module

Shodan Search

Disclosed
N/A
Created
2018-05-30

Description

This module uses the Shodan API to search Shodan. Accounts are free
and an API key is required to use this module. Output from the module
is displayed to the screen and can be saved to a file or the MSF database.
NOTE: SHODAN filters (i.e. port, hostname, os, geo, city) can be used in
queries, but there are limitations when used with a free API key. Please
see the Shodan site for more information.
Shodan website: https://www.shodan.io/
API: https://developer.shodan.io/api
Filters: https://www.shodan.io/search/filters
Facets: https://www.shodan.io/search/facet (from the scrollbox)

Authors

John H Sawyer john@sploitlab.com
sinn3r sinn3r@metasploit.com

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use auxiliary/gather/shodan_search
msf auxiliary(shodan_search) > show actions
...actions...
msf auxiliary(shodan_search) > set ACTION < action-name >
msf auxiliary(shodan_search) > show options
...show and set options...
msf auxiliary(shodan_search) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.