Shodan

Shodan

One-liner: A search engine for internet-connected devices that indexes banners, services, and metadata from exposed systems worldwide.

🎯 What Is It?

Shodan is often called "the search engine for hackers." Unlike Google which indexes web pages, Shodan crawls the internet scanning ports and collecting service banners from every device it can reach. This creates a searchable database of exposed servers, IoT devices, industrial control systems, databases, and more.

URL: https://www.shodan.io/

🔍 How It Works

Data Collection

Shodan Scanners → Port Scan → Banner Grab → Index in Database

Shodan continuously scans the entire IPv4 space, connecting to common ports and storing:

Information Retrieved

Data Type Examples
IP Address Target server locations
Open Ports 22, 80, 443, 3389, etc.
Services Apache 2.4.41, OpenSSH 7.9
Organization Hosting company, ISP
Geolocation Country, city, coordinates
Vulnerabilities Known CVEs for detected versions
SSL/TLS Certificate details, expiration

Search Syntax

# Find Apache servers
apache

# Find Apache in a specific country
apache country:"US"

# Search by organization
org:"Microsoft"

# Find specific port open
port:3389

# Search by hostname
hostname:example.com

# Find servers with specific vulnerability
vuln:CVE-2021-44228

# Combine filters
apache port:8080 country:"DE"

⚔️ Offensive Use Cases

Reconnaissance

Common Searches

# Exposed webcams
webcam has_screenshot:true

# Default credentials on routers
"default password"

# Exposed MongoDB databases
mongodb port:27017

# Industrial control systems
"Schneider Electric"

# Exposed Elasticsearch
port:9200 elasticsearch

🛡️ Detection & Prevention (Blue Team)

Detection

Prevention Strategies

Blue Team Usage

1. Search your organization on Shodan
2. Identify exposed services you weren't aware of
3. Verify nothing sensitive is internet-facing
4. Set up Shodan Monitor alerts for your IP ranges

🎤 Interview Angles

Common Questions

STAR Example

Situation: During a security assessment, the client believed they had minimal internet exposure.
Task: Verify their external attack surface using passive reconnaissance.
Action: Searched Shodan for their IP range and organization name.
Result: Discovered 12 exposed services including an unpatched Jenkins server and an open MongoDB instance — neither on their asset inventory. Led to immediate remediation.

📚 References