Yes, I"m being lazy by calling all PLC/ICS/SCADA just ICS. Same for Credentials equaling passwords,access,etc.
Category | Query | Explanation | More |
---|---|---|---|
MiddleWare | http.title:"Strider: Brilliant Continuous Deployment" | strider CD | https://strider-cd.github.io/ |
MiddleWare | http.favicon.hash:115295460 | strider CD | https://strider-cd.github.io/ |
RDP | "\x03\x00\x00\x0b\x06\xd0\x00\x00\x124\x00" | Windows RDP. Usually protected by a 2nd login | |
ICS | "Server: gSOAP/2.8" "Content-Length: 583" | Charging stations for EV | |
ICS | "HID VertX" port:4070 | networked access controller with a multi-door access control panel | https://www.hidglobal.com/products/v10000 |
ICS | title:"netbotz appliance" | Used to control building automation or network closets | https://www.apc.com/us/en/product-range/61832-netbotz-400/ |
ICS | port:5006,5007 product:mitsubishi | CPU # identifies the model of the PLC. | https://www.tkkcorporation.com/mitsubishi/q-series-plc.htm |
ICS | Press Enter Setup Mode port:9999 | Lantronix devices with admin interface open, NO PASSWORD required. | https://www.lantronix.com/products-class/serial-to-ethernet-device-servers/ |
ICS | "privileged command" GET | Damn fuel pump connected to the internet allowing access to its command line interface... | |
VNC | "authentication disabled" "RFB 003.008" | VNC ... version 3.3?. Regardless, no authentication | https://www.exploit-db.com/exploits/36932 |
VNC | Port:"5900" Authentication disabled | Also VNC with no authentication | |
SMB | "Authentication: disabled" port:445 | SMB with no authentication | |
TOR | "X-Your-Address-Is:" | Can also use http.title:"This is a Tor Exit Router" or http.title:"Onion router" as well but this capture more of them in one search. | |
Database | port:9200 "indices" "production" | Elastic Search critical indices are accessible to the internet | https://www.elastic.co/guide/en/elasticsearch/reference/current/important-settings.html |
Telnet | "root@" port:23 -login -password -name -Session | already logged in as root... | |
Database | port:5432 PostgreSQL | PostgreSQL database | |
Database | "Home - Mongo Express" | Open Mongo Express Panels | |
NetBios | "NetBIOS Response" | NetBIOS service running and accessible on the Internet. These services have the potential to be used in amplification attacks by criminals that wish to perform denial of service attacks. | https://www.chrislockard.net/posts/netbios-name-spoofing-and-smb/ |
FTP | "230 login successful" port:"21" | FTP services without logins | |
Credentials | "admin+1234" | Default credentials listed in banner | |
Credentials | "default password" | Default credentials. Normally hacked | |
Credentials | " Default Name:admin Password:1234 " | Default credentials. Normally hacked | |
Credentials | html:"def_wirelesspassword" | default credentials again. | |
Router | "Cisco_CCSP_CWMP_TCPCR" | The cookie usually gives away version and path information. use banner grabbing in order to find network hosts that are running versions of applications and operating systems with known exploits | https://www.cisco.com/c/en/us/products/cloud-systems-management/media-gateway-controller-node-manager/index.html |
Router, AP | mikrotik streetlight | Let's cry together. These are street lights that are also access points ... | |
Router | "ActiontecBHR" | Actiontech routers | passwords for different modles are here: https://portforward.com/actiontec/passwords/ |
Error Codes | http.title:"401 Unauthorized" | The server generating a 401 response MUST send a WWW-Authenticate header field containing at least one challenge applicable to the target resource. I normally combine this with negation to remove unwanted hits, use ports or county codes. The point to this search is authenication was POSSIBLE but didn't happen because the wrong thing was sent. | https://kinsta.com/knowledgebase/401-error/ |
Cobalt Strike | ssl.cert.serial:146473198 | Default SSL cert | |
Cobalt Strike | hash:-2007783223 port:”50050″ | Hash for Cobalt Strike and its port | |
Cobalt Strike | product:”Cobalt Strike Beacon” | Just by name, because ... | |
MetaSploit | ssl:"MetasploitSelfSignedCA" | https://medium.com/@michaelkoczwara/hunting-c2-with-shodan-223ca250d06f | |
Covenant | ssl:”Covenant” http.component:”Blazor” | https://medium.com/@michaelkoczwara/hunting-c2-with-shodan-223ca250d06f | |
Mythic | ssl:Mythic port:7443 | https://medium.com/@michaelkoczwara/hunting-c2-with-shodan-223ca250d06f | |
Brute Ratel C4 | http.html_hash:-1957161625 | https://medium.com/@michaelkoczwara/hunting-c2-with-shodan-223ca250d06f | |
Deimos | http.html_hash:-14029177 | https://medium.com/@michaelkoczwara/hunting-c2-with-shodan-223ca250d06f | |
PostC2 | ssl:"P18055077" | https://medium.com/@michaelkoczwara/hunting-c2-with-shodan-223ca250d06f | |
Silver C2 | ssl.jarm:3fd21b20d00000021c43d21b21b43d41226dd5dfc615dd4a96265559485910 "HTTP/1.1 404 Not Found" "Cache-Control: no-store, no-cache, must-revalidate" "Content-Length: 0" | https://medium.com/@michaelkoczwara/hunting-c2-with-shodan-223ca250d06f | |
Sliver C2 | ssl:multiplayer ssl:operators ssl.jarm:"00000000000000000043d43d00043de2a97eabb398317329f027c66e4c1b01" | https://medium.com/@michaelkoczwara/hunting-c2-with-shodan-223ca250d06f | |
GoPhish Servers | ssl.jarm:"28d28d28d00028d00041d28d28d41dd279b0cf765af27fa62e66d7c8281124" | Had to make some adjustments for shodan | https://medium.com/@michaelkoczwara/hunting-c2-with-shodan-223ca250d06f |
Plesk Server Default Page | HTTP/1.1 200 OK Accept-Ranges: bytes Content-Length: 5664 | Find default page for Plesk Servers | |
Camera | "TVIP51500" | CCTV camera | https://www.usermanuals.au/abus/tvip51500/manual |
Camera | "everfocus" | IP Camera | https://www.everfocus.com/ |
Security | http.title:"Forcepoint Appliance" | Force Point security appliance |
Other Resources of use: