강의

멘토링

로드맵

BEST
Security & Network

/

Computer Security

Utilization and development of open search services such as Shodan and Censys for security

Many security hacking incidents are occurring by utilizing OSINT (Open Source Intelligence) search services. We will discuss how to utilize it to first monitor and eliminate potential security threats from an offensive perspective before an attack occurs.

(4.8) 22 reviews

316 learners

  • boanproject
Penetration Testing

Reviews from Early Learners

What you will learn!

  • Security Threat Monitoring Using OSINT

  • Utilizing Shodan services and Python APIs

  • Using Censys and Python API

  • Anyone who wants to use OSINT in hacking techniques

Potential threat monitoring is also OK!
Tips for responding to security breaches in practice.

What about this lecture?

Using Open Intelligence Service (OSINT)
This is a lecture on utilizing security monitoring and Python API.

Many security breaches are occurring through the use of Open Source Intelligence (OSINT) search services . This article discusses how to utilize OSINT to proactively monitor and eliminate potential security threats from an offensive perspective before an attack occurs.

Open search services are increasingly being utilized in mock hacking, breach response, and regular security activities. Regular monitoring is essential for unnecessary port access. If services connected to open ports exhibit inadequate access control, default account settings, or inadequate management of the administrator page, criminals can pose a serious security threat to internal systems.

📣 What is OSINT?

Open source intelligence (OSINT) refers to information obtained from publicly available sources. It is also called open source intelligence, public information, public information, open source information, or open source intelligence.

The types of intelligence collected by national intelligence agencies like the CIA and private intelligence companies include human intelligence (HUMINT), signals intelligence (SIGINT), imagery intelligence (IMINT), measured intelligence (MASINT), open-source intelligence (OSINT), and technical intelligence (TECHINT). While the CIA originally focused on HUMINT, the importance of TECHINT has grown significantly with the advancement of computers. (Wikipedia)

  • New DDoS attacks are on the rise… What are effective countermeasures? Periodic scanning is essential to determine whether internal server IPs and services are exposed to the public (Daily Security, August 19, 2021)
  • VMware Vulnerability Alert: Hackers Using Shodan to Find Vulnerable Servers (Daily Security, February 28, 2021)
  • Korean IoT Device Vulnerabilities Exposed in Shodan (Security News, October 10, 2018)
  • Is My Privacy Leaking Through the IoT Search Engine Shodan? (iNews, November 16, 2018)

Learning Content

This course covers Shodan, Censys, and other leading OSINT search services . It also covers the process of developing Python programs using the provided APIs. Being able to create your own search and monitoring tools in Python will enable you to conduct effective security monitoring activities .

  1. Understanding and Using Open Search Services
  2. Using the basic search methods and features of the Shodan search service
  3. How to use the API using Shodan console commands
  4. How to use open APIs using Python programs
  5. Security threats caused by open search services
  6. Leveraging Censys Open Search Services and Understanding Other OSINT
  7. Understanding how cybercriminals use OSINT

Please make sure to check before learning!

  • In this lecture, we'll explore data search using Shodan and Censys services. To efficiently analyze large amounts of data, a paid license is required. We hold a fee promotion about once a year, so we recommend purchasing a paid membership license at that time. For companies utilizing OSINT, we also recommend purchasing a paid license.
  • Accessing unauthorized systems using the information learned in this course is illegal. Please use it only for research purposes and to monitor the security of your own services.

Features of this course

  • We'll explain recent security threats using open search services, connecting them from both attack and breach response perspectives. Simply listening to the various hacking cases will help you stay abreast of the latest trends.

A case of intrusion using a vulnerability in the REST API provided by Elasticsearch.

  • We will teach you how to use the API provided by OSINT and provide tips that can be applied immediately in the field.

Practice downloading required data from the shodan console

  • During the lecture, we will create an API using Python programs and explore advanced utilization methods, along with practical quizzes.

Shodan Search Using Python - Anonymous FTP Open Case


Who created this course
Introducing the knowledge sharer.

Jo Jeong-won (Security Project Representative)

History

  • Security Project Manager and Representative
  • CEO of One For All Co., Ltd.
  • Former KB Securities IT Planning Information Protection Department
  • Former A3 Security Mock Hacking Team
  • Security consulting and training for over 200 large and small businesses
  • Multi-Campus IT Security External Expert Instructor
  • Visiting Professor, Department of Industrial Security, Chung-Ang University
  • Visiting Professor, Seoul Digital University

published books

  • Android Mobile App Simulated Hacking (Acorn Publishing, 2017)
  • Complete Web Hacking Simulator Using Vibox (Hanbit Media, 2016)
  • IT Engineer's Second Job, Book Review (Bifan Books, 2015)
  • Using BuffSuite and Web Simulated Hacking (Hanbit Media, 2015)
  • WordPress Plugin Vulnerability Analysis and Simulated Hacking (Hanbit Media, 2015)
  • How to Live as an IT Engineer 1 (Bifan Books, 2015)
  • Android Mobile Malware and Simulated Hacking Diagnosis (Acorn Publishing, 2014)
  • What is Simulated Hacking? (Wikibooks, 2014)
  • Simulated Hacking Using Kali Linux (Acorn Publishing, 2014)
  • The World of Digital Forensics (Info the Books, 2014)
  • Hacker, the Cracker Detective (Seongandang, 2010)
  • Published over 30 books

Recommended for
these people

Who is this course right for?

  • Those who have chosen the mock hacking career path

  • Anyone who wants to apply OSINT to breach incident analysis and response

  • Anyone who wants to learn the basics of OSINT

  • Anyone who wants to develop security using Python API

  • For those of you who are curious about how cybercriminals are leveraging OSINT

Need to know before starting?

  • Security Terms

  • Security Hacking Interest

  • Python Basics

Hello
This is

100,584

Learners

3,028

Reviews

443

Answers

4.7

Rating

67

Courses

보안프로젝트 ( www.boanproject.com )는 IT보안, 빅데이터, 머신러닝, IoT 등 다양한 분야의 온라인 강의, 그룹 강의를 진행하고 있습니다. 

Curriculum

All

55 lectures ∙ (8hr 43min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

22 reviews

4.8

22 reviews

  • bayessec님의 프로필 이미지
    bayessec

    Reviews 1

    Average Rating 5.0

    5

    100% enrolled

    • 최경성님의 프로필 이미지
      최경성

      Reviews 2

      Average Rating 5.0

      5

      31% enrolled

      • netbus83님의 프로필 이미지
        netbus83

        Reviews 1

        Average Rating 5.0

        5

        98% enrolled

        • nwaden님의 프로필 이미지
          nwaden

          Reviews 2

          Average Rating 5.0

          5

          31% enrolled

          • 이종주님의 프로필 이미지
            이종주

            Reviews 19

            Average Rating 5.0

            5

            31% enrolled

            Limited time deal ends in 16:35:25

            $41,250.00

            25%

            $42.90

            boanproject's other courses

            Check out other courses by the instructor!

            Similar courses

            Explore other courses in the same field!