In which of the following attack phases would an attacker use Shodan?
In which of the following attack phases would an attacker use Shodan?
Shodan is a search engine that allows users to find specific types of computers connected to the internet using a variety of filters. Attackers use Shodan primarily during the reconnaissance phase to gather information about potential targets, such as identifying vulnerable devices and services exposed to the Internet.
it's a search engine, so recon phase