Exposed SCADA Server, a Shortcut to Unleashing Chaos on Entire Infrastructure

When creating a website, usually use tools such as WordPress or code directly. Whatever ways that you use, HTML is an essential language for creating a website. There is an element called a meta tag in HTML. This is a tag that summarizes the main point about the website, which is one of the necessary factors to increase [...]

Favicon-Hash: A Tool for Uncovering Spoofed Domains and Vulnerabilities

Favicon, a compound word for Favorites and Icon, is a website-representing icon that can be found on the tab above the browser address bar, and is applied to almost all websites that are available to users. Criminal IP (https://www.criminalip.io) provides the "favicon" filter that allows you to search for IP addresses through a website's favicon. Using [...]

Neglected Default Password, a Security Flaw

A default password, a preconfigured password for a device or software, can be easily found on the internet and in instruction manuals; thus, it must be changed during the initial setup. If the default password is not changed, it can create a significant security vulnerability, as anyone who knows the default password can easily gain access to [...]

By |2023-05-24T16:28:21+09:00June 23rd, 2022|Tags: , , , |1 Comment

Search for Corporate IP Addresses Using AS_Name Filter on Asset Search

Most domains and IP addresses on the internet have WHOIS information, which includes details of the internet asset owners, such as their domain name, IP address, and AS (Autonomous System) number. This WHOIS information helps users estimate where the cyberattack was initiated and has been widely used in digital forensics.  Criminal IP provides the "as_name" filter that enables users [...]

By |2023-05-24T16:12:43+09:00June 17th, 2022|Tags: , , , |0 Comments
Go to Top