1 00:00:00,690 --> 00:00:08,880 Now, let's talk about Jordan, Jordan is also called as hackers search engine and why it is called 2 00:00:09,030 --> 00:00:16,050 a hacker search engine, because it provides you a list of devices or should I say potentially vulnerable 3 00:00:16,050 --> 00:00:17,570 devices out there. 4 00:00:18,120 --> 00:00:18,530 Right. 5 00:00:19,650 --> 00:00:22,810 And these devices are not limited to any one device. 6 00:00:22,830 --> 00:00:32,040 I'm talking about all of the devices, like maybe it's a refrigerator or a webcam or a firewall or other 7 00:00:32,280 --> 00:00:33,960 and other Iot devices. 8 00:00:34,220 --> 00:00:34,560 Right. 9 00:00:35,490 --> 00:00:39,140 So Jordan has a huge database from all over the world. 10 00:00:39,420 --> 00:00:43,790 So either you can search for a showdown on Google or you don't directly go to their website showdown. 11 00:00:43,830 --> 00:00:45,110 But are you OK? 12 00:00:45,750 --> 00:00:51,230 And if you are visiting for the first time, then definitely you have to register first and then login. 13 00:00:52,080 --> 00:00:54,660 OK, so let me pose this video for a while. 14 00:00:56,430 --> 00:00:59,520 So I have created an account with them successfully. 15 00:00:59,520 --> 00:01:00,690 And now that the login. 16 00:01:03,620 --> 00:01:04,180 OK. 17 00:01:07,390 --> 00:01:19,970 Now, let's go to Jordan thought, you know, from here you can search for any device you want, OK? 18 00:01:21,010 --> 00:01:24,370 For example, if I search for firewalled. 19 00:01:27,830 --> 00:01:35,270 Now, it will give me a list of potentially vulnerable fighters from all around the world like Syria, 20 00:01:36,040 --> 00:01:43,990 OK, from United States alone, this number of firewalls are maybe vulnerable, right? 21 00:01:44,750 --> 00:01:47,840 So you can filter from by the name of countries. 22 00:01:49,380 --> 00:01:54,430 OK, now, as I say that it is not limited to any one device. 23 00:01:54,800 --> 00:01:55,130 Right. 24 00:01:55,280 --> 00:01:58,070 So you can search for any device you want. 25 00:01:58,250 --> 00:02:04,430 For example, let me search for let's see, brooders. 26 00:02:12,650 --> 00:02:15,790 OK, it's taking longer than usual, I don't know why. 27 00:02:21,350 --> 00:02:28,130 Now, here is the list of reporters from all around the world that are potentially vulnerable. 28 00:02:28,670 --> 00:02:32,570 OK, so here are the rest of the duties for their daughter. 29 00:02:34,040 --> 00:02:42,730 OK, so in this way, you can search on Shuren right now as it is a free version. 30 00:02:42,950 --> 00:02:46,000 So it's give me limited access like. 31 00:02:49,710 --> 00:02:56,490 Although it have a list of devices, but it will only show me on the first two pages, if I go for the 32 00:02:56,490 --> 00:02:59,100 title page, you will ask me to pay for it. 33 00:02:59,740 --> 00:03:06,360 OK, so the free service has limited access right now. 34 00:03:06,360 --> 00:03:13,370 If I click next see, please purchase the short end membership to access more than two pages of results. 35 00:03:14,100 --> 00:03:17,430 Now, in the next lesson, we will talk about Google Hecky.