Exploiting Banners For Fun and Profit!
Exploiting Banners For Fun and Profit!
Exploiting Banners For Fun and Profit!
WHAT IS SHODAN?
What is SHODAN? (1)
SHODAN (http://www.shodanhq.com/) is a
computer search engine designed by web
developer John Matherly
(http://twitter.com/achillean)
While SHODAN is a search engine, it is
much different than content search
engines like Google, Yahoo or Bing
What is SHODAN? (2)
Typical search engines crawl for data on
web pages and then index it for searching
SHODAN interrogates ports and grabs the
resulting banners, then indexes the
banners (rather than the web content) for
searching
What is SHODAN? (3)
Rather than to locate specific content on a
particular search term, SHODAN is
designed to help the user find specific
nodes (desktops, servers, routers,
switches, etc.) with specific content in their
banners
Optimizing search results requires some
basic knowledge of banners
SHODAN for Penetration Testers
BASIC OPERATIONS
Basic Operations: Search
Search terms are entered into a text box
(seen below)
Quotation marks can narrow a search
Boolean operators +, -, | can be used to
include and exclude query terms (+ is
implicit default)
Basic Operations: Login
Create and login using a SHODAN account; or
Login using one of several other options
(Google, Twitter, Yahoo, AOL, Facebook,
OpenID
Login is not required, but country and net
filters are not available unless you login
Export requires you to be logged in
Basic Operations: Filters
after/before: limit results by date (day/mo/yr)
country: filters results by two letter country code
hostname: filters results by specified text in the
hostname or domain
net: filter results by a specific IP range or subnet
os: search for specific operating systems
port: narrow the search for specific services
SSL available with SSL add-on
apache country: CH
Find all ‘apache’ servers in Switzerland
apache 2.2.3
Find ‘apache’ servers running version 2.2.3
PENETRATION TESTING
Pen Testing: Ethics (1)
Is it acceptable under any circumstances to view
the configuration of a device that requires no
authentication to view?
What about viewing the configuration of a device
using a default username and password?
What about viewing the configuration of a device
using a unique username and password?
Changing the configuration of any device?
Pen Testing: Ethics (2)
Default username Changing
and password configurations
Unique username
No authentication and password
Pen Testing Applications
Using SHODAN for penetration testing
requires some basic knowledge of
banners including HTTP status codes
Banners advertise service and version
Banners can be spoofed (unlikely?)
Pen Testing: HTTP Status Codes
Status Code Description
200 OK Request succeeded
301 Moved Assigned a new permanent
Permanently URI
302 Found Resides under a different URI
401 Unauthorized Request requires
authentication
403 Forbidden Request is denied regardless
of authentication
Pen Testing: Assumptions (1)
“200 OK” banner results will load without
any authentication (at least not initially)
“301 Moved Permanently” and “302
Found” typically do not contain any data;
filtering them out will help to remove noise
from the data set
Pen Testing: Assumptions (2)
“401 Unauthorized” banners with Www-
authenticate indicate a username and
password pop-up box (authentication is
possible but not yet accomplished, as
distinguished from “403 Forbidden”)
Some banners advertise defaults
SHODAN for Penetration Testers
In fact, among “cisco” results these two lines are more than
99% mutually exclusive
Case Study: Cisco Results
Search Results
cisco 494,744
cisco-ios 426,479
cisco www-authenticate 373,138
MGT
OTCNET
BLDG_WIRELESS
LAB_NETWORK
PUBLIC_BACKBONE
Hilton_Conv_Ctr_ME
Courtyard_Marriot_Cocoa
PROTECTED-BB/INSIDE
MPLS-Backbone
…
Case Study: w t o P W N
H o
a n I S P
Two Cisco 3750 infrastructure switches
with direct access to Cisco 7606 Router
VLAN IDs for internal ISP network, hotels,
condos, apartments, convention center,
public backbone…
SNMP server IP address and community
strings
SHODAN for Penetration Testers
SCADA DEVICES
SHODAN for Penetration Testers
OTHER EXAMPLES
javascript:SnapshotWin()
client.html
javascript:SnapshotWin()
client.html
setup/config.html
system.html
security.html
network.html
wireless.html
ddns.html
accesslist.html
audiovideo.html
cameracontrol.html
mailftp.html
motion.html
application.html
syslog.html
parafile.html
maintain.html
Some general observations…
SHODAN for Penetration Testers
CONCLUSIONS
Conclusions
SHODAN aggregates a significant amount
of information that isn’t already widely
available in an easy to understand format
Allows for passive vulnerability analysis
QUESTIONS
Exploiting Banners
for Fun & Profit!
Michael Schearer
Twitter: @theprez98