shodan-reconnaissance
Discover Exposed Devices with Shodan
Identify vulnerable services and exposed devices on the internet using Shodan's comprehensive reconnaissance capabilities for penetration testing and security research.
تنزيل ZIP المهارة
رفع في Claude
اذهب إلى Settings → Capabilities → Skills → Upload skill
فعّل وابدأ الاستخدام
اختبرها
استخدام "shodan-reconnaissance". shodan host 1.1.1.1
النتيجة المتوقعة:
IP: 1.1.1.1
Hostnames: one.one.one.one
Country: Australia
Organization: Mountain View Communications
Ports: 53/udp, 80/tcp, 443/tcp
استخدام "shodan-reconnaissance". shodan search 'product:nginx country:US'
النتيجة المتوقعة:
Results found: 125,432
Sample IPs:
- 203.0.113.10: 80/tcp (nginx)
- 198.51.100.25: 443/tcp (nginx)
التدقيق الأمني
مخاطر منخفضةStatic analyzer flagged 138 potential issues, but manual evaluation confirms all are false positives. The skill teaches legitimate use of Shodan, a recognized security research tool. Code examples show bash commands (not Ruby execution), placeholder API keys (not real secrets), and public/placeholder IP addresses. Includes explicit authorization requirements. Risk level set to LOW.
مشكلات متوسطة المخاطر (4)
عوامل الخطر
⚙️ الأوامر الخارجية (98)
🌐 الوصول إلى الشبكة (18)
🔑 متغيرات البيئة (6)
درجة الجودة
ماذا يمكنك بناءه
Penetration Testing Reconnaissance
Use Shodan to discover exposed services and vulnerabilities in target infrastructure during authorized security assessments.
Organization Asset Discovery
Map public-facing assets belonging to target organizations for attack surface analysis.
IoT and Vulnerability Monitoring
Find exposed IoT devices and services vulnerable to known CVEs across the internet.
جرّب هذه الموجهات
Use the shodan-reconnaissance skill to find information about IP address 1.1.1.1. What services are running and what country is it located in?
Find all hosts in the US running vulnerable versions of Log4j (CVE-2021-44228) using Shodan search filters.
Perform reconnaissance on an organization. Search for all hosts belonging to Google and get statistics on their infrastructure including ports and products.
Find hosts with SSL certificates for example.com domain. Show how to search for expired or self-signed certificates.
أفضل الممارسات
- Always obtain written authorization before scanning target networks
- Use Shodan credits efficiently by starting with free count queries
- Combine multiple search filters to narrow results and find specific vulnerabilities
تجنب
- Using Shodan to target systems without authorization is illegal and unethical
- Do not rely solely on Shodan data for vulnerability assessment - verify findings manually
- Avoid excessive scanning that may trigger rate limits or account suspension
الأسئلة المتكررة
Is Shodan legal to use?
Do I need a paid Shodan account?
Can this skill help me hack systems?
How accurate is Shodan data?
What are Shodan credits?
Can I scan private IP ranges?
تفاصيل المطور
المؤلف
sickn33الترخيص
MIT
المستودع
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/shodan-reconnaissanceمرجع
main
بنية الملفات
📄 SKILL.md