Shodan is the Scariest Search Engine on Internet
Shodan also allows users to filter their searches based on a range of criteria such as location, IP address and even searches which identify those devices with little or no security settings.
Shodan, named after the main antagonist of the cyberpunk-horror video game System Shock, has been called the "scariest search engine on the internet" but has said his pet project is about highlighting the problem, not allowing people to take advantage of it.
Shodan is more of a prying eye across the world through the IoT rather than just a simple search engine
Shodan is living up to his name. Already designated as ‘world’s scariest search engine’, it is commonly called the hacker search engine.
Shodan works by collecting and stacking HTTP addresses from various devices linked over the Internet across the world. The indexing is done on the basis such as country, OS and brand.
Hackers can breach into your system if your IoT hub is exposed on the Internet using this hacker search engine. It won’t be easy, however, it is not impossible either.
There are a number of devices out there that still run on their default passwords or no passwords at all. Shodan crawls through the Internet for such accessible devices
Shodan also allows users to filter their searches based on a range of criteria such as location, IP address and even searches which identify those devices with little or no security settings.
Shodan, named after the main antagonist of the cyberpunk-horror video game System Shock, has been called the "scariest search engine on the internet" but has said his pet project is about highlighting the problem, not allowing people to take advantage of it.
Shodan is more of a prying eye across the world through the IoT rather than just a simple search engine
Shodan is living up to his name. Already designated as ‘world’s scariest search engine’, it is commonly called the hacker search engine.
Shodan works by collecting and stacking HTTP addresses from various devices linked over the Internet across the world. The indexing is done on the basis such as country, OS and brand.
Hackers can breach into your system if your IoT hub is exposed on the Internet using this hacker search engine. It won’t be easy, however, it is not impossible either.
There are a number of devices out there that still run on their default passwords or no passwords at all. Shodan crawls through the Internet for such accessible devices
Post a Comment
Thank you for visiting Afridi's Technoworld