<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Reports - Shodan Blog]]></title><description><![CDATA[The latest news and developments for Shodan.]]></description><link>https://blog.shodan.io/</link><generator>Ghost 0.7</generator><lastBuildDate>Sun, 12 Apr 2026 00:38:03 GMT</lastBuildDate><atom:link href="https://blog.shodan.io/tag/reports/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Top Website Defacers: June 2015]]></title><description><![CDATA[<p>I wanted to revisit the results of an earlier post this year on how to <a href="https://blog.shodan.io/tracking-hacked-websites/">track website defacements</a> and see how things have changed since then. In case you're wondering how this data is collected, I've created a video that shows in real-time the commands I used to generate the</p>]]></description><link>https://blog.shodan.io/top-website-defacers-june-2015/</link><guid isPermaLink="false">3ade232b-b91f-475e-8888-1b3c61a574f2</guid><category><![CDATA[Reports]]></category><category><![CDATA[defacements]]></category><dc:creator><![CDATA[John Matherly]]></dc:creator><pubDate>Sun, 14 Jun 2015 18:44:16 GMT</pubDate><media:content url="https://i.imgur.com/N6wnApM.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://i.imgur.com/N6wnApM.jpg" alt="Top Website Defacers: June 2015"><p>I wanted to revisit the results of an earlier post this year on how to <a href="https://blog.shodan.io/tracking-hacked-websites/">track website defacements</a> and see how things have changed since then. In case you're wondering how this data is collected, I've created a video that shows in real-time the commands I used to generate the data:</p>

<script type="text/javascript" src="https://asciinema.org/a/21387.js" id="asciicast-21387" async></script>

<p>Here's the Top 10 Website Defacers as of June 2015:</p>

<ol>
<li><strong>GHoST61</strong>: 49  </li>
<li><strong>El Moujahidin</strong>: 31  </li>
<li><strong>r00t-x</strong>: 29  </li>
<li><strong>Ashiyane Digital Security Team</strong>  </li>
<li><strong>Best Cracker</strong>: 22  </li>
<li><strong>TechnicaL</strong>: 20  </li>
<li><strong>virus3033</strong>: 17  </li>
<li><strong>A.N.T</strong>: 15  </li>
<li><strong>KkK1337</strong>: 14  </li>
<li><strong>MR Error ..</strong>: 14</li>
</ol>

<p><strong>GHoST61</strong> also topped the ranking earlier this year and remains at the top at the moment. Other familiar names are: <strong>r00t-x</strong> (moved up 4 ranks), <strong>TechnicaL</strong> (moved up 3 ranks) and <strong>Best Cracker</strong> (moved up 1 rank). This means that 4 of out of the previous top 10 are still around, while the other 6 weren't listed before.</p>

<p><img src="https://blog.shodan.io/content/images/2015/06/hacked-by-june-2015.png" alt="Top Website Defacers: June 2015"></p>

<p>In terms of organizations containing defaced websites, the <a href="https://www.shodan.io/report/ZuhSYkhV">Ecommerce Corporation remains the most affected by far</a>. After publishing the last blog post some people rightly questioned whether Ecommerce corporation had just been hit with an attack and I happened to do my report right afterwards. This follow-up data makes it clear that there are systemic problems at the company and how they setup/ respond to incidents.</p>]]></content:encoded></item><item><title><![CDATA[Keeping Up with SSL]]></title><description><![CDATA[<p>SSL is becoming an evermore important aspect of serving and consuming content on the Internet, so it's only fit that Shodan extends the information that it gathers for every SSL-capable service. The banners for SSL services, such as HTTPS, have included the certificate in PEM format for a long time</p>]]></description><link>https://blog.shodan.io/ssl-update/</link><guid isPermaLink="false">2b4901ed-1657-4979-a6a5-a4c82a7051c0</guid><category><![CDATA[SSL]]></category><category><![CDATA[Filters]]></category><category><![CDATA[Facets]]></category><category><![CDATA[API]]></category><category><![CDATA[Reports]]></category><dc:creator><![CDATA[John Matherly]]></dc:creator><pubDate>Mon, 16 Feb 2015 23:55:00 GMT</pubDate><content:encoded><![CDATA[<p>SSL is becoming an evermore important aspect of serving and consuming content on the Internet, so it's only fit that Shodan extends the information that it gathers for every SSL-capable service. The banners for SSL services, such as HTTPS, have included the certificate in PEM format for a long time and you've been able to access that data through the <a href="https://developer.shodan.io/api">REST API</a> or <a href="http://shodan.readthedocs.org/en/latest/examples/cert-stream.html">real-time stream</a>.</p>

<p>After spending some time fixing bugs and making sure it scales, I'm happy to say that Shodan is now also collecting the following information:</p>

<ul>
<li>Parsed certificate</li>
<li>Certificate chain</li>
<li>Supported SSL versions</li>
<li>Preferred cipher</li>
</ul>

<p><img src="https://blog.shodan.io/content/images/2015/02/SSL-Survey---Shodan.png" alt="Distribution of supported SSL versions on the Internet"></p>

<p>All the SSL information has been put into property on the top-level called <strong>ssl</strong> instead of being dug into the <strong>opts</strong> field. This is how it looks like right now:</p>

<pre><code>"ssl": {
    "cert": {
        "sig_alg": "sha1WithRSAEncryption",
        "issued": "20110325103212Z",
        "expires": "20120324103212Z",
        "expired": true,
        "version": 2,
        "extensions": [{
            "data": "\u0003\u0002\u0006@",
            "name": "nsCertType"
        }],
        "serial": 10104044343792293356,
        "issuer": {
            "C": "TW",
            "L": "TAIPEI",
            "O": "CAMEO",
            "ST": "TAIWAN"
        },
        "pubkey": {
            "bits": 1024,
            "type": "rsa"
        },
        "subject": {
            "C": "TW",
            "L": "TAIPEI",
            "O": "CAMEO",
            "ST": "TAIWAN"
        }
    },
    "cipher": {
        "version": "TLSv1/SSLv3",
        "bits": 256,
        "name": "AES256-SHA"
    },
    "chain": ["-----BEGIN CERTIFICATE-----  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\nm89S7ao=\n-----END CERTIFICATE-----\n"],
    "versions": ["TLSv1", "SSLv3", "-SSLv2", "-TLSv1.1", "-TLSv1.2"]
}
</code></pre>

<p>The <strong>ssl.versions</strong> field is a list of SSL versions that the device permits and denies. If the version has a <strong>-</strong> (dash) in front of the version, then the device <strong>does not</strong> support that SSL version. If the version doesn't begin with a <strong>-</strong>, then the service supports the given SSL version. For example, the above server supports:</p>

<ul>
<li>TLSv1</li>
<li>SSLv3</li>
</ul>

<p>And it denies versions:</p>

<ul>
<li>SSLv2</li>
<li>TLSv1.1</li>
<li>TLSv1.2</li>
</ul>

<p>The information that used to be stored in the <strong>opts.pem</strong> field is now available in the <strong>ssl.chain</strong> field, which is basically an array of PEM-serialized certificates. If you'd like to access the parsed information of the service's main certificate then you can get that directly from the <strong>ssl.cert</strong> property. It's the parsed SSL certificate made accessible in a programmer-friendly way (parsing certificates can be a pain...).</p>

<h4 id="newsslfiltersandfacets">New SSL Filters and Facets</h4>

<p>Alongside these new properties, I'm also re-introducing revamped SSL filters and facets. The following <strong>new filters and facets</strong> are available in Shodan to search the SSL data:</p>

<ul>
<li>ssl.chain_count</li>
<li>ssl.version</li>
<li>ssl.cert.alg</li>
<li>ssl.cert.expired</li>
<li>ssl.cert.extension</li>
<li>ssl.cert.serial</li>
<li>ssl.cert.pubkey.bits</li>
<li>ssl.cert.pubkey.type</li>
<li>ssl.cipher.version</li>
<li>ssl.cipher.bits</li>
<li>ssl.cipher.name</li>
</ul>

<p>Using these filters, you can for example keep track of devices that <strong>only allow SSLv2</strong> - a deprecated version of SSL that nothing should exclusively support:</p>

<p><a href="https://www.shodan.io/search?query=ssl.version%3Asslv2">ssl.version:sslv2</a></p>

<p>Or you can generate a distribution of certificate chain lengths by faceting on <strong>ssl.chain_count</strong>:</p>

<p><img src="https://blog.shodan.io/content/images/2015/02/ssl-chain-length.png" alt=""></p>

<p>The above chart shows that the majority of SSL certificates are self-signed and don't trace back to a root.</p>

<p>The reports that Shodan generates also take advantage of this new SSL information, so keep an eye out for those charts in your new reports. For example, here's a general report on the state of SSL usage on the Internet:</p>

<p><a href="https://www.shodan.io/report/EvoSNCVF">https://www.shodan.io/report/EvoSNCVF</a></p>

<p>I'm excited to be collecting this new data and I'd love to hear your thoughts (<a href="https://twitter.com/achillean">@achillean</a>). As always, if there's something you'd like to see me add just <a href="mailto:jmath@shodan.io">send me an email</a></p>]]></content:encoded></item></channel></rss>