<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: sqlmap</title>
    <description>The latest articles on DEV Community by sqlmap (@sqlmap).</description>
    <link>https://dev.to/sqlmap</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3510214%2F630c0146-00a7-4e06-9b4f-4274d0d85e60.jpg</url>
      <title>DEV Community: sqlmap</title>
      <link>https://dev.to/sqlmap</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sqlmap"/>
    <language>en</language>
    <item>
      <title>Cyberspace Visibility and Privacy: Why Your Router Might Appear in ZoomEye</title>
      <dc:creator>sqlmap</dc:creator>
      <pubDate>Thu, 18 Sep 2025 06:22:14 +0000</pubDate>
      <link>https://dev.to/sqlmap/cyberspace-visibility-and-privacy-why-your-router-might-appear-in-zoomeye-43h5</link>
      <guid>https://dev.to/sqlmap/cyberspace-visibility-and-privacy-why-your-router-might-appear-in-zoomeye-43h5</guid>
      <description>&lt;p&gt;In today’s hyper-connected world, our devices are not just gateways to the internet—they are part of the internet itself. Search engines like &lt;strong&gt;ZoomEye&lt;/strong&gt;, sometimes called the "Google for cyberspace," are designed to scan and index internet-connected devices around the globe. This visibility raises an important question: &lt;em&gt;Why might your home router, security camera, or even smart refrigerator appear in such a search engine?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flzb02ncm4nx3rozb39u6.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flzb02ncm4nx3rozb39u6.webp" alt="ZoomEye" width="720" height="248"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is ZoomEye?
&lt;/h2&gt;

&lt;p&gt;ZoomEye is a cyberspace search engine that continuously scans the internet to identify devices, open ports, and services. Security researchers often use it to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Map the global landscape of internet-connected devices.&lt;/li&gt;
&lt;li&gt;Track trends in exposed services and protocols.&lt;/li&gt;
&lt;li&gt;Understand security risks in IoT and industrial systems.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Unlike traditional search engines that index web pages, ZoomEye indexes the infrastructure behind them.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Is Your Router Visible?
&lt;/h2&gt;

&lt;p&gt;Your router might appear in ZoomEye because it is directly exposed to the public internet. Common reasons include:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Default Settings&lt;/strong&gt;: Many routers ship with open ports or remote management enabled by default.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Misconfiguration&lt;/strong&gt;: Incorrectly set firewall rules or NAT configurations may expose your router’s services.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Remote Access Features&lt;/strong&gt;: Services like UPnP, Telnet, or SSH could be reachable from outside your home network.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ISP Design&lt;/strong&gt;: In some cases, Internet Service Providers assign public-facing IP addresses without sufficient shielding.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Why Does This Matter?
&lt;/h2&gt;

&lt;p&gt;Being indexed by ZoomEye doesn’t mean you’ve been hacked—but it does mean that your device is visible to anyone who searches. For malicious actors, this visibility provides an easy way to discover potential targets.&lt;/p&gt;

&lt;p&gt;The implications include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Privacy Risks&lt;/strong&gt;: Your network setup could reveal device types, firmware versions, or geographic location.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security Threats&lt;/strong&gt;: Exposed services may allow attackers to attempt brute-force logins or exploit known vulnerabilities.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Unexpected Monitoring&lt;/strong&gt;: In some cases, open services can leak sensitive data without you realizing it.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Protect Yourself
&lt;/h2&gt;

&lt;p&gt;If you’re concerned that your router or devices might be indexed, here are steps you can take:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Change Default Credentials&lt;/strong&gt;: Always set strong, unique passwords for router administration.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Disable Unnecessary Services&lt;/strong&gt;: Turn off remote management, Telnet, or UPnP if you don’t need them.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Update Firmware Regularly&lt;/strong&gt;: Security patches often fix vulnerabilities that ZoomEye can detect.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Use a Firewall&lt;/strong&gt;: Configure rules to block external access to sensitive ports.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check Your Exposure&lt;/strong&gt;: Tools like ZoomEye or Shodan can be used responsibly to see if your devices are visible.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Bigger Picture: Cyberspace Visibility
&lt;/h2&gt;

&lt;p&gt;ZoomEye highlights an important reality: the internet is not just a collection of websites—it’s a living, searchable map of everything that’s connected. While this visibility helps security researchers understand the global attack surface, it also underscores the importance of personal responsibility in securing our digital lives.&lt;/p&gt;

&lt;p&gt;Your router doesn’t need to be a beacon in cyberspace. With a few simple precautions, you can stay connected without being unnecessarily exposed.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Privacy and security online begin with awareness. The next time you set up a device, ask yourself: could it be visible to the entire world?&lt;/em&gt;&lt;/p&gt;

</description>
      <category>privacy</category>
      <category>iot</category>
      <category>cybersecurity</category>
      <category>tooling</category>
    </item>
    <item>
      <title>Top 10 OSINT Tools Every (Ethical) Hacker Should Know</title>
      <dc:creator>sqlmap</dc:creator>
      <pubDate>Thu, 18 Sep 2025 05:11:40 +0000</pubDate>
      <link>https://dev.to/sqlmap/top-10-osint-tools-every-ethical-hacker-should-know-88g</link>
      <guid>https://dev.to/sqlmap/top-10-osint-tools-every-ethical-hacker-should-know-88g</guid>
      <description>&lt;p&gt;Open-Source Intelligence (OSINT) is the art of finding useful, lawful information in public places on the internet. If you do security work — whether blue team, red team, threat intel, or incident response — OSINT tools are your everyday binoculars: they help you spot exposed services, leaked credentials, vulnerable devices, and hidden links in an organization’s footprint. Below is a friendly, practical guide to the top 10 OSINT tools you should know &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Quick note: these tools are powerful. Use them only on systems you own or where you have explicit permission. Don’t be that person who learns the hard way.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  1. Shodan — the search engine for connected devices
&lt;/h2&gt;

&lt;p&gt;Shodan catalogs connected hosts and service banners across the internet. Want to find open ports, webcams, misconfigured industrial equipment, or servers running specific software? Shodan helps you do that fast. Security teams use it to monitor exposures and spot devices that shouldn’t be internet-facing.&lt;/p&gt;

&lt;p&gt;When to use: early discovery and continuous monitoring of owned IP ranges.&lt;br&gt;
Tip: combine filtered Shodan queries with alerts for your org’s IP blocks.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. ZoomEye — internet asset &amp;amp; banner search engine
&lt;/h2&gt;

&lt;p&gt;ZoomEye scans and indexes devices, services, banners and open ports. If Shodan is the iconic “IoT search engine,” ZoomEye is a powerful complementary source — it sometimes finds different hosts, banners, or regions because of differences in scanning and indexing. Great for asset discovery, spotting forgotten admin panels, and building an external inventory.&lt;/p&gt;

&lt;p&gt;When to use: broaden your coverage when mapping an organization’s public-facing footprint.&lt;br&gt;
Tip: use ZoomEye and Shodan side-by-side to reduce blind spots.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. Censys — focused internet scanning and TLS visibility
&lt;/h2&gt;

&lt;p&gt;Censys gives a queryable index of internet hosts with an emphasis on TLS/HTTPS metadata. It’s especially useful if you care about certificates, TLS configuration, or historical changes to a host’s visible surface.&lt;/p&gt;

&lt;p&gt;Best for: researchers tracking certificate usage, weak TLS, or changes in server exposure.&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Maltego — visually map relationships and infrastructure
&lt;/h2&gt;

&lt;p&gt;Maltego turns raw OSINT into graphs: domains, email addresses, IPs, and the relationships between them. The visual layout helps you spot clusters, reuse of infrastructure, and suspicious linkages faster than scanning spreadsheets.&lt;/p&gt;

&lt;p&gt;Use case: mapping a complex compromise or visualizing how a set of indicators ties together.&lt;/p&gt;

&lt;h2&gt;
  
  
  5. SpiderFoot — automated sweeps &amp;amp; enrichment
&lt;/h2&gt;

&lt;p&gt;SpiderFoot automates queries across dozens of public sources (DNS, WHOIS, breach databases, dark web connectors) and aggregates the results into reports and graphs. It’s ideal for fast, repeatable reconnaissance at scale.&lt;/p&gt;

&lt;p&gt;Pro tip: tune modules to focus on relevant data and reduce noise.&lt;/p&gt;

&lt;h2&gt;
  
  
  6. Recon-ng — modular, repeatable recon workflows
&lt;/h2&gt;

&lt;p&gt;Recon-ng is a modular framework that lets you compose and run recon modules from the command line. It’s great for creating reproducible pipelines other team members can run and for automating repetitive lookups.&lt;/p&gt;

&lt;p&gt;When to use: when you want documented, repeatable OSINT workflows.&lt;/p&gt;

&lt;h2&gt;
  
  
  7. theHarvester — quick domain-focused recon
&lt;/h2&gt;

&lt;p&gt;theHarvester is a lightweight tool that gathers emails, subdomains, hosts, and publicly available documents from search engines and sources. It’s fast and ubiquitous in pentest kits for a reason.&lt;/p&gt;

&lt;p&gt;Perfect for: rapid initial reconnaissance and scoping checks.&lt;/p&gt;

&lt;h2&gt;
  
  
  8. FOCA — metadata mining from documents
&lt;/h2&gt;

&lt;p&gt;FOCA crawls for downloadable Office/PDF files and extracts embedded metadata (authors, software versions, server paths, comments). Document metadata is a low-cost way to discover operational details that might be accidentally leaked.&lt;/p&gt;

&lt;p&gt;Warning: treat documents carefully — don’t upload sensitive files to public services.&lt;/p&gt;

&lt;h2&gt;
  
  
  9. VirusTotal — file/URL intelligence and passive DNS
&lt;/h2&gt;

&lt;p&gt;Beyond scanning files, VirusTotal aggregates sandbox reports, community signals, file hashes, and passive DNS. It’s useful to connect malicious files to infrastructure, see where a suspicious URL has appeared, or find related indicators.&lt;/p&gt;

&lt;p&gt;Use it for: threat investigations and cross-linking indicators of compromise.&lt;/p&gt;

&lt;h2&gt;
  
  
  10. Have I Been Pwned (HIBP) — breach visibility for accounts
&lt;/h2&gt;

&lt;p&gt;HIBP shows whether an email or domain appears in known breaches. It’s a practical resource for gauging credential exposure across an organization and shaping remediation (password resets, MFA rollout).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Practical tip&lt;/strong&gt;: include HIBP checks in account-risk assessments and user-awareness training.&lt;/p&gt;

&lt;h3&gt;
  
  
  Quick comparison — which tool when
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Large-scale internet asset discovery&lt;/strong&gt;: Shodan, ZoomEye, Censys&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Automation &amp;amp; aggregation&lt;/strong&gt;: SpiderFoot, Recon-ng&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Focused footprinting&lt;/strong&gt;: theHarvester, FOCA&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Link analysis / investigations&lt;/strong&gt;: Maltego&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Threat/indicator intelligence&lt;/strong&gt;: VirusTotal, HIBP&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Responsible use — ethics and the law (short and blunt)
&lt;/h3&gt;

&lt;p&gt;OSINT is legal and ethical when performed on public data for lawful purposes. The boundary between “observing” and “interacting” is thin. Follow these rules:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Only scan or probe systems you own or have explicit written permission to test.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Prefer passive collection during initial reconnaissance.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Respect terms of service and robots.txt where practical — but remember they don’t replace explicit authorization.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Don’t harvest or publish personal data without a lawful, ethical reason.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Document your methodology and keep proof of authorization for engagements.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Breaking these rules can lead to legal trouble fast. Use OSINT to protect systems, not break them.&lt;/p&gt;

&lt;h3&gt;
  
  
  Learning paths &amp;amp; safe practice ideas
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Build a local lab or use CTF platforms (Hack The Box, TryHackMe) to practice without touching production.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Read each tool’s docs and example playbooks before running one in your environment.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Combine tools: e.g., use ZoomEye to discover services, then SpiderFoot or Maltego to enrich and visualize.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Make a short internal OSINT playbook: allowed tools, data to collect, reporting templates, and escalation paths.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Closing thought
&lt;/h3&gt;

&lt;p&gt;OSINT gives outsized value: the right public data at the right time can prevent a breach, speed up an investigation, or reveal a glaring misconfiguration. Tools are just instruments — judgment and authorization are the real multipliers. Use them thoughtfully, document everything, and always act with permission.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>tooling</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
