FIELD MANUAL
// Search Filters
For Beginners: Shodan uses filters to narrow searches.
Combine multiple filters (like port:80 country:US) for precise results.
Always search ethically - viewing is research, accessing without permission is illegal.
Public Webcams
Find internet-connected camera feeds that are publicly accessible or using default credentials. Common in surveillance systems, traffic cameras, and consumer security cameras.
webcamxp
product:"Hikvision"
Remote Desktop
Locate exposed Windows Remote Desktop Protocol (RDP) services. Port 3389 is the default for RDP. These should never be directly exposed to the Internet without VPN protection.
port:3389
has_screenshot:true
Industrial Control
Discover Modbus protocol devices (port 502) used in industrial automation, power plants, and manufacturing. These systems control physical processes and should be isolated from the Internet.
port:502
port:502 Modbus
Location Filter
Narrow searches to specific countries or cities using geographic filters. Essential for regional security assessments or finding devices in a target location.
country:AE city:"Dubai"
country:US city:"New York"
CVE Vulnerabilities
Search for devices affected by specific CVE (Common Vulnerabilities and Exposures) identifiers. Critical for finding unpatched systems vulnerable to known exploits.
vuln:CVE-2019-0708
vuln:CVE-2021-44228 country:AE
Examples: CVE-2019-0708 (BlueKeep RDP), CVE-2021-44228 (Log4Shell)
ACTIVE MISSION
LIVE RECON🖥️ The Forgotten Desktop
YOUR MISSION: While researching exposed Remote Desktop servers, I stumbled upon something interesting in Abu Dhabi. There's a Windows login screen visible online showing a user profile. Can you find this exposed RDP server and identify the name displayed on the login screen?
Hint: Look for Remote Desktop Protocol (RDP) services with screenshots in Abu Dhabi.