- Shodan (https://www.shodan.io/) is a search engine that uses a variety of filters to find devices, such as computers, routers, and servers, which are connected to the Internet.
- Shodan collects data mostly on web servers (HTTP port 80), but there is also data about FTP (21), SSH (22), Telnet (23), SNMP (161) and SIP (5060) services.
- Shodan is often dubbed as “Google for hackers”, as it exposes vulnerable devices.
- Shodan is a scanner which can find systems connected to the Internet, including traffic lights, security cameras, home heating systems and baby monitors, as well as SCADA system such as gas stations, water plants, power grids and nuclear power plants. Many of these systems have a number of vulnerabilities and very little security in place.
- Shodan can identify the physical location of any Internet-connected equipment, as well as its IP address, and often even what type of software it’s running.. This provides sufficient information for hackers to carry out targeted attacks.
- A massive data hack in the UK, attributed to Shodan scans, exposed sensitive data including family photographs, medical records and bank statements. This was due to security flaws in Iomega hard drives which were used to back up personal and business data.
CHECK POINT IPS PROTECTIONS
- Shodan “crawls” the Internet for publicly accessible devices, looking for specific IP addresses and hosts (see Appendix).
- Blocking these IP addresses is not enough, as similar scanners are used by hackers seeking other IPs.
- To fill these gaps, Check Point provides the following IPS protections:
- Shodan.io Internet Of Things Portal
- Shodan Scanner ISAKMP Request
- Shodan Scanner SIP Request
Shodan Scanner BACNET Request
- Shodan Scanner GTP Request
- Shodan Scanner ENIP Request
These protections search for specific patterns in the SYN request that characterize Shodan and similar scanners.
- Shodan: https://en.wikipedia.org/wiki/Shodan_(website)
- Shodan in the news:
APPENDIX – SHODAN HOST NAMES AND IP ADDRESSES
IP Host Name