Zoomeye - a search engine for a hacker

President

Professional
Messages
1,458
Reaction score
1,300
Points
113
Today I will tell you about Zoomeye. It is one of the search engines that allows you to search for devices, sites and services. There was quite a lot of high-profile news related to Zoomeye on the web. The search engine has convenient functionality, flexible search settings and its own API. In this article I will talk about which keys the search engine supports, what you can find interesting, and also compare the results of Zoomeye and Shodan.

Zoomeye is a search engine developed by Chinese security company Knownsec Inc. The first release was released in 2013. ZoomEye uses Xmap and Wmap at its core to collect data from open devices / web services and for fingerprint analysis.

word-image-22-1024x501-1.jpg


How do I search with Zoomeye?
On the Zoomeye website, you can enter several requests at once and see the issue, but more detailed information is available after registration. To receive an account, you need to specify your mail and phone number. After registration, a wider functionality opens and there is no restriction on viewing detailed information on hosts (in the guest mode, only 20 results are displayed). You can also see general statistics.

3544ff2709ad64518b76a.jpg


A very handy feature is the component catalog. The user can select any letter from the alphabet and select the name of the device, and the search engine will display the search results for this device. The Device list contains a variety of models of cameras, printers, and other devices. A separate list for WEB is implemented, which contains all technologies and CMS.

e3371dea05faae07d02b1.jpg


It is impossible not to tell about the built-in vulnerability database that is displayed during the search. They fit very conveniently into the functionality and you can immediately see the details without going to an additional site. Searching for a specific device displays a potential list of vulnerabilities. It is also worth noting the ability to view the issue on the map, as well as generate a report or share the results. Indeed, it is convenient, simple and fast.

24adbe152e4b8374e4955.jpg


The system has its own keys that improve the search. They are quite similar to Shodan and Censys. Let's take a look at basic examples, and then move on to more sophisticated queries. These keys can save you time, especially if you are looking for a specific version or, for example, a phrase in the meta description tag.

Search by app and version
app: application name
ver: version

Example: app: OpenSSH + ver: 4.3

62bd2c155a197685925d3.jpg


Search by geolocation
country: country abbreviation (RU, US, PL, UK, UA, FR, etc.)
city: city

Example: country: Ru + city: Moscow

153254da4e2a318b27823.jpg


Search by port and operating system
port: number
os: operating system

Example: os: linux + port: 22 + country: PL + anonymous

79fe8f064b13cdf3570d6.jpg


Search by services and host​

service: service name (The list of all available services can be found on the link)
hostname: hostname

Example: service: ftp + hostname: www.microsoft.com

7ce7294749b89afe8bfc8.jpg


Search by IP​

ip: IP address
cidr: network address

Example: cidr: 109.71.46.0/24

111cb70f9c7893ad8483e.jpg


Keyword search​

site: site
keywords: keywords in <meta name = ”Keywords”>
desc: information in the description in <meta name = ”description”>
headers: the name of the HTTP header

Example: site: google.com + headers: Server

1ffe699685da88a87e149.jpg


Search by title​

title: title of the page in <title>

Example: title: hacked

638810f8640cd6c5168e9.jpg


Interesting finds
Request: "ClearSCADA"

Systems that are designed for real-time management and development. Systems without authorization are available upon request, databases, a list of events, etc. are open.

37e5bba6a55b53cbba231.jpg


080a96739539dde2f0bba.jpg


Request: "beescms"

This is a CMS for online stores. Previously, a vulnerability was published that allows you to get a shell.

2a982811c27f79841660d.jpg


Request: speaker + app: "Mobotix Camera http config"

Mobotix webcams are available without authorization. Sometimes you come across door control systems from garages, light switches / switches, etc.

214dbb73b7037ca20134f.jpg


9df45bf8132e6f8bfad42.jpg


Request: "mongodb"

Open databases mongodb. On the banner, you can see what bases are and what size.

49b9cbddc638d3e4c3e9f.jpg


Request: NessusWWW + "HTTP / 1.1 200 OK"

Nessus Vulnerability Scanner Authorization Forms

f684be0f4f861c34d2e90.jpg


Compare Zoomeye and Shodan
For the experiment, let's compare the results and which search engine has better results. In the experiment, we will use a comparison plate to make it clear and accessible. As a result, 10 searches were made. The table below shows the number of results for each query and the total.

ece2a2ec8495e8c69a9c4.jpg

Queries and number of results.

c15e97ca2b54ab0687b63.jpg

Percentage of requests.

f527290cbdea5ae6ae415.jpg

Percentage based on overall search results.

For 10 queries, 890,868,935 results were received from two search engines. Of these, only 13% from Shodan and 87% from Zoomeye. A simple and visual comparison of why it is worth looking towards a Chinese search engine. Overwhelming statistical advantage. In all 10 queries, Zoomeye has a clear advantage.

Conclusion
Zoomeye is a cool search engine for hackers. Convenient functionality, a sufficient number of keys for flexible search, API and an incredible number of search results. For basic use, it is enough to register. The system does not cut the number of requests and allows searching for almost any task (the limit is 10,000 requests per month). This means that this is another storehouse of information in the public domain.
 
Top