Skip to main content
Side panel
Home
More
Search
Close
Search
Toggle search input
English (en)
English (en)
Slovenščina (sl)
Македонски (mk)
Русский (ru)
한국어 (ko)
You are currently using guest access
Log in
Home
Expand all
Collapse all
Open course index
Open block drawer
ipri3
18.11@16:30 -> Shodan
18.11@16:30 -> Shodan
Section outline
Select activity ipri3-lect04-SHODAN
ipri3-lect04-SHODAN
BigBlueButton
Select activity Shodan Presentation
Shodan Presentation
File
Uploaded 16/11/20, 10:52
Select activity Shodan search terms
Shodan search terms
File
Uploaded 12/10/20, 09:06
Select activity Shodan null-byte Online tutorial
Shodan null-byte Online tutorial
URL
Select activity Shodan API overview
Shodan API overview
URL
Select activity Shodan Beginner tutorial
Shodan Beginner tutorial
URL
Select activity Lee, Seungwoon, Shin, Seung-Hun, & Roh, Byeong-hee. (2017). Abnormal Behavior-Based Detection of Shodan and Censys-Like Scanning
Lee, Seungwoon, Shin, Seung-Hun, & Roh, Byeong-hee. (2017). Abnormal Behavior-Based Detection of Shodan and Censys-Like Scanning
File
Uploaded 12/10/20, 09:06
Select activity Ercolani, V. J., Patton, M. W., & Chen, H. (2016). Shodan visualized
Ercolani, V. J., Patton, M. W., & Chen, H. (2016). Shodan visualized
File
Uploaded 12/10/20, 09:06
Select activity Phan, Thai, Krum, David M., & Bolas, Mark. (2016). ShodanVR Immersive visualization of text records from the Shodan database
Phan, Thai, Krum, David M., & Bolas, Mark. (2016). ShodanVR Immersive visualization of text records from the Shodan database
File
Uploaded 12/10/20, 09:06
Select activity Harsha, M. S., Bhavani, B. M., & Kundhavai, K. R. (2018). Analysis of vulnerabilities in MQTT security using Shodan API and implementation of its countermeasures via authentication and ACLs
Harsha, M. S., Bhavani, B. M., & Kundhavai, K. R. (2018). Analysis of vulnerabilities in MQTT security using Shodan API and implementation of its countermeasures via authentication and ACLs
File
Uploaded 12/10/20, 09:06
Select activity Al-Alami, H., Hadi, A., & Al-Bahadili, H. (2017). Vulnerability scanning of IoT devices in Jordan using Shodan
Al-Alami, H., Hadi, A., & Al-Bahadili, H. (2017). Vulnerability scanning of IoT devices in Jordan using Shodan
File
Uploaded 12/10/20, 09:06
Select activity Matherly, J. (2016). The Complete Guide to Shodan
Matherly, J. (2016). The Complete Guide to Shodan
File
Uploaded 12/10/20, 09:06
Select activity Homework IV (submit by 23.11.2020 at 12:00)
Homework IV (submit by 23.11.2020 at 12:00)
Assignment