The Search Engine For Hacking IP Cameras (Shodan)

Author: IPVM Team, Published on Sep 10, 2013

With the US FTC cracking down on an IP camera manufacturer for security / privacy violations, concern over camera vulnerabilities have increased significantly. In this note, we review an online tool that is rapidly gaining in popularity as the search engine to quickly find and compromise online devices like IP cameras. We show you how it is done with a video screencast that demonstrates how lightning fast this engine makes hacking cameras.

Background of Shodan

******** * ****** ****** **** ****** *** ** **** ******* connected ** *** ********. **** ***** ** ** *******, *******, and *******, *** **** **** *********** ******* **** ******* ******, SCADA *******, *** ******* *********.

** *** ********** ******* ** ******** ********** **** ******** ** allow ********* ** **** ******* ********* ** *** ******** ***** their ********. ** *** *******, ****** **** ** *** *********** **** *** ******* **************. **** ** ******* ** **********, ****** ** ***** **** to ** * ***** ****** ** *** **** ********** ******* are *** ***** *** ********* ** *** ********.

Where ** ******* * *******

**** ** *** ******* ******* ** *********** **** *********** ** ******. *** *******, ******* ******* *** dams ** ************ ** ************* ** **** ******* *******. ******* physical ******** *** ***** ******* *** ** ****** ***** ****** is ******* ** ********** *****. *******, **** *** **** ********* to *** ********, *** ****** ********** ** ****** ****, ***. This ****** **** ******* ** ****** *** ***** ****** **** on ******. *** ******* **** ** *** ***** ***********, ** is ********* ** ****** ******* ******** ********.

******** **** ** ***** ** **** ****** **** ***** ****** for *** ** ********* ***** ** ****** * ***** *** limiting *** ****** ** ****** ******* * ****** *** *** without ****** * ************. ************* ****** **** ** *********** **** ******* ** **** **** ** ******* ********* ***********. That ***** **** * ***** ******* **** ******* **** *** technical ****-*** ** ***** *** ******* *** ******** ** * utilities *******.

'Hacking' * ****** ** **** **** ** *******

** ******** **** ******* ** **** *** *** ** *****:

Shodan *** ** *******

******** *********** ********* *** ***** * ***** **** ********* ******* **** ******* ** ** ******, ** the **** **** **** ** ** **** **** ***** ******* are ******. *** ******* **** ** ******* ** **** **** of ****, ******* *** *********** ** *********, *** ******* *********. Default *********** *** ******* ********* ****** (*.*., ********** ********* *********). *** ***, *** ******* *** ********** ******* *** ******* and *** ******* **** **** **-**** *** ******* **** ******** and ****** *** *** ****** *** *******, *** ****** *** cameras *** ******* ** ****.

**** ** ** ******* ** **** ****** ******* **** **** week ******* **** **** ******* ********* ********* ** *** ******** and ***** *********. ***** ** ***** ******* **** ************. *** fourth ** ***** ***** ******* ***** ***********.

*** *** ****** ***** ********, *** **** *** *** ****** a **** **** *** *****, *** *** *** **** ******* PTZ ********.

Impact ** ************ ***** *** *************

** **** **** *********** *** ****** ******** *** ****** ** ******* ********** ** ** *******. ** **** **** * *** ** ***** *** **** curious ***** **** **** *** ****. *************,***** ** ** *** to ** **** *** **** ****** *** ***** ** *** more ********* *******. *** ******* *** ** **** ******** ****** would ** *** ************ ************* ** ******* *** ***** ** change ******* *********** ****** *** **.

Comments (9)

*'* ***** ** ****** **** *** *** ** **** **** is ***** ********* ** *** ****...

***** ** ** *** ****....

"************* ****** **** ** *********** **** ******* ** **** **** ** ******* ********* ***********."

****, *****, ***** *** * *** **** ****** ****** **** number...?....

*** ***** ***** ************ **** ********** ******** ******?

****, ******, ***** *** * *** *** ***** **** *** that ****** ** **** ** ***** *******....?....

* ****** ******** **** ***** ****** ** * *** * computer ********* ******** ** *** ******** (*** ****** ** ******) and *** ********* **** ******** ** ***** **********... **** ** would **** *** *****...

********* ********, *** ****** *** **** ** **** ** **** computer ****** ** *** ********. *** *** ***** ** * long **** *******, ********** ** *** **** **** ***'* *** scan *** ******* ******* ** * ****.

**** ** *** ***** **** (****) ****** ****** *** *** idea ** *** *********, * *** ** ****** *** ********** had ********* ******** ********* ******* ********* *** **** **** ****** folders ******* ** *** ********. ********* ** ****** ***** **** a ****** ** ******* *** *** ***** ********* *** **** shared ****** ****** ***** ****** *** ******** *** ********. *'* run ****** ***** ******* ******* *** ***** ***** ** ********. I'd *** ** **** **** **** ** ******** **** **** on *** **** **** *** **** **** ********* ****** ***** their ***************. ********* *''* ******* ** ***** ****** ******** *** try ** **** **** * ******* **** ***.

*** **** * **** * ****** *** ****** * ******* investigator ******** *** *** ****** ******* **** ****** ** ******'* background ****** *** ******* ** *** ********; ***** ** *****, SS#'s, *** *** ****** **** **** *****. ** *** *** and ********** ** *****, *** **** ***** ** ** **** clean ** *** ****** *** ******* *** ***. ** ****** a **** ********, *** ******, ***** ** ****** **** * few ***** *****.

*** **** **** ******** *** ** ****** **** **** ** my *** ****.

******** *** ****, ***** ***** **** ** ******** ********** ** the ***** ******* ***** ***** **** ** **** *****/*** *****.

****** ***********... *** ***** *** **** *********. ******.

** *** **** ** ****** **** **** ************** ** *** network, ** ** *********** *** **** **** ******* ** ******* for *********** ** * ***** *******?

***** *** ********** **** ** *** ****** ** * *** from *** ******** ** ****** ** **** ****** *** *********** of **** ****?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

XiongMai Master Password List Emailed By Chinese Spammer on Dec 05, 2016
XiongMai created an international uproar as their devices drove massive botnet attacks of major Internet sites. After pledging to recall cameras...
Hikvision Cloud Security Vulnerability Uncovered on Dec 05, 2016
A security researcher uncovered a critical vulnerability in Hikvision's global cloud servers. This vulnerability allowed an attacker to remotely...
Hikvision 'Phone Home' Raises Security Fears on Nov 10, 2016
The escalating attention towards Hikvision's China government ownership and Genetec's removal of Hikvision due to cyber security concerns has...
Genetec Expels Hikvision on Nov 08, 2016
Genetec has removed support for Hikvision devices, deeming them 'untrustworthy', citing customer concerns about Chinese government ownership /...
Now Knocking A Country Offline - The Video Surveillance Driven Botnet Wreaks Havok on Nov 03, 2016
The video surveillance driven botnet is now attacking an entire country. The Mirai malware that took advantage of poor security in Xiongmai, Dahua...
Dahua Says They Are Botnet Attack 'Victims' on Oct 26, 2016
'Victim' or 'accomplice'? Dahua has issued a new press release, referring to their products as 'victims' of the massive botnet attacks hitting the...
The Xiongmai Botnet 'Recall' Will Not Work on Oct 25, 2016
The Xiongmai 'recall' has been the topic of global news, following the unprecedented bot net attacks that use their equipment, among...
Video Surveillance Manufacturers Risk Lawsuits For Botnet Attacks on Oct 24, 2016
The unprecedented scale of internet outages on October 21st from botnet attacks risk triggering lawsuits against video surveillance manufacturers,...
Hacked DVRs Surge To 400,000 on Oct 19, 2016
The global internet is under attack from record breaking botnets. And it is getting worse, Mirai doubled in size in the last month. Shamefully,...
Dahua ‘Duplicitous’ Says Botnet Victim on Oct 11, 2016
The victim of the record-breaking botnet, Brian Krebs, is calling Dahua duplicitous in its statements about the Mirai botnet. He says Dahua should...

Most Recent Industry Reports

Sony IP Camera Backdoor Uncovered on Dec 06, 2016
A backdoor has been uncovered in ~80 Sony IP camera models, attackers can remotely enable telnet on the camera, and then potentially login as root,...
Milestone Favorability Results on Dec 06, 2016
In our second installment of manufacturer favorability results (first was Pelco), we turn to Milestone. 100+ integrators rated and explained what...
XiongMai Master Password List Emailed By Chinese Spammer on Dec 05, 2016
XiongMai created an international uproar as their devices drove massive botnet attacks of major Internet sites. After pledging to recall cameras...
Hikvision Cloud Security Vulnerability Uncovered on Dec 05, 2016
A security researcher uncovered a critical vulnerability in Hikvision's global cloud servers. This vulnerability allowed an attacker to remotely...
Door Operators Access Control Tutorial on Dec 05, 2016
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Pelco Favorability Results on Dec 02, 2016
This is the first in a series of studies of manufacturer favorability. 100+ integrators rated and explained their views of each manufacturer. We...
Hikvision CEO Declares 'We Do Not Cut Rates" on Dec 02, 2016
Hikvision has led another press trip to China, and this time Hikvision's CEO is sharing insights into their competitive strategy, including...
Network Security Audit App (March Networks) Examined on Dec 01, 2016
Verifying one's video surveillance devices are locked down against common cybersecurity vulnerabilities is increasing important, as hacks using...
FLIR Acquires Drone Manufacturer For $134M on Dec 01, 2016
FLIR has acquired Prox Dynamics, a Norwegian maker of small military-grade drones, for $134M.  FLIR president Andy Teich provided additional...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact