• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • VIP Membership
    • FAQ

    Popular Courses

    Network Hacking Continued – Intermediate to Advanced

    Network Hacking Continued – Intermediate to Advanced

  • Shop
  • Competitions
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

        0
    VIP Membership
    Got a question?
    [email protected]
    RegisterLogin
    zSecurityzSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • VIP Membership
      • FAQ

      Popular Courses

      Network Hacking Continued – Intermediate to Advanced

      Network Hacking Continued – Intermediate to Advanced

    • Shop
    • Competitions
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

          0

      Hack Cameras & More With Shodan Like Mr.Robot

      • Posted by Zaid Sabih
      • Date January 23, 2020

      Shodan is a search engine for devices, it can be used to discover devices connected to the internet, be it a camera, a personal computer, a server,  a router, a smart device like a fridge, or even industrial control systems and power-plants.

      This video will cover the basics of Shodan, how it works, how to search for specific devices, and how to use filters to filter results based on location, organisation…..etc

      As usual I like to teach by example, so to cover this I will show you how discover cameras all around the world, filter the results to get cameras in a certain country (Monaco), and finally view a live public camera in a dealership.

      We’ll also have an example of gathering information about a target organisation / company, get all devices related to this company, and discuss how these devices can be used to hack the target.

      Please note you’ll get a limited amount of search queries, registering for a free account increases that, and buying an account gives you even more searches per day.

      Resources:

      1. shodan.io.
      2. beta.shodan.io
      3. Shodan Search fundamentals.
      4. Shodan Search filters.
      5. Cool Shodan Queries.
      6. Shodan Explore.
      7. Shodan Free Book.

       

      • Share:
      author avatar
      Zaid Sabih

      Ethical Hacker, Pentester & Computer Scientist

      Zaid Al-Quraishi is an ethical hacker, computer scientist, and founder of zSecurity. He studied Computer Science at University College Dublin, graduating May 2016. Zaid has a strong background and experience in ethical hacking, starting with video tutorials in 2009 in an ethical hacking community, iSecur1ty.org. He also worked as a penetration tester (pentester) for this company. In 2013 he started teaching his first course online in Arabic which received extremely positive feedback. This motivated him to create an English version of the course. The English course became the most popular and top paid course on Udemy for almost a year, which further motivated Zaid to design and teach more courses on ethical hacking. He now offers a number of courses on ethical hacking and more than 200,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity. Zaid says: "I just love hacking and breaking the rules but don't get me wrong, I am an ethical hacker!"

      Previous post

      Our services are open to the public now!
      January 23, 2020

      Next post

      Discover Social Accounts Using Sherlock
      January 29, 2020

      You may also like

      Qubes-YT (1)
      The Most Secure OS!
      15 April, 2021
      Hacking TOR Hidden Services (1)
      How to Stay Away From Downloading Malware? Top 9 Prevention Tips
      12 April, 2021
      maxresdefault
      Accurately Locate Smartphones Using Social Engineering – Seeker
      9 April, 2021

        2 Comments

      1. Gagandeep Singh
        Gagandeep Singh
        January 24, 2020
        Log in to Reply

        Master piece as usual and you should add more vulnerabilities in your web pentesting course because you will teach more advanced techniques and we will get more knowledge.
        Thanks 😉
        Best regards

      2. Avatar
        Waren Gonzaga
        February 7, 2020
        Log in to Reply

        You like elliot alderson but teaching hacking hahaha. You’re the best mentor for me!

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018
      How To Start a Fake Access Point (Fake WIFI)
      28Nov2019
      How to Discover Device Manufacturer Based on MAC Address
      28May2018
      HiddenEye – The All in One Phishing Solution
      28Apr2020

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact

      Support

      • FAQ
      • Forums

      Copyright © 2021 zSecurity Ltd. All rights reserved.

      • Privacy
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account

      Are you a member? Login now