forked from BullsEye0/shodan-eye
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathShodan_Dorks_The_Internet_of_Sh*t.txt
90 lines (51 loc) · 1.94 KB
/
Shodan_Dorks_The_Internet_of_Sh*t.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
Shodan Dorks ... The Internet of Sh*t
A small collection of search queries for Shodan
This was written for educational purpose and pentest only.
The author will be not responsible for any damage..!
The author of this tool is not responsible for any misuse of the information.
You shall not misuse the information to gain unauthorized access.
This information shall only be used to expand knowledge and not for
causing malicious or damaging attacks.
Performing any hacks without written permission is illegal..!!!
Chromecasts / Smart TVs →
"Chromecast:" port:8008
Traffic Light Controllers / Red Light Cameras →
mikrotik streetlight
IP cams, some of which are unprotected →
IP Cams
+ 21k surveillance cams, user: admin; NO PASSWORD →
NETSurveillance uc-httpd
DICOM Medical X-Ray Machines →
Secured by default, thankfully, but these 1,700 + machines still have no business being on the internet..!
DICOM Server Response
Door / Lock Access Controllers →
"HID VertX" port:4070
Electric Vehicle Chargers mag_right →
"Server: gSOAP/2.8" "Content-Length: 583"
Remote Desktop →
Unprotected..!
"authentication disabled" "RFB 003.008"
Windows RDP →
99.99% are secured by a secondary Windows login screen.
"\x03\x00\x00\x0b\x06\xd0\x00\x00\x124\x00"
Lantronix ethernet adapter's →
admin interface open, NO PASSWORD required.
Press Enter Setup Mode port:9999
Pi-hole Open DNS Servers →
"dnsmasq-pi-hole" "Recursion: enabled"
Already Logged-In as root via Telnet →
"root@" port:23 -login -password -name -Session
Android Root Bridges →
A tangential result of Google’s dumb fractured update approach.
"Android Debug Bridge" "Device" port:5555
Xerox Copiers/Printers →
With root acces..!
ssl:"Xerox Generic Root"
Apple AirPlay Receivers →
Apple TVs, HomePods, etc.
"\x08_airplay" port:5353
TCP Quote of the Day →
Port 17 (RFC 865) has a bizarre history…
port:17 product:"Windows qotd"
Find a Job Doing This..! →
"X-Recruiting:"