device:media device:"broadband router" device:pbx device:printer device:switch device:storage device:specialized device:phone device:"voip" device:"voip phone" device:"voip adaptor" device:"load balancer" device:"print server" device:terminal device:remote device:telecom device:power device:proxy device:pda device:bridge
49
50Operating System
51os:"windows 7" os:"windows server 2012" os:"linux 3.x"
52
53Product
54product:apache product:nginx product:android product:chromecast
55
56Customer Premises Equipment (CPE)
57cpe:apple cpe:microsoft cpe:nginx cpe:cisco
58
59Server
60server: nginx server: apache server: microsoft server: cisco-ios
61
62ssh fingerprints
63dc:14:de:8e:d7:c1:15:43:23:82:25:81:d2:59:e8:c0
64
65Web
66Pulse Secure
67http.html:/dana-na
68
69PEM Certificates
70http.title:"Index of /" http.html:".pem"
71
72Tor / Dark Web sites
73onion-location
74
75Databases
76MySQL
77"product:MySQL" mysql port:"3306"
78
79MongoDB
80"product:MongoDB" mongodb port:27017
81
82Fully open MongoDBs
83"MongoDB Server Information { "metrics":" "Set-Cookie: mongo-express=" "200 OK" "MongoDB Server Information" port:27017 -authentication
84
85Kibana dashboards without authentication
86kibana content-legth:217
87
88elastic
89port:9200 json port:"9200" all:elastic port:"9200" all:"elastic indices"
90
91Memcached
92"product:Memcached"
93
94CouchDB
95"product:CouchDB" port:"5984"+Server: "CouchDB/2.1.0"
96
97PostgreSQL
98"port:5432 PostgreSQL"
99
100Riak
101"port:8087 Riak"
102
103Redis
104"product:Redis"
105
106Cassandra
107"product:Cassandra"
108
109Industrial Control Systems
110Samsung Electronic Billboards
111"Server: Prismview Player"
112
113Gas Station Pump Controllers
114"in-tank inventory" port:10001
115
116Fuel Pumps connected to internet:
117No auth required to access CLI terminal. "privileged command" GET
118
119Automatic License Plate Readers
120P372 "ANPR enabled"
121
122Traffic Light Controllers / Red Light Cameras
123mikrotik streetlight
124
125Voting Machines in the United States
126"voter system serial" country:US
127
128Open ATM:
129May allow for ATM Access availability NCR Port:"161"
130
131Telcos Running Cisco Lawful Intercept Wiretaps
132"Cisco IOS" "ADVIPSERVICESK9_LI-M"
133
134Prison Pay Phones
135"[2J[H Encartele Confidential"
136
137Tesla PowerPack Charging Status
138http.title:"Tesla PowerPack System" http.component:"d3" -ga3ca4f2
139
140Electric Vehicle Chargers
141"Server: gSOAP/2.8" "Content-Length: 583"
142
143Maritime Satellites
144Shodan made a pretty sweet Ship Tracker that maps ship locations in real time, too!
145
146"Cobham SATCOM" OR ("Sailor" "VSAT")
147
148Submarine Mission Control Dashboards
149title:"Slocum Fleet Mission Control"
150
151CAREL PlantVisor Refrigeration Units
152"Server: CarelDataServer" "200 Document follows"
153
154Nordex Wind Turbine Farms
155http.title:"Nordex Control" "Windows 2000 5.0 x86" "Jetty/3.1 (JSP 1.1; Servlet 2.2; java 1.6.0_14)"
156
157C4 Max Commercial Vehicle GPS Trackers
158"[1m[35mWelcome on console"
159
160DICOM Medical X-Ray Machines
161Secured by default, thankfully, but these 1,700+ machines still have no business being on the internet.
162
163"DICOM Server Response" port:104
164
165GaugeTech Electricity Meters
166"Server: EIG Embedded Web Server" "200 Document follows"
167
168Siemens Industrial Automation
169"Siemens, SIMATIC" port:161
170
171Siemens HVAC Controllers
172"Server: Microsoft-WinCE" "Content-Length: 12581"
173
174Door / Lock Access Controllers
175"HID VertX" port:4070
176
177Railroad Management
178"log off" "select the appropriate"
179
180Tesla Powerpack charging Status:
181Helps to find the charging status of tesla powerpack. http.title:"Tesla PowerPack System" http.component:"d3" -ga3ca4f2
182
183XZERES Wind Turbine
184title:"xzeres wind"
185
186PIPS Automated License Plate Reader
187"html:"PIPS Technology ALPR Processors""
188
189Modbus
190"port:502"
191
192Niagara Fox
193"port:1911,4911 product:Niagara"
194
195GE-SRTP
196"port:18245,18246 product:"general electric""
197
198MELSEC-Q
199"port:5006,5007 product:mitsubishi"
200
201CODESYS
202"port:2455 operating system"
203
204S7
205"port:102"
206
207BACnet
208"port:47808"
209
210HART-IP
211"port:5094 hart-ip"
212
213Omron FINS
214"port:9600 response code"
215
216IEC 60870-5-104
217"port:2404 asdu address"
218
219DNP3
220"port:20000 source address"
221
222EtherNet/IP
223"port:44818"
224
225PCWorx
226"port:1962 PLC"
227
228Crimson v3.0
229"port:789 product:"Red Lion Controls"
230
231ProConOS
232"port:20547 PLC"
233
234Remote Desktop
235Unprotected VNC
236"authentication disabled" port:5900,5901 "authentication disabled" "RFB 003.008"
237
238Windows RDP
23999.99% are secured by a secondary Windows login screen.
240
241"\x03\x00\x00\x0b\x06\xd0\x00\x00\x124\x00"
242
243C2 Infrastructure
244CobaltStrike Servers
245product:"cobalt strike team server" product:"Cobalt Strike Beacon" ssl.cert.serial:146473198 - default certificate serial number ssl.jarm:07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1 ssl:foren.zik
246
247Brute Ratel
248http.html_hash:-1957161625 product:"Brute Ratel C4"
249
250Covenant
251ssl:”Covenant” http.component:”Blazor”
252
253Metasploit
254ssl:"MetasploitSelfSignedCA"
255
256Network Infrastructure
257Hacked routers:
258Routers which got compromised hacked-router-help-sos
259
260Redis open instances
261product:"Redis key-value store"
262
263Citrix:
264Find Citrix Gateway. title:"citrix gateway"
265
266Weave Scope Dashboards
267Command-line access inside Kubernetes pods and Docker containers, and real-time visualization/monitoring of the entire infrastructure.
268
269title:"Weave Scope" http.favicon.hash:567176827
270
271Jenkins CI
272"X-Jenkins" "Set-Cookie: JSESSIONID" http.title:"Dashboard"
273
274Jenkins:
275Jenkins Unrestricted Dashboard x-jenkins 200
276
277Docker APIs
278"Docker Containers:" port:2375
279
280Docker Private Registries
281"Docker-Distribution-Api-Version: registry" "200 OK" -gitlab
282
283Pi-hole Open DNS Servers
284"dnsmasq-pi-hole" "Recursion: enabled"
285
286DNS Servers with recursion
287"port: 53" Recursion: Enabled
288
289Already Logged-In as root via Telnet
290"root@" port:23 -login -password -name -Session
291
292Telnet Access:
293NO password required for telnet access. port:23 console gateway
294
295Polycom video-conference system no-auth shell
296"polycom command shell"
297
298NPort serial-to-eth / MoCA devices without password
299nport -keyin port:23
300
301Android Root Bridges
302A tangential result of Google's sloppy fractured update approach. 🙄 More information here.
303
304"Android Debug Bridge" "Device" port:5555
305
306Lantronix Serial-to-Ethernet Adapter Leaking Telnet Passwords
307Lantronix password port:30718 -secured
308
309Citrix Virtual Apps
310"Citrix Applications:" port:1604
311
312Cisco Smart Install
313Vulnerable (kind of "by design," but especially when exposed).
314
315"smart install client active"
316
317PBX IP Phone Gateways
318PBX "gateway console" -password port:23
319
320Polycom Video Conferencing
321http.title:"- Polycom" "Server: lighttpd" "Polycom Command Shell" -failed port:23
322
323Telnet Configuration:
324"Polycom Command Shell" -failed port:23
325
326Example: Polycom Video Conferencing
327
328Bomgar Help Desk Portal
329"Server: Bomgar" "200 OK"
330
331Intel Active Management CVE-2017-5689
332"Intel(R) Active Management Technology" port:623,664,16992,16993,16994,16995 ”Active Management Technology”
333
334HP iLO 4 CVE-2017-12542
335HP-ILO-4 !"HP-ILO-4/2.53" !"HP-ILO-4/2.54" !"HP-ILO-4/2.55" !"HP-ILO-4/2.60" !"HP-ILO-4/2.61" !"HP-ILO-4/2.62" !"HP-iLO-4/2.70" port:1900
336
337Lantronix ethernet adapter’s admin interface without password
338"Press Enter for Setup Mode port:9999"
339
340Wifi Passwords:
341Helps to find the cleartext wifi passwords in Shodan. html:"def_wirelesspassword"
342
343Misconfigured Wordpress Sites:
344The wp-config.php if accessed can give out the database credentials. http.html:"* The wp-config.php creation script uses this file"
345
346Outlook Web Access:
347Exchange 2007
348"x-owa-version" "IE=EmulateIE7" "Server: Microsoft-IIS/7.0"
349
350Exchange 2010
351"x-owa-version" "IE=EmulateIE7" http.favicon.hash:442749392
352
353Exchange 2013 / 2016
354"X-AspNet-Version" http.title:"Outlook" -"x-owa-version"
355
356Lync / Skype for Business
357"X-MS-Server-Fqdn"
358
359Network Attached Storage (NAS)
360SMB (Samba) File Shares
361Produces ~500,000 results...narrow down by adding "Documents" or "Videos", etc.
362
363"Authentication: disabled" port:445
364
365Specifically domain controllers:
366"Authentication: disabled" NETLOGON SYSVOL -unix port:445
367
368Concerning default network shares of QuickBooks files:
369"Authentication: disabled" "Shared this folder to access QuickBooks files OverNetwork" -unix port:445
370
371FTP Servers with Anonymous Login
372"220" "230 Login successful." port:21
373
374Iomega / LenovoEMC NAS Drives
375"Set-Cookie: iomega=" -"manage/login.html" -http.title:"Log In"
376
377Buffalo TeraStation NAS Drives
378Redirecting sencha port:9000
379
380Logitech Media Servers
381"Server: Logitech Media Server" "200 OK"
382
383Example: Logitech Media Servers
384
385Plex Media Servers
386"X-Plex-Protocol" "200 OK" port:32400
387
388Tautulli / PlexPy Dashboards
389"CherryPy/5.1.0" "/home"
390
391Home router attached USB
392"IPC$ all storage devices"
393
394Webcams
395Generic camera search
396title:camera
397
398Webcams with screenshots
399webcam has_screenshot:true
400
401D-Link webcams
402"d-Link Internet Camera, 200 OK"
403
404Hipcam
405"Hipcam RealServer/V1.0"
406
407Yawcams
408"Server: yawcam" "Mime-Type: text/html"
409
410webcamXP/webcam7
411("webcam 7" OR "webcamXP") http.component:"mootools" -401
412
413Android IP Webcam Server
414"Server: IP Webcam Server" "200 OK"
415
416Security DVRs
417html:"DVR_H264 ActiveX"
418
419Surveillance Cams:
420With username:admin and password: :P NETSurveillance uc-httpd Server: uc-httpd 1.0.0
421
422Printers & Copiers:
423HP Printers
424"Serial Number:" "Built:" "Server: HP HTTP"
425
426Xerox Copiers/Printers
427ssl:"Xerox Generic Root"
428
429Epson Printers
430"SERVER: EPSON_Linux UPnP" "200 OK"
431
432"Server: EPSON-HTTP" "200 OK"
433
434Canon Printers
435"Server: KS_HTTP" "200 OK"
436
437"Server: CANON HTTP Server"
438
439Home Devices
440Yamaha Stereos
441"Server: AV_Receiver" "HTTP/1.1 406"
442
443Apple AirPlay Receivers
444Apple TVs, HomePods, etc.
445
446"\x08_airplay" port:5353
447
448Chromecasts / Smart TVs
449"Chromecast:" port:8008
450
451Crestron Smart Home Controllers
452"Model: PYNG-HUB"
453
454Random Stuff
455Calibre libraries
456"Server: calibre" http.status:200 http.title:calibre
457
458OctoPrint 3D Printer Controllers
459title:"OctoPrint" -title:"Login" http.favicon.hash:1307375944
460
461Etherium Miners
462"ETH - Total speed"
463
464Apache Directory Listings
465Substitute .pem with any extension or a filename like phpinfo.php.
466
467http.title:"Index of /" http.html:".pem"
468
469Misconfigured WordPress
470Exposed wp-config.php files containing database credentials.
471
472http.html:"* The wp-config.php creation script uses this file"
473
474Too Many Minecraft Servers
475"Minecraft Server" "protocol 340" port:25565
476
477Literally Everything in North Korea
478net:175.45.176.0/22,210.52.109.0/24,77.94.35.0/24