Search Engines
- Some of the popular search engines are
- All search engines allow users for advanced search.
- For example: In Google, we can use the following operators to perform advanced search
- "exact match" - Search with exact search keyword.
- site: - Search with website url.
- - - Excludes search results with specific term.
- filetype:: Search based on file type.
- Advanced search engine operators: https://github.com/cipher387/Advanced-search-operators-list?tab=readme-ov-file#searchengines
Specialized Search Engines
Shodan
- Search engine for devices connected to the internet.
- It allows searching for the following
- Specific type and versions of server.
- Networking equipment such as routers.
- Industrial control systems.
- Webcams.
- IoT devices.
- Shodan: https://www.shodan.io
Censys
- Censys is similar to Shodan but it focuses on the following
- Internet connected hosts.
- Websites.
- Certificates.
- Some use cases of Censys are
- Enumerating domains.
- Finding open ports and services.
- Censys: https://search.censys.io
VirusTotal
Have I Been Pwned (HIBP)
Vulnerabilities and Exploits
Common Vulnerabilities and Exposures (CVE)
- Dictionary of Vulnerabilities
- Standardized identifier for Vulnerabilities in software and hardware products.
- For example: CVE-2024-29988
- CVE Websites: https://www.cve.org and https://nvd.nist.gov
Exploit Database
GitHub
Technical Documentation
- One important skill to aquire is to look up manual pages.
- Some important technical documentation include
- Learn to use social media to collect information.
- Some popular social media websites are
- LinkedIn
- X
- Facebook
- Instagram