*Glitchy Shodan voice* YoU HAve acCOmplISHED MUCH foR a THinG of SUch SmALl ConSEQueNCe.
November 5, 2025 at 5:53 PM
Everybody can reply
1 likes
USB Army Knife – the ultimate close access tool for penetration testers and red teamers🕵️♂️
github.com/i-am-shodan/...
#infosec #cybersecurity #pentest #redteam
github.com/i-am-shodan/...
#infosec #cybersecurity #pentest #redteam
GitHub - i-am-shodan/USBArmyKnife: USB Army Knife – the ultimate close access tool for penetration testers and red teamers.
USB Army Knife – the ultimate close access tool for penetration testers and red teamers. - i-am-shodan/USBArmyKnife
github.com
November 5, 2025 at 3:54 PM
Everybody can reply
2 likes
I'm not saying they confused cyber pew pew Shodan with System Shock Shodan, but I'm not saying I can prove it isn't.
November 5, 2025 at 12:46 AM
Everybody can reply
1 reposts
10 likes
Here's a list of 15 free web-based OSINT tools, including Have I Been Pwned, AbuseIPDB, VirusTotal, and Shodan, among others, to enhance your cybersecurity practices. Enjoy using them for your Open Source Intelligence needs.
Top 15 web based OSINT tools (free) Enjoy!!
Have I Been Pwned – https://haveibeenpwned.com/
AbuseIPDB – https://www.abuseipdb.com/
urlscan.io – https://urlscan.io/
CentralOps Network Tools – https://centralops.net/co/
VirusTotal – htt...
reddit.com
November 5, 2025 at 12:42 AM
Everybody can reply
1 likes
📌 Critical Exposure: Over 500k RDP Endpoints Found on Shodan, Many Running Outdated Windows Server 2012 R2 https://www.cyberhub.blog/article/15200-critical-exposure-over-500k-rdp-endpoints-found-on-shodan-many-running-outdated-windows-server-2012-r2
Critical Exposure: Over 500k RDP Endpoints Found on Shodan, Many Running Outdated Windows Server 2012 R2
A recent Reddit post has brought attention to a significant cybersecurity concern: approximately 528,981 Remote Desktop Protocol (RDP) endpoints are visible on Shodan, with around 102,308 of these still running Windows Server 2012 R2. This operating system reached its end of life (EOL) on October 10, 2023, meaning it no longer receives security updates from Microsoft, leaving these systems vulnerable to exploitation. RDP endpoints exposed to the internet pose a substantial security risk. Attackers can target these endpoints through brute force attacks or by exploiting known vulnerabilities in the RDP protocol or the underlying operating system. For Windows Server 2012 R2, notable vulnerabilities include BlueKeep (CVE-2019-0708) and DejaBlue (a set of vulnerabilities including CVE-2019-1181, CVE-2019-1182, CVE-2019-1222, and CVE-2019-1226). Since Windows Server 2012 R2 is no longer supported, any newly discovered vulnerabilities will remain unpatched, further increasing the risk. The presence of such a large number of exposed RDP endpoints, particularly those running outdated software, highlights a critical gap in cybersecurity practices across many organizations. It underscores the need for organizations to prioritize updating their systems to supported versions and implementing robust security measures for any exposed services. For cybersecurity professionals, this finding serves as a stark reminder of the importance of regular system updates, vulnerability management, and network monitoring. Organizations should consider the following actionable steps to mitigate risks associated with exposed RDP endpoints: 1. **System Updates**: Migrate from Windows Server 2012 R2 to a supported version of Windows Server to ensure ongoing security updates and support. 2. **Secure RDP Endpoints**: If RDP must be exposed to the internet, ensure it is protected with strong authentication mechanisms, Network Level Authentication (NLA), and consider using a VPN or other secure remote access solutions. 3. **Monitor and Audit**: Regularly monitor and audit networks for exposed services and vulnerabilities. Tools like Shodan can be used to identify exposed endpoints within an organization's network. 4. **Network Segmentation**: Limit the exposure of RDP endpoints by placing them behind firewalls and using network segmentation to restrict access. 5. **Multi-Factor Authentication (MFA)**: Implement MFA for RDP access to add an extra layer of security. The broader impact on the cybersecurity landscape is significant. This finding highlights the ongoing challenge of managing and securing legacy systems. Many organizations struggle with updating or replacing outdated systems due to cost, compatibility issues, or lack of awareness. However, the risks associated with running unsupported software are substantial and can lead to severe consequences, including data breaches and cyber attacks. In conclusion, the discovery of over 500,000 exposed RDP endpoints, many running outdated software, underscores the critical need for organizations to prioritize cybersecurity best practices. Cybersecurity professionals must remain vigilant in their efforts to secure their networks, regularly updating and patching systems, monitoring for exposed services, and implementing strong security controls to mitigate risks.
www.cyberhub.blog
November 4, 2025 at 10:20 PM
Everybody can reply
Stuffing the latest and worst version of ELIZA is not making anything better. It just keeps things getting worse. The way things are going, they are going to invent Skynet, Glados, Shodan, Durandal, etc before anything useful.
November 4, 2025 at 10:07 PM
Everybody can reply
1 likes
There are about 529,000 RDP endpoints on Shodan, with over 102,000 still running the outdated and vulnerable Windows Server 2012 R2. This highlights a significant security risk as companies continue using old servers without proper protections like MFA.
529k RDP endpoints on Shodan — many still on Windows Server 2012 R2
We all know RDP gets exposed to the internet without proper MFA — and it’s not like that’s going to magically stop.
Shodan currently shows ~528,981 RDP endpoints with a login-screen screenshot. Tha...
reddit.com
November 4, 2025 at 8:42 PM
Everybody can reply
1 likes
My totally normal childhood crushes that hinted at me going places 😌:
✨ Hal 9000
✨ Predator
✨ SHODAN
✨ Hal 9000
✨ Predator
✨ SHODAN
November 4, 2025 at 7:43 PM
Everybody can reply
2 likes
I actually found some useful intel in re the Aisuru botnet on LinkedIn! https://www.linkedin.com/feed/update/urn:li:activity:7391258726848180224/
LOL at the "Forehead Too Large" server error response.
"Some quick wins obtained first via Shodan while pivoting on the IP address unveiled by […]
LOL at the "Forehead Too Large" server error response.
"Some quick wins obtained first via Shodan while pivoting on the IP address unveiled by […]
Original post on infosec.exchange
infosec.exchange
November 4, 2025 at 4:17 PM
Everybody can reply
1 reposts
🔥 Come Mettere in Sicurezza le Telecamere Wi-Fi: guida tecnica e buone pratiche
Hai riempito la tua casa di dispositivi IoT, ma sei sicuro di averli messi in sicurezza, o sarai tra le vittime che finiranno nel prossimo articolo di giornale che parla di Shodan? In questo articolo forniamo una […]
Hai riempito la tua casa di dispositivi IoT, ma sei sicuro di averli messi in sicurezza, o sarai tra le vittime che finiranno nel prossimo articolo di giornale che parla di Shodan? In questo articolo forniamo una […]
Original post on mastodon.social
mastodon.social
November 4, 2025 at 8:45 AM
Everybody can reply
3 reposts
I’m playing the System Shock remake, and starting to get a bad feeling about this SHODAN character. She reminds me of the infamous villain SHODAN from the classic System Shock 2
November 4, 2025 at 3:22 AM
Everybody can reply
2 likes
Since the report claims that using Shodan counts as AI and that AI is used to optimize phishing, that *could* mean that a lot of the AI is on the initial access broker end - in ransomware, affiliates license ransomware from designers and typically purchase pre-hacked systems to dump it in.
November 4, 2025 at 2:04 AM
Everybody can reply
1 quotes
2 likes
Shodan is that you?
November 4, 2025 at 12:53 AM
Everybody can reply
2 likes
@hrbrmstr so i guess then greynoises definition of 'benign' is different than, i would argue, most of the industry? scans and bannergrabbing are inherently harmless on their own - so how, for example, are shodan and censys not benign?
November 3, 2025 at 9:15 PM
Everybody can reply
shes thirsty, give shodan a drink
November 3, 2025 at 7:52 PM
Everybody can reply
1 likes
The linked article here (p. 5) does not say that Shodan and Censys. Censys has some AI features - though it's debatable if they dramatically impact attacker activity. Shodan, as near as I can tell, does not.
Either way, this is a kind of tenuous link between AI and ransomware.
Either way, this is a kind of tenuous link between AI and ransomware.
November 3, 2025 at 4:24 PM
Everybody can reply
6 likes
SHODAN say stop play and get back to work ! :)
a poster with a skull and the words system shock on it
ALT: a poster with a skull and the words system shock on it
media.tenor.com
November 3, 2025 at 3:59 PM
Everybody can reply
1 likes
camera pointed at what is presumably some vintage-ass weather equipment (and visible to shodan no less)
November 3, 2025 at 5:03 AM
Everybody can reply
1 likes
Great. I was just worried that the pocket didn’t SR the same way as the original hardware. I’m glad that’s not the case. I’m sure I’ll get the porygon (gonna name it SHODAN and evolve it to porygon-z) eventually. Tysm for your help!!
November 3, 2025 at 2:35 AM
Everybody can reply
1 likes
Spamton sounds like Gilbert Godfrey. Spamton neo sounds like either shodan or the master from fallout 1
November 3, 2025 at 12:29 AM
Everybody can reply
Omg I've legit been wondering if that was your inspiration because that was immediately what I thought of the first time I read your posts. No wonder they work so well on me......
Mirideth also reminds me of Shodan in a lot of ways at first, but you got real creative with where you took her journey
Mirideth also reminds me of Shodan in a lot of ways at first, but you got real creative with where you took her journey
November 2, 2025 at 11:08 PM
Everybody can reply
2 likes
i haven't had the opportunity to play the games, but I'm very aware of shodan,,,,, you should link me if you want
November 2, 2025 at 10:09 PM
Everybody can reply
1 likes
RIGHT LIKE
I know she's bad for me but goddamn the sexual tension between the Hacker and Shodan is off the charts
jsyk there are more than a few pretty good works on ao3 featuring Shodan and a helpless lesbian that I get the impression you may enjoy :p
I know she's bad for me but goddamn the sexual tension between the Hacker and Shodan is off the charts
jsyk there are more than a few pretty good works on ao3 featuring Shodan and a helpless lesbian that I get the impression you may enjoy :p
November 2, 2025 at 10:08 PM
Everybody can reply
1 likes
I literally cannot play System Shock without getting at least slightly aroused every time Shodan starts degrading me and I am not joking in the slightest but I know what I'm about and I own it okay
November 2, 2025 at 10:01 PM
Everybody can reply
7 likes