1 00:00:00,150 --> 00:00:01,410 All right, welcome back, everyone. 2 00:00:02,190 --> 00:00:08,580 This is a situation this is about, frankly, frequently used queries on Shorten. 3 00:00:08,820 --> 00:00:17,040 Right before we get into the real platform, you really have to understand what are the mostly used 4 00:00:17,820 --> 00:00:21,690 queries that we can we can try to drive started. 5 00:00:21,990 --> 00:00:26,880 OK, so some of them you can make use of this. 6 00:00:26,880 --> 00:00:29,280 This is basically these are all strengths. 7 00:00:29,280 --> 00:00:35,620 So you need commas for this and inverted commas. 8 00:00:35,640 --> 00:00:39,220 And for this, you you can start with default passwords. 9 00:00:39,720 --> 00:00:49,230 Now, see, this is something which mostly not work, because now people, because of shodan organizations 10 00:00:49,620 --> 00:00:54,940 have they have got a bit more of their about that. 11 00:00:54,960 --> 00:00:55,410 Yes. 12 00:00:55,410 --> 00:00:58,890 There they are accessible from outside of the world. 13 00:00:58,910 --> 00:01:04,410 Now there is a platform which can be used to get ourselves exposed. 14 00:01:04,410 --> 00:01:04,680 Right. 15 00:01:04,980 --> 00:01:13,560 In terms of our devices which are publicly facing devices, they can get exposed and exploited as well 16 00:01:13,560 --> 00:01:17,080 if they are not UP-TO-DATE or if they have any vulnerability. 17 00:01:17,760 --> 00:01:27,570 So that's why the organizations have got very much active and proactive in terms of, you know, removing 18 00:01:27,570 --> 00:01:30,290 those vulnerabilities of weakness in the system. 19 00:01:30,600 --> 00:01:37,710 So most of the time you will find the default password might have changed when it comes to the organization, 20 00:01:37,710 --> 00:01:44,600 because organizations have certain, you know, best practices for all of their devices. 21 00:01:45,030 --> 00:01:54,070 Now, it is it has been assigned as a governance, risk management and compliance audits as well. 22 00:01:54,660 --> 00:01:57,450 So that's where we might find a lot. 23 00:01:57,450 --> 00:02:01,850 But yes, this is something which people make use of at the moment. 24 00:02:02,220 --> 00:02:07,590 You go on the device, you've tried to see what other default password is available, what are the default 25 00:02:07,590 --> 00:02:08,030 password? 26 00:02:08,040 --> 00:02:15,340 Basically the time you get the device maybe of any make maybe of any windows in your view, maybe Cisco 27 00:02:15,340 --> 00:02:24,330 and Juniper dealing, Netgear, Meraki, any any sort of devices like these all comes with the default 28 00:02:24,330 --> 00:02:24,850 password. 29 00:02:25,020 --> 00:02:31,740 This could be admin had been through any other devices, Cisco, Cisco, all the stuff. 30 00:02:31,740 --> 00:02:31,990 Right. 31 00:02:32,310 --> 00:02:34,110 So these are called default password. 32 00:02:34,360 --> 00:02:41,250 It is recommended to change the default password from the front from the time you have unpacked the 33 00:02:41,250 --> 00:02:41,680 device. 34 00:02:41,700 --> 00:02:41,980 Right. 35 00:02:42,460 --> 00:02:48,390 So but usually as a home, users or normal users don't do that. 36 00:02:49,830 --> 00:02:52,050 But organizations started doing this. 37 00:02:52,050 --> 00:02:57,840 But still there are you know, there are millions of billions of devices basically connected to the 38 00:02:57,840 --> 00:02:58,320 Internet. 39 00:02:58,710 --> 00:03:03,270 There can be some devices which might not have been fixed. 40 00:03:03,540 --> 00:03:07,850 So attackers just find some way to get into it. 41 00:03:08,370 --> 00:03:16,650 And if those are exposed to the Internet, it sort of makes their job easier to see Shodan making job 42 00:03:16,650 --> 00:03:18,720 easier, especially for the enterprises. 43 00:03:18,720 --> 00:03:20,640 But, yes, it can. 44 00:03:21,060 --> 00:03:26,360 You know, bad guys also can make use of it for some malicious activity, too. 45 00:03:26,640 --> 00:03:34,860 So it is always better to keep yourself updated from the war about how your how your organization really 46 00:03:34,860 --> 00:03:37,140 looks like from the external side. 47 00:03:37,320 --> 00:03:37,620 All right. 48 00:03:38,040 --> 00:03:39,110 Some of the other. 49 00:03:39,120 --> 00:03:41,340 Yeah, as I said, admin had been password. 50 00:03:41,940 --> 00:03:43,860 You can search for admin password as well. 51 00:03:44,520 --> 00:03:46,160 So these are courageous, right? 52 00:03:46,260 --> 00:03:47,400 Username and the password. 53 00:03:47,610 --> 00:03:53,000 You can see if these are there in their manners, you will get their output as well. 54 00:03:53,190 --> 00:03:53,570 Right. 55 00:03:54,060 --> 00:03:58,680 And then you can also make use of this, which is Esquires last modified. 56 00:03:58,690 --> 00:04:06,480 This is the banner for this Scott iOS devices, which is Esquires runs on all most of their Sasko devices 57 00:04:06,750 --> 00:04:07,320 now. 58 00:04:07,560 --> 00:04:13,620 So Rovner's home, you know, home routers, non-trading home repair branch office robusto this runs 59 00:04:13,620 --> 00:04:15,440 on Cisco's devices. 60 00:04:15,450 --> 00:04:22,530 It could be it could be at twenty eight, thirty thirty eight hundred devices or maybe twenty nine sixty. 61 00:04:22,530 --> 00:04:25,850 Those legacy devices or maybe the latest devices as well. 62 00:04:26,130 --> 00:04:27,630 They run Cisco Ayas as well. 63 00:04:27,630 --> 00:04:34,290 You can last modified is something which is the version of the moment we try to log into their devices. 64 00:04:34,320 --> 00:04:39,030 This is something which is mentioned about when was the last time it was modified. 65 00:04:39,030 --> 00:04:44,790 If it is there, we might get the initial information as to a stupid request. 66 00:04:44,790 --> 00:04:53,310 We might get the information from that as well about what all information we have about the website, 67 00:04:53,310 --> 00:04:59,790 about the it's not the website which always has has got the Secret Service. 68 00:05:00,340 --> 00:05:09,160 It can be any device which can which can be opened for SCDP request and which can allow anybody to use 69 00:05:09,160 --> 00:05:13,570 the anybody to access the device to the Web browser. 70 00:05:13,710 --> 00:05:14,020 Right. 71 00:05:14,500 --> 00:05:17,020 So that's where the SCDP service might be running. 72 00:05:17,020 --> 00:05:22,750 And we can possibly see of the city beheaders about what what is their device information? 73 00:05:23,060 --> 00:05:28,660 What is the version of device that is the Apache wants to be watching and all those stuff. 74 00:05:28,660 --> 00:05:28,940 Right. 75 00:05:28,960 --> 00:05:32,020 So that does become that becomes very helpful there. 76 00:05:32,430 --> 00:05:32,730 Right. 77 00:05:32,740 --> 00:05:39,910 So we will be making use of these keywords and some new one as well, although these have become a bit 78 00:05:39,910 --> 00:05:47,980 older, but will be making use of some old and some combination of it to make use of queries even more 79 00:05:47,980 --> 00:05:48,520 effective. 80 00:05:48,670 --> 00:05:57,520 Now there is a catch, even though even though with the time changes, right. 81 00:05:57,590 --> 00:06:02,700 There is always there is a way to keep yourself updated with the queries which shortened. 82 00:06:02,710 --> 00:06:05,370 There is a there is an option of shared queries. 83 00:06:05,620 --> 00:06:12,490 So the way people make use of searches that can be shared across many of the many of the other folks 84 00:06:12,490 --> 00:06:12,920 as well. 85 00:06:13,180 --> 00:06:20,140 And I'll show you how to which you can make use of some real effective queries which are up to date 86 00:06:20,440 --> 00:06:23,530 so that you can find the real one, reliable devices. 87 00:06:23,560 --> 00:06:23,920 All right. 88 00:06:24,190 --> 00:06:25,240 I'll show you that. 89 00:06:25,540 --> 00:06:25,990 Thank you.