What it does
- Use Shodan to find a list of devices running a SRTP protocol which corresponds with a General Electric device
- With the coordinates from the Shodan scrape, perform reverse geocoding to find the geolocation
- Use Censys to find contact information from the IP
How I built it
Python script automatically generates data in two parts.
Shodan IP Scrape:
- scrapes shodan and looks for ips that operate under the General Electric SRTP protocol (This occurs on port 18245)
- using shodan ip gets more information about the GE product
- Gets Geolocation using Maxmind
Censys Scrape:
- scrapes Censys for whois information using the ip gained from Shodan.
- Uses Latitude and Longitude from Maxmind gets the address from a reverse geolocation call to WhitePages
The script then generates a list of these addresses and a map of the plotted locations is made
Challenges I ran into
Since finding the geolocation from an IP is very inaccurate, we found it difficult to come up with a better way
Accomplishments that I'm proud of
Learned the basics of network security
Log in or sign up for Devpost to join the conversation.