Cheatography
https://cheatography.com
A primer on hunting / auditing targets of interest using this excellent online resource.
This is a draft cheat sheet. It is a work in progress and is not finished yet.
History view - Crawler detail
Text searching
The other modality of search querying, text entry, is bound by a dotted-keyword format, modifiable by boolean operators, some examples follow:
"location.country_code: US and protocols: ("23/telnet" or "80/http")"
This will identify any internet-facing US host exposing TELNET or HTTP.
"location.city: Chicago and tags: ("scada")
This will identify any internet-facing host in Chicago with a banner tag of 'scada'. |
|
|
Explore view - Certificate detail
Explore view - Certificate pivot
Text searching - Wildcards
Use a '*' to represent zero or more characters.
Example:
ip: [50.45.128.0 to 50.47.255.255] and services.tls: *
This will return any host in the stated IP range which has completed a TLS handshake.
Note:
The '?' is used to represent a single character. |
Notes / Caveats
Free account sign-up is required to utilize the basic search engine;
Host & Certificate search is supported under this configuration.
Regex support in search queries is a paid feature, email sales@censys.io for pricing information.
API support is available, access & manage keys here:
https://search.censys.io/account/api |
|
|
Explore view - Certificate extensions
WHOIS view - Further detail...
Text searching - Wider scope
Broad searches are possible, as per the following examples:
autonomous_system.description: "University"
services.software.product: "Raspberry Pi"
not services.service_name: HTTPS |
Text searching - Auto-complete
As you type in the main search box, the Censys will show immediate possible command completions.
Text searching - Data field list
|