Abstract
In recent years, cyberattacks have increased in sophistication, using a variety of tools to exploit vulnerabilities across the global digital landscapes. Among the most commonly used tools at an attacker’s disposal are Google dorks, Shodan, and Censys, which offer unprecedented access to exposed systems, devices, and sensitive data on the World Wide Web. While these tools can be leveraged by professional hackers, they have also empowered “Script Kiddies”, who are low-skill, inexperienced attackers who use readily available exploits and scanning tools without deep technical knowledge. Consequently, cyberattacks targeting critical infrastructure are growing at a rapid rate, driven by the ease with which these solutions can be operated with minimal expertise. This paper explores the potential for cyberattacks enabled by these tools, presenting use cases where these platforms have been used for both offensive and defensive purposes. By examining notable incidents and analyzing potential threats, we outline proactive measures to protect against these emerging risks. In this study, we delve into how these tools have been used offensively by attackers and how they serve defensive functions within cybersecurity. Additionally, we also introduce an automated all-in-one tool designed to consolidate the functionalities of Google dorks, Shodan, and Censys, offering a streamlined solution for vulnerability detection and analysis. Lastly, we propose proactive defense strategies to mitigate exploitation risks associated with such tools, aiming to enhance the resilience of critical digital infrastructure against evolving cyber threats.
1. Introduction
The vast amount of data and devices connected to the Internet today, estimated at over 29.3 billion IoT devices by 2023, poses a significant challenge for cybersecurity experts globally []. These connected devices generate massive amounts of data, which are projected to reach 79 zettabytes in 2025, creating an increasingly appealing target for cyber attackers who exploit vulnerabilities in Internet-connected systems []. Figure 1 showcases the distribution of detected global cyberattacks by type in 2022 [,].
Figure 1.
Distribution of detected worldwide cyberattacks by type in 2022.
According to the data, as depicted in Figure 1, in 2022, cyberattacks were dominated by ransomware, which accounted for 68.42% of all detected incidents. Ransomware attacks involve malicious software that encrypts a victim’s files, with hackers demanding a ransom payment for their release. Following ransomware, network breaches made up 18.42% of attacks, where unauthorized access to networks allows attackers to steal data, cause disruptions, or plant further malware. Data exfiltration, representing 3.95%, involves the theft of sensitive data from systems, often targeting confidential or personal information. Closely linked are loaders, which comprised 3.29% of attacks; these are initial malware payloads designed to deliver other harmful software onto a victim’s system, setting the stage for more dangerous attacks. Web shells, at 2.63%, are scripts that provide hackers with a backdoor to control compromised web servers, often used for persistent unauthorized access. Another 2.63% of attacks were data extortion, where attackers steal data and threaten its release unless a ransom is paid, which is distinct from ransomware in that it focuses on the threat of exposure. Lastly, coin miners, though only 0.66% of attacks, are a form of malware that hijacks a victim’s computer resources to mine cryptocurrencies, consuming processing power and energy for the attacker’s benefit. These varied attacks highlight the diverse tactics cybercriminals employ, ranging from direct financial gain to subtle, long-term resource exploitation [].
In order to execute such a cyberattack, the hacking process typically unfolds in several distinct phases (as depicted in Figure 2), starting with reconnaissance, where attackers gather information about their target to identify potential weaknesses [,,,]. This stage can involve passive methods, like scanning public websites, or active techniques, such as engaging directly with the target’s systems to collect detailed data [,,,]. Once sufficient information is obtained, the hacker moves on to the scanning phase, using tools to scan the underlying networks, identify open ports, and detect vulnerabilities in the target’s infrastructure. The aim here is to pinpoint exploitable weaknesses that can be targeted later. Following the scanning phase, the hacker attempts to gain access by exploiting the vulnerabilities discovered. This could involve using malware, exploiting software flaws, or employing tactics, like phishing, to infiltrate the system. If successful, the attacker shifts to maintaining access, ensuring they can repeatedly enter the compromised system without detection. This often involves installing backdoors, rootkits, or trojans that provide persistent access even if the original vulnerability is patched. On the other hand, to avoid detection, the hacker will then work on covering their tracks, removing or modifying any logs, files, or system traces that could reveal their presence. This step is crucial for remaining anonymous and evading cybersecurity defenses. Sometimes, an additional phase, called exfiltration, is included, where the attacker extracts valuable data from the target system. This stage focuses on the covert transfer of sensitive information, which can include personal details, intellectual property, or financial records. Understanding these hacking phases is vital for cybersecurity professionals, as it helps them develop targeted defenses to detect and mitigate each stage of an attack.
Figure 2.
Key steps involved in executing a cyberattack.
To execute such cyberattacks, cyber attackers frequently use advanced search engines and network discovery tools, such as Google dorks, Shodan, and Censys, to locate vulnerabilities in such public-facing assets. These tools, initially intended to help researchers and ethical hackers, have been increasingly exploited by “script kiddies”, who are unskilled individuals using automated tools to initiate cyberattacks [,].
Whilst executing such cyberattacks, reconnaissance is often considered the most critical phase of a cyberattack because it lays the groundwork for the entire attack operation [,,,,]. In this phase, attackers gather as much information as possible about their target to identify vulnerabilities and determine the best attack strategies. Effective reconnaissance maximizes the chances of success in the later stages, such as scanning and gaining access, by minimizing guesswork and focusing efforts on the weakest points of a target. Tools like Google dorks, Shodan, and Censys are particularly powerful in this phase because they provide deep insights into the target’s public-facing infrastructure [,,].
Google dorks allows attackers to use advanced search queries to discover sensitive information, such as exposed login pages, unsecured databases, and misconfigured directories, that are indexed by search engines but are not intended to be public [,,,,,,,]. This method can reveal significant vulnerabilities with minimal effort, providing a low-cost and efficient way to gather detailed information. Shodan on the other hand, known as the “search engine for hackers”, scans and indexes Internet-connected devices, including servers, webcams, routers, and industrial control systems [,,,]. It provides detailed information about the software versions, open ports, and configurations of these devices, allowing attackers to pinpoint weaknesses in IoT systems and critical infrastructure. Similarly, Censys offers comprehensive visibility into the Internet’s infrastructure by indexing devices, certificates, and services, enabling attackers to map a target’s digital footprint with high accuracy []. These tools are vital because they automate and expedite the information-gathering process, reducing the need for manual probing and making the reconnaissance phase faster and more effective.
By using such tools, attackers can conduct stealthy and efficient reconnaissance, gathering enough intelligence to craft tailored attacks without triggering alarms or interacting directly with the target, thus avoiding detection. This makes reconnaissance not only the most important phase but the safest and least intrusive stage of a cyberattack, setting the stage for more aggressive tactics to follow.
Google dorks, originally intended for refining search results, enables attackers to uncover sensitive information, like unsecured websites, files, databases, exposed admin panels, and login credentials, by using specific search parameters. In a recent analysis, 43% of organizations admitted having at least one internet-facing vulnerability discoverable via Google dorks, emphasizing the ease of access to critical weaknesses [,,,,]. Similarly, Shodan, a search engine for IoT devices, indexes millions of exposed assets, ranging from industrial control systems and servers to unsecured cameras. It is estimated that 58% of IoT devices connected to the Internet are vulnerable to common exploits, making them prime targets for cyberattacks [,]. On the other hand, Censys offers a comprehensive view of internet-connected devices and services, highlighting potential weaknesses in system configurations. In 2023, a study found that about 35% of publicly accessible databases could be identified using tools like Shodan and Censys, demonstrating how these platforms can be used for both defensive and malicious purposes [,]. Such incidents highlight the critical need for advanced security measures and constant vigilance, as the global cost of cybercrime is expected to reach $10.5 trillion annually in 2025 []. Cybersecurity professionals must stay ahead of these threats by continuously monitoring and securing public-facing assets, utilizing the same tools in ethical ways to preempt potential attacks.
Overall, Google dorks, Shodan, and Censys are particularly valued in the reconnaissance phase because they each offer unique capabilities that make information gathering both efficient and comprehensive in a really simple way. Unlike other reconnaissance tools that require direct scanning, potentially alerting the target, Google dorks, Shodan, and Censys extract publicly available data, maintaining a stealthy approach that minimizes detection risk. This combination of visibility, depth, ease of use, and non-intrusive information gathering make these three tools the preferred choice for reconnaissance over other available options and have become popular even among inexperienced cyber criminals. Thus, motivated by the fact that they are becoming common and appealing solutions for offensive cyberattacks, this paper aims to examine the ways in which these tools are misused by cyber criminals, providing an in-depth look at the risks associated with their misuse. Nonetheless, we also explore defensive strategies to mitigate such kinds of attacks. In this regard, the major contributions of this study are as follows:
- Provide a brief overview of Google dorks, Shodan, and Censys, highlighting their functionalities and how they work; also highlight the latest state of the art with their application context and major contributions.
- Explore the potential for cyberattacks enabled by these tools, presenting use cases where these platforms have been used for both offensive and defensive purposes.
- Propose proactive defense strategies to mitigate exploitation risks associated with Google dorks, Shodan, and Censys, aiming to enhance the resilience of critical digital infrastructure against evolving cyber threats.
- Introduce an automated all-in-one tool designed to consolidate the functionalities of Google dorks, Shodan, and Censys, offering a streamlined solution for vulnerability detection and analysis.
The remainder of this study is organized as follows: Section 2 presents a brief overview of Google dorks, Shodan, and Censys, along with a discussion of the script kiddies who frequently use these tools. Section 3 explores use cases where these tools have been employed for offensive exploitation purposes. Section 4 discusses defensive use cases, while Section 5 highlights the development of an automated all-in-one Python-based console application designed to consolidate the functionalities of Google dorks, Shodan, and Censys. Section 6 highlights the defense strategies that can counter cyberattacks facilitated by these tools. Finally, this study concludes with a summary.
2. Background and Overview of Script Kiddies, Google Dorks, Shodan, and Censys
This section aims to provide a concise overview of script kiddies, detailing the tools they commonly use, including Google dorks, Shodan, and Censys. Further, it also highlights the functionalities and applications of these tools and summarizes recent advancements in related research.
2.1. Who Are Script Kiddies?
Script kiddies are inexperienced hackers who use pre-built tools and automated scripts to launch cyberattacks without much technical understanding [,,]. Unlike professional hackers who create unique scripts, malware, or exploits, using specialized expertise, script kiddies employ pre-built tools, scripts, and automated programs created by others. These tools allow them to launch attacks without understanding the complexities of the technology they are exploiting, making it simple to carry out cyber-attacks with little effort [,,]. One distinguishing feature of script kiddies is their excessive dependence on automated tools and pre-existing scripts. Rather than carrying out complex cyberattacks manually, they rely on software and tools that exploit existing weaknesses, such as Google dorks (a popular tool for obtaining information passively), Shodan (used to scan inter-networked devices), Censys (used to scan, monitor, and index devices, systems, and networks connected to the Internet), and Metasploit (used to attack system vulnerabilities) [,,,]. These tools are generally available on hacker forums, the dark web, or online groups, making them easily accessible to new attackers.
Script kiddies are frequently driven by a need for attention or just the joy of causing a disturbance. Unlike hackers motivated by ideological ideas or financial gain, script kiddies prefer to target high-profile but easily accessible systems, such as social media accounts, unprotected IoT devices, or websites with poor security [,,,]. On the other hand, because of their poor technical understanding, script kiddies concentrate on easy targets with weak or obsolete security protections that can be easily compromised. While script kiddies may appear to be less hazardous than more experienced hackers, their sheer quantity and frequent, wide targeting can considerably increase risk and create long-term security difficulties for enterprises and individuals [,,,].
While many script kiddies remain at the novice level, some script kiddies improve their abilities over time and eventually progress to more expert hacking. For some, these first ventures into hacking might serve as a springboard to more advanced cybercriminal actions. Thus, while script kiddies are frequently viewed as low-level risks who use tools that require less expertise, their actions contribute to the greater cybersecurity picture and highlight the importance of effective defenses against all types of attackers, regardless of competence.
2.2. Google Dorks
Google dorks, also known as Google hacking, refers to using advanced search queries to identify hidden or exposed information through the Google search engine [,]. For years, professional hackers have used these search strings to discover sensitive data, unsecured databases, and web application vulnerabilities. However, with the publication of dorking techniques on hacker forums and social media, even low-skilled attackers, who are often referred to as script kiddies, can operate such tools with ease.
Johnny Long, a computer security specialist, first unveiled Google dorks in 2002 [,]. Google dorks has come a long way since its creation as an obscure approach to one of the most well-known open-source intelligence (OSINT) techniques in the cybersecurity and IT worlds, while also improving search capabilities [,,]. Overall, the use of Google dorks has gradually increased as a result of the community’s important contributions in developing new search strategies and operators. These joint efforts have resulted in more exact search results and assessments, establishing Google dorks as an effective tool for information discovery [,,,].
Google dorking uses custom queries using sophisticated search operators (particular symbols or phrases) to retrieve focused search results []. The custom Google dork query only needs to be put into the Google search field, as showcased in Figure 3 (the dork query searches for directories with “index of” in the title and “passwords” in the text, and it is used to find publicly accessible directories that might contain sensitive password information). To adhere to ethical and privacy guidelines, certain data and specific outcomes have been omitted from the study in order to uphold ethical standards and ensure the protection of privacy.
Figure 3.
Example of a Google dork query.
When the Google search engine crawls the web, it indexes numerous aspects of web pages, some of which may not be apparent to normal visitors, whereas Google dorks allows normal users to retrieve this information using sophisticated Google search queries [,,]. While Google dorking is legal and effective for acquiring publicly available data, it must be used carefully and ethically. Attempting to exploit security flaws in website setups or code without authorization violates most websites’ terms of service and may result in legal implications if traced and found.
Security researchers and authorized staff performing penetration testing frequently employ Google dorking to locate particular information or possible vulnerabilities on the Internet by constructing complex search queries. While tools like Google Search Console assist website owners in optimizing their sites for more visibility, Google dorking enables security experts to uncover unintended exposures of sensitive information or security threats [,]. Nonetheless, Google dorking is also used as a passive reconnaissance technique during the early step of penetration testing. This approach requires the use of predetermined search words, known as dorks, which are cataloged in sites, such as the Google Hacking database, which has thousands of dorks for a variety of purposes [].
On the other hand, cybercriminals employ Google dorking as a passive attack approach to find and exploit vulnerabilities in poorly secured websites. Hackers may utilize sophisticated Google dorks to gain access to sensitive information, such as usernames, passwords, and personal identifying information. As a result, it is critical to proceed with caution and avoid employing Google dorks to gain unauthorized access to private or restricted material, since this might have legal ramifications. Table 1 lists 10 widely used Google dork queries and their respective actions.
Table 1.
Examples of Google dork queries.
Having provided a brief overview of Google dorks and how it has been used with example queries, Table 2 categorizes the recent relevant research in the domain, highlighting their application context and major contributions.
Table 2.
Summarization of recent related state-of-the-art studies.
2.3. Shodan
Shodan is an Internet search engine designed to index publicly accessible devices connected to the Internet, including webcams, routers, SCADA systems, and IoT devices [,,]. It is often referred to as “The search engine for the IoT”, because it allows users to discover and explore Internet-connected devices worldwide. While Shodan provides valuable insights for security researchers, it has also become a common tool for cyber criminals, including script kiddies, due to its straightforward interface and vast database of exposed systems. Shodan was designed by computer scientist John Matherly as a hobby to track any type of device connected to the Internet [,,].
Shodan’s indexing works by scanning open ports on Internet-connected devices and services, gathering information on their public interfaces rather than focusing on web pages like traditional search engines. Instead of indexing site content, Shodan collects “banners”, the information that services provide in response to requests, which reveal details about the device or software configuration. This process includes scanning for various protocols, such as HTTP, HTTPS, FTP, SSH, Telnet, SNMP, and SIP, allowing Shodan to catalog a wide range of Internet-connected services [].
Users can leverage Shodan’s filtering tools to search for specific devices within particular geographic regions or by applying other criteria [,,,,]. The breadth of Shodan’s reach is extensive and has raised concerns due to its ability to find virtually any device connected to the Internet. As Vice aptly put it, Shodan has been called “The most dangerous search engine in the world”, because it can locate everything from smartphones and refrigerators to security cameras and even nuclear plants, that are exposed online [,,,,]. Further, Shodan collects information through the Internet’s public-facing interfaces and compiles it into a searchable database. This data provides insights into not only what devices are online but their configurations, vulnerabilities, and software details.
Overall, Shodan has become a crucial tool in cybersecurity, as it highlights devices that may be inadvertently exposed to the Internet without adequate security. By searching for specific devices or network types, users can uncover systems with weak security settings, default passwords, or outdated firmware. As a result, Shodan is valuable for both security researchers and cyber criminals, who may exploit exposed systems. Ethical hackers and organizations leverage Shodan to identify and address potential risks in their networks proactively, while malicious users might target vulnerable systems for cyberattacks.
One of the key features of Shodan is its ability to filter searches by criteria, such as geographic location, device type, and operating system, allowing users to perform highly targeted scans [,,]. Shodan has both free and paid versions, with the latter offering more advanced tools and access to a broader database of indexed devices. The tool has raised important discussions around the security of IoT devices and the need for improved security standards, as many users are often unaware of the vulnerabilities these devices may introduce. Shodan underscores the growing intersection between cybersecurity and everyday technology, making it both a valuable research tool and a reminder of the importance of safeguarding connected devices. Figure 4 showcases an example of a Shodan query that returns a list of IP addresses for devices running Apache within the specified country. Nonetheless, as shown in Figure 5, to narrow results further, filters can be added specifying open ports (e.g., port 80 for HTTP or port 443 for HTTPS).
Figure 4.
Example of a Shodan query that returns a list of IP addresses for devices running Apache within the specified country: United States.
Figure 5.
Example of a Shodan query with filtered options.
In order to better understand how Shodan works, Table 3 showcases 10 widely used Shodan queries and their respective actions.
Table 3.
Example of Shodan queries.
Having provided a brief overview of Shodan and how it has been used with example queries, Table 4 categorizes the recent relevant research in the domain, highlighting their application context and major contributions.
Table 4.
Summarization of recent related state-of-the-art studies.
2.4. Censys
Censys is a powerful search engine that continuously scans the Internet, mapping out exposed devices, services, and vulnerabilities, making it a valuable resource for cybersecurity professionals [,,]. While similar to Shodan, Censys takes a more analytical approach, allowing users to filter devices based on a range of protocols, configurations, and vulnerabilities. Although intended for security experts, it can also be used by less experienced individuals to identify potentially weak targets over the Internet [,,,].
Available at censys.io, the platform serves as a critical tool for assessing the attack surface of Internet-connected assets, including IoT and industrial internet of things (IIoT) devices, as well as ICSs. It supports various data ingestion formats (web UI, API, raw data, Google BigQuery), enabling users to integrate its data into any cybersecurity ecosystem, regardless of size [,,,,]. Censys also supports integration with prominent vulnerability management tools, logging aggregators, and other scanning systems, allowing seamless incorporation into enterprise security infrastructures [,,,].
For the users employing Censys for OSINT or cyber threat intelligence (CTI), it offers both free and paid accounts. A free account provides up to 250 queries per month, while a paid account offers more extensive access. Even without an account, users can view some publicly accessible data, as showcased in Figure 6 (the query finds all devices with a software product with the word “Windows” in it) [,,].
Figure 6.
Example of a Censys search to find all devices with a software product with the word “Windows” in it.
In order to better understand how Censys works, Table 5 showcases 10 widely used Censys queries and their respective functionalities.
Table 5.
Examples of Censys queries.
Having provided a brief overview of Censys and how it has been used with example queries, Table 6 categorizes the recent relevant research in the domain, highlighting their application context and major contributions.
Table 6.
Summarization of recent related state-of-the-art studies.
3. Use Cases of Employment of Google Dorks, Shodan, and Censys for Offensive Exploitation
3.1. Offensive Exploitation Use Cases of Google Dorks
Cybercriminals often leverage Google dorks to exploit vulnerabilities, capitalizing on its simplicity and ease of use []. By following online tutorials and pre-built dork queries, they can readily identify unprotected databases, exposed credentials, webcams, and sensitive data [,]. Table 7 discusses the major cyber security incidents that happened in recent years, that employed Google dorking techniques.
Table 7.
Cyber security incidents that employed Google dorking techniques.
In all these cases, Google dorks amplified the ease with which attackers could find sensitive data. Through simple search engine queries, cyber attackers without advanced skills were able to exploit vulnerabilities that had been indexed publicly. Overall, these incidents underscore the importance of restricting sensitive information.
3.2. Offensive Exploitation Use Cases of Shodan
Cybercriminals often use Shodan to gain unauthorized access to ICSs. Although ICSs were historically insulated from the Internet, many are now online due to remote monitoring needs, making them vulnerable to exploitation by even inexperienced attackers. Table 8 discusses the major cyber security incidents that happened in recent years, that employed Shodan.
Table 8.
Cyber security incidents that employed Shodan.
These examples demonstrate how Shodan provides attackers with a powerful tool to search for exposed ICS devices and critical infrastructure. Shodan’s ability to index Internet-connected devices, combined with insufficient security on these systems, has significantly increased the potential for industrial system attacks, underscoring the need for robust security measures in ICS environments.
3.3. Offensive Exploitation Use Cases of Censys
The rise of the IoT has introduced new vulnerabilities, and Censys provides a platform for attackers to identify such weak IoT devices. Cybercriminals exploit default credentials and poor security measures in IoT devices searched through Censys to create large botnets used for DDoS attacks. Table 9 discusses the major cyber security incidents that happened in recent years, that employed Censys.
Table 9.
Cyber security incidents that employed Censys.
4. Defensive Use of Google Dorks, Shodan, and Censys
In the context of cybersecurity, Google dorks, Shodan, and Censys are widely known for their offensive capabilities in discovering vulnerabilities across the Internet. However, these tools can also be employed defensively to improve an organization’s security posture by identifying exposed services, vulnerabilities, and misconfigurations before attackers can exploit them, which gives ample time to take precautionary actions. The following subsections briefly outline the defensive uses of each of these tools.
4.1. Google Dorks for Defense
Google dorks involves leveraging advanced search operators to query specific strings that could reveal sensitive information about web servers, applications, and configurations, as earlier mentioned [,,]. In a defensive capacity, security teams can use Google dorks to identify inadvertently exposed data, misconfigured databases, or sensitive files that are publicly accessible on the web, which should be secured [,,].
By regularly monitoring Google dork queries related to their domain, organizations can proactively discover vulnerabilities and eliminate potential attack surfaces before malicious actors exploit them. For instance, searching for exposed login pages, configuration files, or outdated software versions can help identify areas that need immediate attention [,,,]. On the other hand, Google dorks can be an essential tool for ethical hackers, who use it to audit exposed information and identify misconfigurations before malicious actors can. Regular audits using Google dorks can help prevent accidental data exposure and unauthorized access. For example, as a part of its bug bounty program in 2020, Google encouraged ethical hackers to use Google dorks to discover vulnerabilities in their systems. These efforts led to the early detection of numerous vulnerabilities, preventing them from being exploited by malicious cybercriminals [,,].
4.2. Shodan for Defense
Shodan, a search engine for IoT devices, indexes publicly accessible devices, services, and servers connected to the Internet [,,]. While Shodan is commonly used by attackers to identify vulnerable devices, it can also be leveraged defensively to monitor the organization’s network and the broader Internet for any exposed assets. Security teams can conduct routine Shodan searches for their IP ranges to detect exposed devices or services that may have been left unsecured or misconfigured [,,,]. For example, a company might use Shodan to identify IoT devices, such as cameras, routers, or ICSs, that are publicly accessible and prone to exploitation. With such insights, they can take corrective actions, such as applying patches, changing default passwords, or even disconnecting unnecessary services [,,]. This proactive approach minimizes the risk of cyber criminals exploiting open devices.
4.3. Censys for Defense
Censys is a powerful search engine designed to provide visibility into the Internet’s infrastructure by scanning and indexing web servers, websites, and IoT devices based on specific properties, such as software versions, encryption protocols, and service banners [,]. For cybersecurity professionals, Censys can be used to track changes in an organization’s infrastructure, identify potential vulnerabilities, and assess whether services are running outdated or insecure software, similar to Shodan.
On the other hand, Censys’s ability to scan large portions of the Internet continuously and provide detailed reports about vulnerabilities (such as those listed in the national vulnerability database) makes it an invaluable tool for defense teams [,,,,]. By integrating Censys into their regular vulnerability assessment workflows, organizations can gain real-time insights into potential threats and address them before attackers can exploit them. Several universities have incorporated Censys into their cybersecurity programs, teaching students how to secure IoT devices [,,]. This hands-on experience enables them to defend against cyber criminals who rely on publicly accessible IoT devices.
5. Development of Automated Cyber Threat Hunting Tool
After providing a brief overview of Google dorks, Shodan, and Censys, including their exploitation attempts and defensive uses, this section discusses the development of an automated all-in-one tool (Automated Cyber Threat Hunting V1.0) that integrates the functionalities of Google dorks, Shodan, and Censys. This tool offers a comprehensive platform for vulnerability detection and analysis. By automating the manual processes of searching and parsing data from these platforms, it enhances the efficiency of identifying exposed systems, devices, and sensitive information. Integrating these functionalities into a single tool saves time, reduces human error, and makes vulnerability detection more accessible to both cybersecurity professionals and individuals with limited expertise. The tool was developed using Python as a console-based application.
The development of the tool involved several key steps: (1) importing necessary libraries, (2) integrating API keys and secrets from Shodan and Censys, (3) automating data retrieval processes, and (4) consolidating results for streamlined analysis. The tool was refined through iterative testing to ensure accuracy and usability, culminating in its deployment as a Python-based console application.
The main intention behind developing this tool is to demonstrate that Google dorks, Shodan, and Censys can be effectively utilized not only for offensive purposes but as powerful resources for defensive and proactive cybersecurity measures. Integrating these tools into a single platform highlights their potential to enhance vulnerability detection and fortify critical systems against emerging threats.
5.1. Performance Metrics and Scalability Analysis
To evaluate the performance and scalability of the Automated Cyber Threat Hunting Tool V1.0, several metrics were considered:
Performance metrics:
- Response timeThe tool’s efficiency was measured by the average time it takes to retrieve and process results from Google dorks, Shodan, and Censys based on various queries.
- AccuracyThe precision of the results was evaluated by comparing the tool’s findings with manually verified vulnerabilities and exposed systems.
- Resource utilizationThe tool’s CPU and memory usage were monitored to assess its efficiency during the scanning and data consolidation processes.
- Success rateThe percentage of successful queries and retrieved results from each platform was tracked to measure the reliability of the tool.
Scalability analysis:
The tool was tested under varying conditions with increasing query volumes and system complexities. The performance was observed when processing queries with many filtration options from platforms like Shodan and Censys.
- ThroughputThe tool was assessed on how many queries it could handle within a given time frame, ensuring it can scale up to support enterprise-level operations.
- API limitationsThe tool’s scalability is also influenced by the API limits imposed by Shodan and Censys, which may impact its ability to handle large-scale data retrieval.
5.2. Tool Workflow and User Interaction
Once the user enters queries for Google dorks, Shodan, and Censys (as shown in Figure 7), the tool validates the input and processes it through its respective modules. For Google dorks, the tool generates a search URL that the user can access directly to view results (as shown in Figure 7). For Shodan and Censys, the tool uses API keys and credentials to securely interact with their services, retrieving data based on the user’s query. The results include details, such as exposed IPs, services, and sensitive information, depending on the platform’s functionality. The tool consolidates and presents these results in a user-friendly format, automating the traditional manual process of searching and parsing data. This allows users to efficiently identify vulnerabilities without needing in-depth expertise in using these platforms.
Figure 7.
Automated Cyber Threat Hunting Tool V1.0.
The tool’s significance lies in its ability to streamline the vulnerability scanning process, providing users with a unified solution for detecting critical risks in digital infrastructure. As cyberattacks continue to grow in sophistication, tools like this become essential for proactive defense strategies, which will be discussed in detail in the next section. By automating vulnerability searches and consolidating results, the tool helps users quickly identify potential threats, assess risks, and take immediate action to protect sensitive systems. It empowers cybersecurity teams to respond faster to emerging threats and bolsters the overall resilience of critical infrastructure against evolving cyber risks.
5.3. Limitations
In terms of the limitations of the developed tool, its reliance on API access to Shodan and Censys may affect its functionality if API quotas are exceeded, or access is restricted. The accuracy of the tool’s results relies on the timeliness of the data indexed by these platforms, which may sometimes lag behind real-time updates to exposed systems. While it excels at reconnaissance and vulnerability scanning, the tool does not extend to penetration testing or exploit analysis, limiting its scope of analysis. Furthermore, as with any cybersecurity tool, there is a potential risk of misuse if it falls into unauthorized hands, underscoring the need for ethical usage guidelines. Even though the developed tool simplifies many processes, users still require a fundamental understanding of cybersecurity concepts to interpret the results effectively and take appropriate actions.
6. Proactive Defense Strategies Against Exploitation
In the ever-evolving landscape of cybersecurity, organizations must adopt proactive defense strategies to stay ahead of potential attackers. Unlike reactive defense, which addresses threats after they occur, proactive defense emphasizes the anticipation of attacks, identifying vulnerabilities before exploitation, and taking steps to mitigate risks early. This approach not only improves an organization’s ability to prevent security breaches but strengthens its overall resilience against sophisticated cyber threats. The following lists the proactive defense strategies that can be taken against Google dorks, Shodan, and Censys.
- Vulnerability management and patch managementOne of the fundamental strategies in proactive defense is the identification and management of vulnerabilities in an organization’s systems. Regular vulnerability assessments using tools like Shodan, Censys, and Google dorks can help identify exposed assets, outdated software, and security misconfigurations that may be susceptible to exploitation [,,]. Once vulnerabilities are identified, patch management becomes crucial. This involves applying security patches, updates, and fixes promptly to prevent attackers from exploiting known vulnerabilities. Implementing automated patch management systems can reduce the risk of human error and ensure that updates are applied across the organization in a timely manner, making it more difficult for attackers to exploit known flaws.
- Network segmentation and least privilege accessAnother proactive defense measure is network segmentation, which involves dividing the network into smaller, isolated segments to limit the impact of a breach. If an attacker compromises one segment, they are restricted from moving laterally across the entire network [,]. This reduces the potential for exploitation of other critical systems. Additionally, the principle of least privileged access should be enforced, ensuring that users and systems are granted only the minimum permissions necessary to perform their tasks. This minimizes the attack surface and prevents attackers from gaining unauthorized access to sensitive data or critical infrastructure if they breach one part of the system [,].
- Continuous monitoring and threat intelligenceProactive defense strategies rely heavily on continuous monitoring to detect unusual activities and early indicators of compromise. Security information and event management (SIEM) tools can aggregate and analyze log data from across the network to identify suspicious patterns or signs of an attack in real-time. Threat intelligence services, such as those provided by vendors like FireEye, CrowdStrike, or open-source platforms like MISP, offer actionable insights into emerging threats and known attack methods that can be integrated into security protocols to prepare defenses accordingly [,,,]. By continuously monitoring the environment and incorporating threat intelligence, organizations can quickly identify and respond to potential attacks, even before they fully materialize [].
- Red teaming and penetration testingAnother highly effective proactive strategy is red teaming or penetration testing, where cybersecurity professionals simulate real-world attacks on the organization’s systems to identify vulnerabilities that could be exploited. Unlike traditional security audits, which focus on identifying specific vulnerabilities, red teaming provides a more comprehensive, adversarial approach that simulates the tactics, techniques, and procedures (TTPs) of actual cyber attackers [,,,,,]. This allows organizations to assess how well their defenses hold up against sophisticated attacks and identify weaknesses that may not be apparent through conventional testing. Penetration testing tools, like Metasploit and Nessus, help security teams uncover hidden vulnerabilities and flaws that could be exploited by attackers, providing them with actionable information to strengthen security before an attack occurs [,,,].
- User awareness and security trainingHuman error remains one of the most significant factors in security breaches, making security awareness training a critical component of proactive defense. Organizations should provide ongoing training to employees on recognizing phishing emails, avoiding suspicious links, and adhering to best security practices, such as strong password policies and multi-factor authentication (MFA). Social engineering attacks, such as phishing, remain a major vector for exploitation, and training users to be aware of these tactics is essential in preventing initial access to systems. Regular drills, phishing simulations, and cybersecurity workshops can help build a security-conscious culture, reducing the likelihood of successful exploitation through human vulnerabilities [,,,].
- Incident response planning and simulationProactive defense also includes having a well-defined incident response plan in place, which outlines the steps to take in the event of a breach. The plan should include procedures for containment, eradication, and recovery, ensuring that teams can respond swiftly to minimize damage. Conducting tabletop exercises and live simulations of cyberattacks can help prepare the response teams for real-world incidents. These exercises can identify gaps in the response plan and improve the organization’s ability to recover quickly from an attack [,,,].
- Regular vulnerability scanningUsing Google dorks, Shodan, and Censys proactively allows organizations to stay ahead of potential attackers. By regularly scanning for exposed data and devices, vulnerabilities can be identified and patched before script kiddies or more advanced attackers can exploit them [,,,].
- Implementation of strong access controlsLimiting access to sensitive systems through robust access controls is key to minimizing exposure [,,]. This is especially critical in preventing script kiddies from using automated tools to access exposed systems [,].
- Encryption and proper configurationEncrypting sensitive data and ensuring that devices are properly configured can significantly reduce the risk posed by cybercriminals. Strong encryption protocols make it harder for attackers to exploit exposed vulnerabilities even if they are identified through these tools [,,,,,,].
7. Conclusions
This paper explored the significant role of tools like Google dorks, Shodan, and Censys in modern cybersecurity, highlighting their dual nature as both assets and threats. These tools, initially designed for ethical purposes, are increasingly exploited by attackers, including low-skilled script kiddies, to locate vulnerabilities and launch sophisticated cyberattacks. Our findings emphasize the growing urgency for cybersecurity professionals to harness these tools defensively to mitigate the risks they pose. In the background and overview, we provided an in-depth analysis of script kiddies and their reliance on automated tools to exploit vulnerabilities in systems. By detailing the functionalities and evolution of Google dorks, Shodan, and Censys, we have demonstrated how these platforms simplify reconnaissance for attackers while offering valuable insights for defensive purposes. The inherent simplicity and accessibility of these tools make them both powerful and dangerous, depending on their application. The use cases section illustrated real-world incidents where these tools have been employed offensively. Google dorks has been instrumental in uncovering sensitive data through advanced search queries, as evidenced by major breaches like LinkedIn and Adobe. Similarly, Shodan has exposed vulnerabilities in critical infrastructure, such as the Ukrainian power grid and Tesla Powerpack systems, raising alarms about industrial system security. Censys has been used to identify weaknesses in IoT devices, with incidents like the Mirai botnet and healthcare IoT vulnerabilities demonstrating the far-reaching impacts of insecure connected devices. By contrast, the defensive applications of these tools were also highlighted. Organizations can use Google dorks to identify misconfigurations and exposed sensitive data, while Shodan and Censys allow for the detection of unsecured IoT devices, misconfigured systems, and outdated software. Employing these tools ethically enables organizations to preemptively address vulnerabilities and strengthen their cybersecurity posture. Nonetheless, with the addition of an automated all-in-one tool integrating these functionalities, we have demonstrated how these platforms can be harnessed for proactive defense. The tool streamlines vulnerability detection, reduces human error, and empowers users to efficiently identify and mitigate threats. By consolidating the capabilities of Google dorks, Shodan, and Censys into a single Python-based application, this development highlights their potential for enhancing critical infrastructure resilience. Ultimately, this work underscores the importance of adopting proactive strategies to address evolving cyber threats. The proactive defense strategies section outlined key measures to mitigate risks, including regular vulnerability scanning, patch management, network segmentation, and continuous monitoring. Emphasis was placed on fostering a culture of cybersecurity through user awareness training, red teaming exercises, and implementing robust incident response plans. These strategies ensure organizations can anticipate and counter potential threats effectively.
In conclusion, Google dorks, Shodan, and Censys exemplify the blurred lines between tools for protection and exploitation. Their widespread availability and powerful capabilities demand vigilant and ethical use. By adopting a proactive and layered defense strategy, organizations can leverage these tools to enhance their resilience against the ever-evolving cyber threat landscape. The findings of this study underline the critical importance of continuous monitoring, awareness, and adaptive defenses in safeguarding digital infrastructures.
Author Contributions
Methodology, N.N.T.; Software, N.N.T.; Validation, A.A. and N.N.T.; Investigation, N.N.T.; Resources, A.A. and N.N.T.; Data curation, N.N.T.; Writing—original draft, N.N.T.; Writing—review & editing, A.A.; Visualization, N.N.T.; Project administration, A.A. and N.N.T.; Funding acquisition, A.A. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by Qassim University (QU-APC-2024-9/1).
Institutional Review Board Statement
Not applicable.
Data Availability Statement
No new data were created or analyzed in this study. Data sharing is not applicable to this article.
Acknowledgments
The Researchers would like to thank the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support (QU-APC-2025).
Conflicts of Interest
The authors declare no conflicts of interest.
References
- IoT Analytics. State of IoT 2024: Number of connected IoT devices growing 13% to 18.8 Billion Globally. Available online: https://iot-analytics.com/number-connected-iot-devices/ (accessed on 27 October 2024).
- AI and the Global ‘Datasphere’: How Much Information Will Humanity Have By 2025? Available online: https://www.datauniverseevent.com/en-us/blog/general/AI-and-the-Global-Datasphere-How-Much-Information-Will-Humanity-Have-By-2025.html (accessed on 27 October 2024).
- LinkedIn. Are Your Smart Devices Putting Your Company at Risk? A Guide to Securing Your Connected Future. Available online: https://www.linkedin.com/pulse/your-smart-devices-putting-company-risk-guide-securing-connected-iiwsf/ (accessed on 27 October 2024).
- Cyber Security Breach Statistics 2024. Available online: https://www.stationx.net/cyber-security-breach-statistics/ (accessed on 27 October 2024).
- Palo Alto Networks. The 2024 Benchmark Report on IoT Security. Available online: https://www.paloaltonetworks.com/resources/research/the-2024-benchmark-report-on-iot-security (accessed on 27 October 2024).
- Evolve Security. The Actual Cost of Cybercrime. Available online: https://www.evolvesecurity.com/blog-posts/actual-cost-of-cybercrime (accessed on 27 October 2024).
- Kanakasabai, J.N.; Othman, S.H.; Siraj, M.M.; Rahman, M.H.; Darus, M.Z.A. Google Dorking Commands-based Approach for Assisting Forensic Investigators in Gender Identification of Social Media Text Data. In Proceedings of the 2023 3rd International Conference on Intelligent Cybernetics Technology & Applications (ICICyTA), Denpasar, Indonesia, 13–15 December 2023; pp. 466–471. [Google Scholar] [CrossRef]
- Toffalini, F.; Abbà, M.; Carra, D.; Balzarotti, D. Google Dorks: Analysis, Creation, and New Defenses. In Detection of Intrusions and Malware, and Vulnerability Assessment; Caballero, J., Zurutuza, U., Rodríguez, R.J., Eds.; Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2016; Volume 9721, pp. 255–275. [Google Scholar] [CrossRef]
- Phulre, A.K.; Kamble, M.; Phulre, S. Content Management Systems hacking probabilities for Admin Access with Google Dorking and database code injection for web content security. In Proceedings of the 2nd International Conference on Data, Engineering and Applications (IDEA), Bhopal, India, 28–29 February 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Evangelista, J.R.G.; Sassi, R.J.; Romero, M. Google Hacking Database Attributes Enrichment and Conversion to Enable the Application of Machine Learning Techniques. Res. Sq. 2022. [Google Scholar] [CrossRef]
- Korneev, N. The Attack Vector on the Critical Information Infrastructure of the Fuel and Energy Complex Ecosystem. CEUR Workshop Proc. 2021, 3035, 59–65. [Google Scholar]
- Mansfield-Devine, S. Google hacking 101. Netw. Secur. 2009, 2009, 4–6. [Google Scholar] [CrossRef]
- Matherly, J. Complete Guide to Shodan. Available online: https://ia800705.us.archive.org/17/items/shodan-book-extras/shodan/shodan.pdf (accessed on 1 December 2024).
- Bada, M.; Pete, I. An exploration of the cybercrime ecosystem around Shodan. In Proceedings of the 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Paris, France, 14–16 December 2020; pp. 1–8. [Google Scholar] [CrossRef]
- Mulero-Palencia, S.; Baeza, V.M. Detection of Vulnerabilities in Smart Buildings Using the Shodan Tool. Electronics 2023, 12, 4815. [Google Scholar] [CrossRef]
- Rae, J.S.; Chowdhury, M.M.; Jochen, M. Internet of Things Device Hardening Using Shodan.io and ShoVAT: A Survey. In Proceedings of the 2019 IEEE International Conference on Electro Information Technology (EIT), Brookings, SD, USA, 20–22 May 2019; pp. 379–385. [Google Scholar] [CrossRef]
- Bodenheim, R.; Butts, J.; Dunlap, S.; Mullins, B. Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. Int. J. Crit. Infrastruct. Prot. 2014, 7, 114–123. [Google Scholar] [CrossRef]
- Zaidi, N.; Kaushik, H.; Bablani, D.; Bansal, R.; Kumar, P. A Study of Exposure of IoT Devices in India: Using Shodan Search Engine. In Information Systems Design and Intelligent Applications; Bhateja, V., Nguyen, B.L., Nguyen, N.G., Satapathy, S.C., Le, D.-N., Eds.; Advances in Intelligent Systems and Computing; Springer: Singapore, 2018; Volume 672, pp. 1044–1053. [Google Scholar] [CrossRef]
- Albataineh, A.; Alsmadi, I. IoT and the Risk of Internet Exposure: Risk Assessment Using Shodan Queries. In Proceedings of the 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Washington, DC, USA, 10–12 June 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Bennett, C.; Abdou, A.; Van Oorschot, P.C. Empirical Scanning Analysis of Censys and Shodan. In Proceedings of the 2021 Workshop on Measurements, Attacks, and Defenses for the Web, Virtual, 25 February 2021. [Google Scholar] [CrossRef]
- Daskevics, A.; Nikiforova, A. ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detection tool or what Internet of Things Search Engines know about you. In Proceedings of the 2021 Second International Conference on Intelligent Data Science Technologies and Applications (IDSTA), Tartu, Estonia, 15–17 November 2021; pp. 38–45. [Google Scholar] [CrossRef]
- Genge, B.; Enăchescu, C. ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services. Secur. Comm. Netw. 2016, 9, 2696–2714. [Google Scholar] [CrossRef]
- Zolotykh, M. Study of Crawlers of Search Engine ‘Shodan.io’. In Proceedings of the 2021 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT), Yekaterinburg, Russia, 13–14 May 2021; pp. 0419–0422. [Google Scholar] [CrossRef]
- Fernández-Caramés, T.M.; Fraga-Lamas, P. Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases. Sensors 2020, 20, 3048. [Google Scholar] [CrossRef] [PubMed]
- Alsmadi, I.; Dwekat, Z.; Cantu, R.; Al-Ahmad, B. Vulnerability assessment of industrial systems using Shodan. Clust. Comput 2022, 25, 1563–1573. [Google Scholar] [CrossRef]
- Al-Alami, H.; Hadi, A.; Al-Bahadili, H. Vulnerability scanning of IoT devices in Jordan using Shodan. In Proceedings of the 2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS), Amman, Jordan, 6–7 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Munir, R.; Mufti, M.R.; Awan, I.; Hu, Y.F.; Disso, J.P. Detection, Mitigation and Quantitative Security Risk Assessment of Invisible Attacks at Enterprise Network. In Proceedings of the 2015 3rd International Conference on Future Internet of Things and Cloud, Rome, Italy, 24–26 August 2015; pp. 256–263. [Google Scholar] [CrossRef]
- Chen, Y.; Lian, X.; Yu, D.; Lv, S.; Hao, S.; Ma, Y. Exploring Shodan from the Perspective of Industrial Control Systems. IEEE Access 2020, 8, 75359–75369. [Google Scholar] [CrossRef]
- Fagroud, F.Z.; Lahmar, E.H.B.; Toumi, H.; Achtaich, K.; El Filali, S. IOT Search Engines: Study of Data Collection Methods. In Advances on Smart and Soft Computing; Saeed, F., Al-Hadhrami, T., Mohammed, F., Mohammed, E., Eds.; Advances in Intelligent Systems and Computing; Springer: Singapore, 2021; Volume 1188, pp. 261–272. [Google Scholar] [CrossRef]
- Durumeric, Z.; Adrian, D.; Mirian, A.; Bailey, M.; Halderman, J.A. A Search Engine Backed by Internet-Wide Scanning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015; pp. 542–553. [Google Scholar] [CrossRef]
- Lee, S.; Shin, S.-H.; Roh, B. Abnormal Behavior-Based Detection of Shodan and Censys-Like Scanning. In Proceedings of the 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), Milan, Italy, 4–7 July 2017; pp. 1048–1052. [Google Scholar] [CrossRef]
- Fagroud, F.Z.; Lahmar, E.H.B.; Amine, M.; Toumi, H.; El Filali, S. What does mean search engine for IOT or IOT search engine. In Proceedings of the 4th International Conference on Big Data and Internet of Things, Rabat, Morocco, 23–24 October 2019; pp. 1–7. [Google Scholar] [CrossRef]
- Ueda, T.; Sasaki, T.; Yoshioka, K.; Matsumoto, T. An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive Devices. In Proceedings of the 17th International Conference on Availability, Reliability and Security, Vienna, Austria, 23–26 August 2022; pp. 1–8. [Google Scholar] [CrossRef]
- Zhang, J.; Notani, J.; Gu, G. Characterizing Google Hacking: A First Large-Scale Quantitative Study. In International Conference on Security and Privacy in Communication Networks; Tian, J., Jing, J., Srivatsa, M., Eds.; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer International Publishing: Cham, Switzerland, 2015; Volume 152, pp. 602–622. [Google Scholar] [CrossRef]
- Lee, S.; Im, S.; Shin, S.-H.; Roh, B.; Lee, C. Implementation and vulnerability test of stealth port scanning attacks using ZMap of censys engine. In Proceedings of the 2016 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Republic of Korea, 19–21 October 2016; pp. 681–683. [Google Scholar] [CrossRef]
- Krebs on Security. As Scope of 2012 Breach Expands, LinkedIn to Again Reset Passwords for Some Users. Available online: https://krebsonsecurity.com/2016/05/as-scope-of-2012-breach-expands-linkedin-to-again-reset-passwords-for-some-users/ (accessed on 15 November 2024).
- Lee, N. Cyberattacks, Prevention, and Countermeasures. In Counterterrorism and Cybersecurity; Springer International Publishing: Cham, Switzerland, 2024; pp. 295–342. [Google Scholar] [CrossRef]
- Khan, S.; Kabanov, I.; Hua, Y.; Madnick, S. A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned. ACM Trans. Priv. Secur. 2023, 26, 1–29. [Google Scholar] [CrossRef]
- UpGuard. Losing Face: Two More Cases of Third-Party Facebook App Data Exposure. Available online: https://www.upguard.com/breaches/facebook-user-data-leak (accessed on 15 November 2024).
- Cervini, J.; Rubin, A.; Watkins, L. Don’t Drink the Cyber: Extrapolating the Possibilities of Oldsmar’s Water Treatment Cyberattack. ICCWS 2022, 17, 19–25. [Google Scholar] [CrossRef]
- Lonergan, E.D.; Lonergan, S.W. Cyber Operations, Accommodative Signaling, and the De-Escalation of International Crises. Secur. Stud. 2022, 31, 32–64. [Google Scholar] [CrossRef]
- Lehman, G.; Maras, P. Cyber-Attack Against Ukrainian Power Plants. Prykarpattyaoblenergo and Kyivoblenergo. Available online: https://nsarchive.gwu.edu/media/15331/ocr (accessed on 1 December 2024).
- API Security News. Issue 111: API Vulnerabilities in AWS, Tesla Backup Gateway, Twitter. Available online: https://apisecurity.io/issue-111-api-vulnerabilities-aws-tesla-backup-gateway-twitter/ (accessed on 18 November 2024).
- Hackers Are Targeting Internet-Connected Gas Stations. Available online: https://www.vice.com/en/article/hackers-are-targeting-internet-connected-gas-stations/ (accessed on 18 November 2024).
- Margolis, J.; Oh, T.T.; Jadhav, S.; Kim, Y.H.; Kim, J.N. An In-Depth Analysis of the Mirai Botnet. In Proceedings of the 2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, USA, 24–25 July 2017; pp. 6–12. [Google Scholar] [CrossRef]
- Palo Alto Networks. The Right Approach to Zero Trust Security for Medical IoT Devices. Available online: https://www.paloaltonetworks.com/resources/whitepapers/right-approach-zero-trust-medical-iot (accessed on 18 November 2024).
- Alshamsi, O.; Shaalan, K.; Butt, U. Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach. Information 2024, 15, 631. [Google Scholar] [CrossRef]
- McGrath, J.K. Will Updated Electricity Infrastructure Security Protect the Grid? A Case Study Modeling Electrical Substation Attacks. Infrastructures 2018, 3, 53. [Google Scholar] [CrossRef]
- Khattak, A.M.; Khanji, S.I.; Khan, W.A. Smart Meter Security: Vulnerabilities, Threat Impacts, and Countermeasures. In Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication (IMCOM) 2019, Phuket, Thailand, 4–6 January 2019; Lee, S., Ismail, R., Choo, H., Eds.; Advances in Intelligent Systems and Computing; Springer International Publishing: Cham, Switzerland, 2019; Volume 935, pp. 554–562. [Google Scholar] [CrossRef]
- Cyberintel Magazine. Dahua Cameras That Haven’t Been Fixed Are Susceptible to Unauthenticated Remote Access. Available online: https://cyberintelmag.com/iot/dahua-cameras-that-havent-been-fixed-are-susceptible-to-unauthenticated-remote-access/ (accessed on 18 November 2024).
- Zhang, Z.; He, W.; Li, W.; Abdous, M. Cybersecurity awareness training programs: A cost–benefit analysis framework. Ind. Manag. Data Syst. 2021, 121, 613–636. [Google Scholar] [CrossRef]
- Ahmad, A.; Desouza, K.C.; Maynard, S.B.; Naseer, H.; Baskerville, R.L. How integration of cyber security management and incident response enables organizational learning. J. Assoc. Inf. Sci. Technol. 2020, 71, 939–953. [Google Scholar] [CrossRef]
- Theseus. The Role of Security Patch Management in Vulnerability Management. Available online: https://www.theseus.fi/handle/10024/511059 (accessed on 19 November 2024).
- Alabdulatif, A.; Thilakarathne, N.N. A Novel Cloud-Enabled Cyber Threat Hunting Platform for Evaluating the Cyber Risks Associated with Smart Health Ecosystems. Appl. Sci. 2024, 14, 9567. [Google Scholar] [CrossRef]
- Elhoseny, M.; Thilakarathne, N.N.; Alghamdi, M.I.; Mahendran, R.K.; Gardezi, A.A.; Weerasinghe, H.; Welhenge, A. Security and Privacy Issues in Medical Internet of Things: Overview, Countermeasures, Challenges and Future Directions. Sustainability 2021, 13, 11645. [Google Scholar] [CrossRef]
- Lin, Y.; Xie, Z.; Chen, T.; Cheng, X.; Wen, H. Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics. Expert Syst. Appl. 2024, 257, 124891. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).