Top 3 Search Engine for Penetration Tester

Here I will introduce the three Web vulnerability search engine.

  1. ShodanShodan, the official definition of himself Computer Search Engine (Computer Resource Search Engine), is American man John Matherly spent nearly 10 years to build a search engine that can search almost all US industrial control and connected to the network system. Unlike traditional search engines such as Google, use Web crawlers to traverse your entire site, Shodan can directly into the channel behind the Internet, various types of port equipment audits, and never stops looking for the Internet and all associated servers, camera, printers, routers, and so on. Shodan currently probes for 50+ ports.This engine can search, locate all devices connected to the network server. Shodan works produced by various types of port equipment system flag information (banners) audits generate search results, so when you use it, the need to understand a little knowledge of the system flag information.Numerous industrial control computer, waterworks, and power grid and other automation systems are connected to the network, some of which exist loopholes, moderate levels of hackers will be able to dive into these systems. Industrial control computer firewall protection usually at work, but the protection of a firewall can easily be connected to the network and erosion. How to use Shodan search engine, please visit here.
  2. ZoomEyeZoomEye is a search engine for cyberspace that lets the user find specific network components(ip, services, etc.). ZoomEye API is a web service that provides convenient access to ZoomEye features, data, and information over HTTPS. The platform API empowers developers to automate, extend and connect with ZoomEye. You can use the ZoomEye platform API to programmatically create apps, provision some add-ons, and perform some automated tasks. Just imagine that you could do amazing stuff with ZoomEye.
  3. CensysCensys is a search engine that allows computer scientists to ask questions about the devices and networks that comprise the Internet. Driven by Internet-wide scanning, Censys lets researchers find specific hosts and create aggregate reports on how devices, websites, and certificates are configured and deployed.