1 00:00:00,410 --> 00:00:01,160 All ready. 2 00:00:01,320 --> 00:00:02,310 Welcome back, everyone. 3 00:00:02,340 --> 00:00:13,320 This resignation decision is about Shodan, it's now Shodan is let let's first understand what exactly 4 00:00:13,320 --> 00:00:18,860 shoddiness Shorten is, the kind of search engine for hackers. 5 00:00:18,870 --> 00:00:21,860 That's what you can see in just a simple words. 6 00:00:22,410 --> 00:00:30,480 But more than that, it is also a search and it's basically a search engine to detect a vulnerable devices 7 00:00:30,840 --> 00:00:33,690 in the devices which are connected to the Internet. 8 00:00:33,990 --> 00:00:41,600 And that could be vulnerable from getting exploited by any attackers or threats. 9 00:00:41,640 --> 00:00:42,010 All right. 10 00:00:42,480 --> 00:00:50,940 And it's also the way that we shorten works is it's basically gathered multiple information from the 11 00:00:50,940 --> 00:00:52,810 device login bannered. 12 00:00:53,220 --> 00:01:00,240 So what happened is if you look at the S&P response Web servers, routers, switches, every devices 13 00:01:00,240 --> 00:01:07,740 before you can even log in and do it, that time you log into the device, there are some sort of Baner 14 00:01:07,740 --> 00:01:14,220 which comes in the headers, basically, that Hadass carries a lot of information related to the ports 15 00:01:14,490 --> 00:01:17,850 IP address, hostname sometimes versions as well. 16 00:01:17,850 --> 00:01:23,400 In case of beatboxes Web application, you get to know it's a PSP boarding school. 17 00:01:23,550 --> 00:01:27,010 My version as well, Linux details as well. 18 00:01:27,750 --> 00:01:34,670 And version is more than enough to understand what could be the possible vulnerabilities of those devices. 19 00:01:34,680 --> 00:01:34,930 Right. 20 00:01:35,280 --> 00:01:37,410 And that's what basically captured. 21 00:01:37,710 --> 00:01:45,870 So Vanner is the major, major where the Shodan gets the information about each devices without even 22 00:01:45,870 --> 00:01:51,070 getting access into it right now as it pretty good. 23 00:01:51,090 --> 00:01:52,290 Is it legal? 24 00:01:52,770 --> 00:01:55,570 Well, it's not that bad. 25 00:01:55,770 --> 00:02:00,710 Initially it was a very disputable platform, but now it is. 26 00:02:00,720 --> 00:02:04,590 It has been appreciated by many organizations, many enterprises. 27 00:02:04,800 --> 00:02:07,560 It can make that guy accessible. 28 00:02:07,860 --> 00:02:18,150 And now all of them are using it for better purposes to secure their external security posture so that 29 00:02:18,150 --> 00:02:25,410 they can perform risk management and reduce their overall risk overall security posture. 30 00:02:25,440 --> 00:02:25,830 All right. 31 00:02:25,840 --> 00:02:31,980 So this is getting used by the organizations as well to better protect themselves. 32 00:02:32,100 --> 00:02:32,460 Right. 33 00:02:32,790 --> 00:02:40,080 And also, it has a lot of benefits, but it can work with Mantega, which is Mantega is basically for 34 00:02:40,080 --> 00:02:44,070 information gathering tool and become very much useful. 35 00:02:44,070 --> 00:02:51,990 And in fact, it has the compatability better compatibility with Hezbollah, which is the exploitation 36 00:02:51,990 --> 00:02:52,830 framework tool. 37 00:02:53,160 --> 00:02:54,350 To know more about it. 38 00:02:54,360 --> 00:03:01,120 You can refer to my other ethical hacking corpses, but Madama most of the time making use of short 39 00:03:01,140 --> 00:03:07,590 term more than Jujuy, and you feel much comfortable when you are, you know, into ethical hacking. 40 00:03:07,860 --> 00:03:13,080 You just with few comments, you can get access or you can get the list of all the information that 41 00:03:13,080 --> 00:03:20,220 you are looking for, although it works well with the U.S. But when you are with gallingly Nexavar or 42 00:03:20,220 --> 00:03:26,910 Metal Support Framework, you when you are in a massive console, it makes your job pretty easier to 43 00:03:26,910 --> 00:03:29,850 gather information and immediately take the next action. 44 00:03:29,880 --> 00:03:30,200 All right. 45 00:03:30,540 --> 00:03:37,110 So this is all about the interaction that Chorded will get started with some queries and the real actions 46 00:03:37,110 --> 00:03:37,440 with it. 47 00:03:37,620 --> 00:03:37,920 All right. 48 00:03:38,310 --> 00:03:39,000 We'll see you then.