Shodan Showdown: Using Shodan & Censys for Threat Intel in the Russia-Ukraine Conflict

Introduction

The ongoing Russia-Ukraine conflict has demonstrated how cyberwarfare plays an increasingly pivotal role in modern geopolitical struggles. Cybersecurity professionals and intelligence analysts must stay ahead by leveraging open-source intelligence (OSINT) tools such as Shodan and Censys. These tools provide insights into exposed internet-connected infrastructure, revealing security vulnerabilities that could be exploited in cyber operations.

In this post, we’ll examine how Shodan and Censys can aid in conflict monitoring, compare their effectiveness, and explore the DEFCON 205 “Shodan Showdown” contest that challenges cybersecurity practitioners to discover the most publicly accessible systems on the internet.


The Role of Shodan and Censys in Conflict Monitoring

Shodan and Censys are powerful search engines that index internet-facing devices and services, making them valuable for monitoring critical infrastructure in war zones. Here’s how they help in cyber threat intelligence (CTI):

Identifying Exposed Critical Infrastructure

Both platforms allow researchers to discover vulnerable systems in Ukraine and Russia, such as:

For example, querying Shodan for port:502 country:RU reveals exposed Modbus systems, which are commonly used in SCADA (Supervisory Control and Data Acquisition) networks that control industrial processes.

Monitoring Shifts in the Digital Environment

Since the start of the conflict, researchers have noticed large portions of the Russian internet disappearing from Shodan and Censys. This is likely due to:

By continuously tracking these changes, analysts can infer when major cyber defense strategies are being deployed or anticipate upcoming cyberattacks.


Comparative Analysis: Shodan vs. Censys

While both tools index internet-facing devices, they have key differences that make them suitable for different cybersecurity applications.

FeatureShodanCensys
Data FreshnessScans devices regularly, but may have outdated results.More frequent scanning, better for real-time monitoring.
Search PowerEasier for beginners with simple filters.More advanced filtering with structured queries.
CoverageBetter at finding IoT and consumer devices.Stronger at identifying enterprise-level systems.

Real-World Example

What would we like to query? How about SSH Servers and Microsoft Remote Desktop Protocol Servers in the Russian Federation?

A Country Wide on Shodan could use:

country:RU port:22,3389

The Same Query on Censys would look like this:

location.country: "Russia" and services.port: {3389, 22}

Using Shodan Map Feature

Both Censys and Shodan have diagnostic queries making interesting analysis of devices that have been hooked up to the open internet possible. But Using Shodan’s Map Feature can provide additional context. One can look for Border Towns such as Belgorod and Kursk:

Kursk and Belgorod

Defcon 205’s “Shodan Showdown”

DEFCON 205 is Birmingham’s official DEFCON hacking group, dedicated to ethical hacking and security research. The group recently hosted the “Shodan Showdown”, a competition where participants were challenged to:

  1. Find the most interesting publicly accessible system using Shodan.
  2. Document its security risks and potential attack vectors.
  3. Report their findings in a responsible way, if possible

Key Takeaways from the Contest:

What did DC205 Find?

Findings were primarily in three groups:

Some publicly exposed medical devices running outdated software. Misconfigured routers with default credentials. Unsecured security cameras broadcasting video feeds in real-time.

Why does this matter? Events like the Shodan Showdown bring together security professionals and researchers to hone their OSINT skills, raise awareness of critical cybersecurity risks, and promote responsible disclosure practices.