Black & White Path
Black & White Path
Apr 18, 2026 · Information Security

How to Locate FortiClient EMS Servers with Google and Shodan

The article explains the FortiGhost (CVE‑2026‑21643) pre‑authentication SQL injection RCE vulnerability in FortiClient EMS and provides specific Google and Shodan search queries—title, HTML content, and favicon hash—to discover vulnerable instances.

CVE-2026-21643FortiClient EMSFortiGhost
0 likes · 1 min read
How to Locate FortiClient EMS Servers with Google and Shodan
Programmer DD
Programmer DD
Jun 4, 2023 · Information Security

How to Secure Your ChatGPT‑Web Deployment from Free API Exploits

This article explains how the default title of the open‑source ChatGPT‑web project makes deployments vulnerable to discovery by asset‑search engines like FOFA and Shodan, leading to unauthorized API usage, and provides practical steps—changing the title and adding authentication—to protect the site and prevent unexpected costs.

AuthenticationChatGPT-webFOFA
0 likes · 6 min read
How to Secure Your ChatGPT‑Web Deployment from Free API Exploits
Open Source Linux
Open Source Linux
Dec 28, 2022 · Information Security

Discover Real IPs with Fav‑up: A Shodan‑Powered Favicon Recon Tool

Fav‑up is a Python‑based reconnaissance utility that uses Shodan and website favicons to locate the true IP addresses of target services, offering command‑line options, module integration, and output formats for efficient network asset discovery.

CLI toolIP enumerationNetwork Reconnaissance
0 likes · 4 min read
Discover Real IPs with Fav‑up: A Shodan‑Powered Favicon Recon Tool
Liangxu Linux
Liangxu Linux
Nov 28, 2021 · Information Security

How to Use Shodan’s Python SDK for Device Discovery and Analysis

This guide explains what Shodan is, why internet‑connected devices are vulnerable, and provides step‑by‑step instructions—including environment setup, API key registration, basic Python searches, and advanced facet queries—to safely explore and analyze exposed devices.

APIDevice DiscoveryFacets
0 likes · 6 min read
How to Use Shodan’s Python SDK for Device Discovery and Analysis
Liangxu Linux
Liangxu Linux
Jul 8, 2021 · Information Security

Discover Real IPs with Fav-up: Shodan‑Powered Favicon Lookup Tool

Fav-up is a Python‑based utility that combines Shodan data and website favicons to help security researchers uncover the true IP addresses of target services, offering flexible command‑line options, module integration, and output formats for comprehensive IP discovery.

Fav-upIP discoveryShodan
0 likes · 5 min read
Discover Real IPs with Fav-up: Shodan‑Powered Favicon Lookup Tool
Liangxu Linux
Liangxu Linux
Oct 6, 2020 · Information Security

How I Uncovered a Phishing Mooncake Email Using Wireshark, Shodan, and OSINT

During the Mid‑Autumn Festival I received a seemingly harmless mooncake email, suspected it was a phishing test, and then used a virtual machine, network‑capture tools, Shodan, and open‑source intelligence to trace the malicious link back to its source and exposed the underlying infrastructure.

Information SecurityNetwork ReconnaissanceOSINT
0 likes · 4 min read
How I Uncovered a Phishing Mooncake Email Using Wireshark, Shodan, and OSINT
MaGe Linux Operations
MaGe Linux Operations
Dec 3, 2019 · Information Security

How I Exposed a Camera‑Based Ransomware Ring: From Shodan Scan to Remote Control

A hacker recounts how a desperate request led to a full‑scale investigation of insecure IoT cameras, using Shodan to discover default credentials, reverse‑engineering a malicious Android app, infiltrating a cloud server, and ultimately dismantling a ransomware operation that harvested nude videos.

APK reverse engineeringIoT vulnerabilityRemote Access Trojan
0 likes · 10 min read
How I Exposed a Camera‑Based Ransomware Ring: From Shodan Scan to Remote Control
ITPUB
ITPUB
Jan 16, 2017 · Information Security

Why Thousands of MongoDB Databases Were Wiped and Ransomed – What You Must Do

Thousands of MongoDB databases were erased and replaced with ransom demands, yet almost no victims recovered their data, highlighting widespread misconfigurations, public exposure on Shodan, and the urgent need for proper security hardening of MongoDB deployments.

MongoDBShodandata breach
0 likes · 4 min read
Why Thousands of MongoDB Databases Were Wiped and Ransomed – What You Must Do