top of page
  • Writer's pictureotw

Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with

Welcome back, my aspiring cyberwarriors!

Oftentimes, as cyberwarriors, we need to check to see whether our systems or others' are vulnerable to various known vulnerabilities and attacks. Whether a penetration tester, security engineer or other malicious actors, such information can be critical to the success of your mission. There are number of other websites that offer some insights into this key area such as Shodan and Censys but is probably the best! In all honesty, if you are not using, you are missing out on one of the best resources on the internet. can be used in at least 5 different use cases including;

  1. OSINT

  2. Offensive Security

  3. Defensive Security

  4. Leads and contacts

  5. Marketing Research

In this tutorial, we will focus upon using as an offensive security tool in the context of penetration testing. The first steps of a penetration test, including reconnaissance and forming an attack surface, are faster and easier with Use whois search, forward and reverse DNS search, including A, NS, PTR, MX and SPF records for network perimeter forming, scaling and attribution.

Step #1: Login to

The first step is to navigate to and create an account.

Since is in the alpha stage of its development, it offers multiple free accounts some as simple as mentioning it on social media.

Step #2: Basic Search Query

Like many other search engines, you can build a search query with search fields and search phrases separated by a colon (:). You can search by IP address, host, whois and many other fields. In addition, you can search by sub-fields by using the field name followed by the sub-field name separated by a period.


So, if you were looking for apache web servers, you could enter;

As you can see below, was able to find 94 million servers using apache.

Each listing has a response tab, certificate tab, a Whois tab and a domains tab. When we click on the domains tab, it displays all the domains hosted at that IP address.

We can also search by host using the syntax;


Step #3: Search for Vulnerabilities

One of the beauties of the site is its ability to search via vulnerabilities and cve. For instance, if I wanted to see all the sites with CVE vulnerabilities greater than 9, I could enter the search;


If I wanted to find all the sites will SMB enabled, I could enter the search;


Note that in the response field, we have a sub-field "smbv1_support". We can use that sub-field to find all the sites with the flawed and vulnerable SMBv1 enabled (true).


Note that it found over 113,000 sites with this outdated and flawed version of SMB.

We can also look for sites that have a known public exploit using the search;


This search reveals that there are over 74 million sites likely vulnerable to a known public exploit. To the far right of the screen you can see the CVE's of the vulnerabilities found. We can then click on the CVE tab above the listing and will list all the known vulnerabilities. Note that the site below has 3 vulnerabilities with a severity above 9!

We can also search by the severity level of the known vulnerabilities. If we wanted to see all the sites with a severity rated "critical", we use the search term;


If we wanted to find all the sites vulnerable to the notorious EternalBlue exploit (SMB remote code execution), we can request a search by the CVE name; CVE-2017-0145

Over 161 thousand sites are still vulnerable to this exploit. Just for background, here is that CVE listing at NVD.

Step #4 Using Logical Operators

Like other sites similar to, you can use logical operators to narrow your search. You can use AND, OR or NOT (&&, ||, !, respectively). The default operator is AND.

So, if you were looking for sites running the outdated and vulnerable MySQL v5 sites with an ASN number of 4134 we could create query such as;

mysql.server.version:5 and asn.number:4134 also allows you to search using regular expressions (regex) and wildcards (* and ?).


If you are in the business of penetration or OSINT, is a must have tool. It can save you hours searching for key information and vulnerabilities. I hope it goes without saying that no tool is perfect and that applies to as well. That is why you need to become familiar with a wide variety of tools and then use the best tool for the job or situation.


Recent Posts

See All
bottom of page