Important notes/tricks for shodan:

  1. To find all information related to *.target.*, you first need to identify the organization's name. You can do this by clicking the lock icon -> connection is secure -> certificate is valid.

  2. Use this dork to find all information related to .target.

    FzAA0ZyXwBg9dPq.jpg

  3. If you are targeting a specific TLD such as *.target.com, then use this dork as shown below.

    FzAA0y3X0AEefK8.jpg

  4. Hunting on a huge domain will give you loads of results. To filter unnecessary results like say "Invalid URL", use this dork.

    FzAA1NrXwBcXL0C.jpg

  5. You can check all http titles and other info related to the target at "Facet Analysis". Say if you've found pages with "302 Found" in title when filtering with http.title and want to look at these IPs only, use this dork.

    FzAA1l3X0AEpPU7.jpg

  6. Tip: Sometimes domain names will not be accessible, but their corresponding IPs found in shodan will give you live pages. In such scenarios dork for this domain name in Google, Bing, URLScan, Web Archive and more.

  7. If you have got lot of cached entries for the target domain, check manually if some directory is accessible. Try to understand what sort of error you are getting when accessing certain pages and guess the web server used. Then you can do content discovery on the page.

  8. You can also use status codes like 302, 200, 403 in the dork to find pages corresponding to that. It's interesting to look at pages with 403.

  9. Sometimes you can bypass WAF by accessing the IP of the page rather than the domain name. Once you've an IP without WAF, fuzz intelligently.

  10. If you have a windows app domain like IIS Web Server Page, then dork for more results on this domain in Bing for better results.