Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
Computers,
Год журнала:
2025,
Номер
14(1), С. 24 - 24
Опубликована: Янв. 15, 2025
In
recent
years,
cyberattacks
have
increased
in
sophistication,
using
a
variety
of
tools
to
exploit
vulnerabilities
across
the
global
digital
landscapes.
Among
most
commonly
used
at
an
attacker’s
disposal
are
Google
dorks,
Shodan,
and
Censys,
which
offer
unprecedented
access
exposed
systems,
devices,
sensitive
data
on
World
Wide
Web.
While
these
can
be
leveraged
by
professional
hackers,
they
also
empowered
“Script
Kiddies”,
who
low-skill,
inexperienced
attackers
use
readily
available
exploits
scanning
without
deep
technical
knowledge.
Consequently,
targeting
critical
infrastructure
growing
rapid
rate,
driven
ease
with
solutions
operated
minimal
expertise.
This
paper
explores
potential
for
enabled
tools,
presenting
cases
where
platforms
been
both
offensive
defensive
purposes.
By
examining
notable
incidents
analyzing
threats,
we
outline
proactive
measures
protect
against
emerging
risks.
this
study,
delve
into
how
offensively
serve
functions
within
cybersecurity.
Additionally,
introduce
automated
all-in-one
tool
designed
consolidate
functionalities
offering
streamlined
solution
vulnerability
detection
analysis.
Lastly,
propose
defense
strategies
mitigate
exploitation
risks
associated
such
aiming
enhance
resilience
evolving
cyber
threats.
Язык: Английский
Enhancing Efficiency in Trustless Cryptography: An Optimized SM9-Based Distributed Key Generation Scheme
Sensors,
Год журнала:
2024,
Номер
24(24), С. 7874 - 7874
Опубликована: Дек. 10, 2024
Intelligent
systems
are
those
in
which
behavior
is
determined
by
environmental
inputs,
and
actions
taken
to
maximize
the
probability
of
achieving
specific
goals.
widely
applied
across
various
fields,
particularly
distributed
intelligent
systems.
At
same
time,
due
extensive
interaction
with
user
data,
face
significant
challenges
regarding
security.
This
study
proposes
an
optimized
key
generation
(DKG)
scheme
for
identity-based
cryptography
(IBC)
using
SM9
standard.
Our
introduces
a
(t,
n)-threshold
system
that
functions
without
trusted
center,
addressing
vulnerability
single
points
failure
conventional
centers
(KGCs).
We
reduce
communication
computational
demands
refining
Paillier
share
transformation
protocol,
ensuring
efficient,
centerless
operations.
The
scheme’s
security,
validated
existential
unforgeability
against
adaptive
chosen
identity
attacks
(EUF-CIA)
model,
demonstrates
its
practical
applicability
enhanced
security
Язык: Английский