shodan query for Compromised devices and websites | General Hacking | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

shodan query for Compromised devices and websites

shodan query for Compromised devices and websites

LV
0
 

saeidsh

Member
Joined
Jun 15, 2024
Threads
9
Likes
0
Awards
1
Credits
320©
Cash
0$
  1. hacked – general search for the ‘hacked’ label.
  2. “hacked by” – another variation of the above search.
  3. http.title:”Hacked by” – another variation of the same search filter.
  4. http.title:”0wn3d by” – resourced labelled as ‘owned’ by a threat agent, hacker group, etc.
  5. “HACKED-ROUTER” – compromised routers, labelled accordingly.
  6. port:”27017″ “send_bitcoin_to_retrieve_the_data” – databases affected by ransomware, with the ransom demand still associated with them.
  7. bitcoin has_screenshot:true – searches for the ‘bitcoin’ keyword, where a screenshot is present (useful for RDP screens of endpoints infected with ransomware).
  8. port:4444 system32 – compromised legacy operating systems. Port 4444 is the default port for Meterpreter – a Metasploit attack payload with an interactive shell for remote code execution.
  9. “attention”+”encrypted”+port:3389 – ransomware infected RDP services.
  10. “HACKED-ROUTER-HELP-SOS-HAD-DEFAULT-PASSWORD” – compromised hosts with the name changed to that phrase.
  11. “HACKED FTP server” – compromised FTP servers.
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Tips
Top Bottom