Table Of Contents :
Exploiting the internet with shodan part -2
Industrial Control Systems
Here, we are going to exploit industrial control systems like wind turbines, automated licence plate readers, Hacked Ubiquiti Networks Device, Surveillance cameras, user: admin, no password and many more.
# XZERES Wind Turbine
shodan search 'title:"xzeres wind"'




Note: You can search on the web interface or on command line, but search fillters can only used by API subscription.
But, you can download and see the search results in the command line.
# PIPS Automated License Plate Reader
shodan search 'html:"PIPS Technology ALPR Processors"'
Note: You can search on the web interface or on command line, but search fillters can only used by API subscription.
But, you can download and see the search results in the command line.
# XZERES Wind Turbine
shodan search 'title:"xzeres wind"'




# Modbus
port:502 modbus


Modbus is a serial communication protocol developed by Modicon published by Modicon® in 1979 for use with its programmable logic controllers (PLCs). In simple terms, it is a method used for transmitting information over serial lines between electronic devices.
# Niagara fox
Niagara Fox Protocol is a building automation protocol used between the Niagara software systems by Tridium.
port:1911,4911 product:Niagara fox


# GE-SRTP
port:18245,18246 product:"general electric"


#MELSEC-Q
port:5006,5007 product:mitsubishi


# CODESYS
port:2455 operating system


Note: You can search on the web interface or on command line, but search fillters can only used by API subscription.
But, you can download and see the search results in the command line.
# XZERES Wind Turbine
shodan search 'title:"xzeres wind"'




or, CLI mode
shodan search 'port:2455 operating system'
# Crimson v3.0
port:789 product:"Red Lion Controls


or, CLI mode
shodan search 'port:789 product:"Red Lion Controls"'