DEV Community

Cover image for New Cyberspace Search Engine
Mark
Mark

Posted on • Updated on

New Cyberspace Search Engine

Outdated data, insufficient data, complex functionality: these are just a few problems that pen-testers, cybersecurity engineers, and tech experts face. Many services are dedicated to mass data collection, but most of them aren’t easy to use. They feel dated in their interface and tendency to structure data in a complex, old-fashioned way.

However, blue-teamers and other experts are turning to a new service called Spyse. This is a handy search engine initially released in October and currently running in beta testing mode. What is interesting is that they are not one of the giants like shodan so they focused on collecting user feedback and creating a platform aimed to provide tech niche experts with all the necessary data for their work.

Spyse uses an OSINT mechanic (Open Source Intelligence Tools) to collect, process, and provide aggregated data on network elements. Spyse users gain access to a plethora of tools and can perform detailed searches on the following aspects of a network:

▪ Domains and Subdomains;
▪ IP addresses and subnets;
▪ Encryption certificates;
▪ Protocols;
▪ Open ports;
▪ WHOIS records;
▪ Autonomous Systems (AS);

Spyse was developed as part of an open-source project with a goal to maintain a "complete database of all the entities on the Internet." Their self-developed tools help security experts evaluate the security of products, services, and everything that is exposed to the internet.

Spyse uses self-manufactured network scanners to scan the internet regularly and collect data. This aggregated data is then processed, sorted, and provided to the user in an easily accessible format.

The interesting part is that the service is used by around 56,000 security specialists, pen-testers, and other people concerned with issues like online privacy and security. If you are used to collecting data using command-line methods, you’ll find Spyse’s Python API wrapper spyse.py or command-line client very useful that will be accessible soon.

Servers and laptop

Who Else Can Use Spyse Search Engine

One of the benefits of the Spyse search engine is its multi-functionality. Apart from cybersecurity specialists and pen-testers, it can be used by site owners, business analysts, hosting companies, and more. Let’s take a closer look:

Site Owners

Attackers are always on a hunt for vulnerable security systems. Therefore, anybody running a website is exposed to potential attack threats. By using Spyse, site owners can benefit from an extra layer of security, track their SSL/TLS certificates, and renew them in time.
System Administrators

Dealing with mass data can be a headache, and Spyse helps simplify the process for sysadmins. This service can be used to monitor and support an organization's infrastructure, collect useful data, monitor DNS records, and see certificate encryption changes.

Certificate Resellers

Resellers use the service to target parties whose digital certificates have expired. They can also see regions with most amounts of certificates issued, sorting them by type: DV (domain validation), OV (organization validation), and EV (extended validation).

Business analysts

Analysts use Spyse to get analytical information on any company or organization in the world. The subdomain scanner tool allows analysts to analyze competitors, foresee changes, and developments in their business. The tool also lets analysts learn about new competitor products and features before they're launched.

Conclusion

Henry Ford once said, "A market is never saturated with a good product, but is very quickly saturated with a bad one." The guys from Spyse are always open to new ideas and suggestions which can help expand the functionality of the service and provide users with tools that can help them.

You can fully use Spyse right now for free by registering on their website. New users are gifted with three credits, which they may use to fully test the platform.

Hope you find it useful, Cheers ◔ ⌣ ◔

Latest comments (0)