Shodan detects devices that are connected to the internet at any given time, the location of those devices and their current users.
It's a thread ๐งต๐
You can search, hack and even get a bounty if lucky enough with @shodanhq
#infosec
1) To find vulnerable Databases:
2) To find sensitive files and directories:
3) To find vulnerable Printers:
4) To find Devices & Servers using default credentials:
5) To find Compromised devices and websites:
Feel free to add more #shodan queries.
Share this Scrolly Tale with your friends.
A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.