Censys vs. BitNinja

Mariann Csorba

What is Censys?

It is a search engine which allows people to search for the details on the devices and networks that compose the Internet. It uses the database of Zmap and ZGrab network scanners. Day by day, it analyses more than 4 billion IP addresses, which can be examined with the help of Censys.io. The scanning is done once a day.

censys

Censys, the Unescapable

It is almost impossible to hide from it, as it finds anything, anywhere that is connected to the Internet. Along with the servers storing and serving the content of webpages, webcameras, CCTV cameras, industrial networks, printers, traffic networks, video conferences, alarms can be found by it. Technically everything, which has an IP and publicly communicates on the Internet.

One of the drawbacks of this opportunity is that it is also available for laymen who can easily cause serious harm by looking for default passwords, and the trouble is already done, because they have reached people’ s sensitive data. Furthermore, they can get access to office webcamera pictures, because most of the average users do not change the default password of their devices.

Specialists in cybercrime, a hacker with malicious intention can elicit operational system, port and password information from a given server. This way, they can start a targeted attack against the destination server. As an unwarranted infiltrator, they can use the hacked server as a new member of their botnet, taking part in other cybercrimes.

How can we prevent it?

  • Check the information in Censys about your own network.
  • Change the default password of your devices
  • Use BitNinja!

 

Just a really low percentage of information gets out to the scanner database from BitNinja enabled servers. Even if the server is attacked, BitNinja would await them with virtual traps which most of the malicious hackers fall prey to. So, do not worry, as the solution is at your arm’s length.

Share your ideas with us about this article

Previous posts

New CloudFlare Integration
Our CloudFlare integration has been released not so long ago, giving new opportunities and more automated, flawless service to our customers. Our developers worked this project out, because many of our ninja clients use CloudFlare in parallel with our services. The aim of this article is to describe why we needed this development and also to give you additional information about this new feature. The CloudFlare integration was primarily designed for those of our clients who use CloudFlare.     How does it work? Being a CDN (content delivery network) provi...
How does a malware/spam campaign work?
The onset of the Internet has brought many rewarding benefits to human race. Thanks to it, communication that was pegged to letters, faxes and phone calls back then, have now become faster, reaching more audiences. Social media has also made it possible to connect with people from all around the globe. Although, with this new communicational development comes the challenge of phising and spamming that has continued to disrupt the new mailboxes of thousands of people around the world.   Spamming and phising can both be a form of stealing, by a hacker, where a great number of peop...