Оди до главна содржина
Страничен панел
Дома
More
Пребарување
Затвори
Пребарување
Toggle search input
Македонски (mk)
English (en)
Slovenščina (sl)
Македонски (mk)
Русский (ru)
한국어 (ko)
Моментално користите гостински пристап
Најави се
Дома
Прошири ги сите
Затвори ги сите
Open course index
Open block drawer
ipri3
18.11@16:30 -> Shodan
18.11@16:30 -> Shodan
Section outline
Select activity ipri3-lect04-SHODAN
ipri3-lect04-SHODAN
BigBlueButton
Select activity Shodan Presentation
Shodan Presentation
Датотека
Прикачено 16/11/2020 10:52
Select activity Shodan search terms
Shodan search terms
Датотека
Прикачено 12/10/2020 09:06
Select activity Shodan null-byte Online tutorial
Shodan null-byte Online tutorial
URL
Select activity Shodan API overview
Shodan API overview
URL
Select activity Shodan Beginner tutorial
Shodan Beginner tutorial
URL
Select activity Lee, Seungwoon, Shin, Seung-Hun, & Roh, Byeong-hee. (2017). Abnormal Behavior-Based Detection of Shodan and Censys-Like Scanning
Lee, Seungwoon, Shin, Seung-Hun, & Roh, Byeong-hee. (2017). Abnormal Behavior-Based Detection of Shodan and Censys-Like Scanning
Датотека
Прикачено 12/10/2020 09:06
Select activity Ercolani, V. J., Patton, M. W., & Chen, H. (2016). Shodan visualized
Ercolani, V. J., Patton, M. W., & Chen, H. (2016). Shodan visualized
Датотека
Прикачено 12/10/2020 09:06
Select activity Phan, Thai, Krum, David M., & Bolas, Mark. (2016). ShodanVR Immersive visualization of text records from the Shodan database
Phan, Thai, Krum, David M., & Bolas, Mark. (2016). ShodanVR Immersive visualization of text records from the Shodan database
Датотека
Прикачено 12/10/2020 09:06
Select activity Harsha, M. S., Bhavani, B. M., & Kundhavai, K. R. (2018). Analysis of vulnerabilities in MQTT security using Shodan API and implementation of its countermeasures via authentication and ACLs
Harsha, M. S., Bhavani, B. M., & Kundhavai, K. R. (2018). Analysis of vulnerabilities in MQTT security using Shodan API and implementation of its countermeasures via authentication and ACLs
Датотека
Прикачено 12/10/2020 09:06
Select activity Al-Alami, H., Hadi, A., & Al-Bahadili, H. (2017). Vulnerability scanning of IoT devices in Jordan using Shodan
Al-Alami, H., Hadi, A., & Al-Bahadili, H. (2017). Vulnerability scanning of IoT devices in Jordan using Shodan
Датотека
Прикачено 12/10/2020 09:06
Select activity Matherly, J. (2016). The Complete Guide to Shodan
Matherly, J. (2016). The Complete Guide to Shodan
Датотека
Прикачено 12/10/2020 09:06
Select activity Homework IV (submit by 23.11.2020 at 12:00)
Homework IV (submit by 23.11.2020 at 12:00)
Задача