The Search Engine For Hacking IP Cameras (Shodan)

Author: IPVM Team, Published on Sep 10, 2013

With the US FTC cracking down on an IP camera manufacturer for security / privacy violations, concern over camera vulnerabilities have increased significantly. In this note, we review an online tool that is rapidly gaining in popularity as the search engine to quickly find and compromise online devices like IP cameras. We show you how it is done with a video screencast that demonstrates how lightning fast this engine makes hacking cameras.

Background of Shodan

******** * ****** ****** **** ****** *** ** **** ******* connected ** *** ********. **** ***** ** ** *******, *******, and *******, *** **** **** *********** ******* **** ******* ******, SCADA *******, *** ******* *********. 

** *** ********** ******* ** ******** ********** **** ******** ** allow ********* ** **** ******* ********* ** *** ******** ***** their ********. ** *** *******, ****** **** ** *** *********** **** *** ******* **************. **** ** ******* ** **********, ****** ** ***** **** ** do * ***** ****** ** *** **** ********** ******* *** out ***** *** ********* ** *** ********. 

Where ** ******* * ******* 

**** ** *** ******* ******* ** *********** **** *********** ** ******. *** *******, ******* ******* *** dams ** ************ ** ************* ** **** ******* *******. ******* ******** controls *** ***** ******* *** ** ****** ***** ****** ** limited ** ********** *****. *******, **** *** **** ********* ** the ********, *** ****** ********** ** ****** ****, ***. **** leaves **** ******* ** ****** *** ***** ****** **** ** Shodan. *** ******* **** ** *** ***** ***********, ** ** important ** ****** ******* ******** ********.

******** **** ** ***** ** **** ****** **** ***** ****** for *** ** ********* ***** ** ****** * ***** *** limiting *** ****** ** ****** ******* * ****** *** *** without ****** * ************. ******** ***** ****** **** ** ********* ** **** ******* ** **** **** ** ******* ********* ***********. That ***** **** * ***** ******* **** ******* **** *** technical ****-*** ** ***** *** ******* *** ******** ** * utilities company. 

'Hacking' * ****** ** **** **** ** *******

** ******** **** ******* ** **** *** *** ** *****:

Shodan *** ** *******

******** *********** ***** **** *** ***** * *** ** **** ********* ******* **** ******* ** ** ******, ** *** next **** **** ** ** **** **** ***** ******* *** secure. The ******* **** ** ******* ** **** **** ** ****, ******* for *********** ** *********, *** ******* *********. ******* *********** *** readily ********* ****** (*.*., ********** ********* *********). *** ***, *** ******* *** ********** ******* *** ******* *** the ******* **** **** **-**** *** ******* **** ******** *** Foscam *** *** ****** *** *******, *** ****** *** ******* are ******* ** ****. 

**** ** ** ******* ** **** ****** ******* **** **** week ******* **** **** ******* ********* ********* ** *** ******** and ***** *********. ***** ** ***** ******* **** ************. *** fourth ** ***** ***** ******* ***** ***********. 

*** *** ****** ***** ********, *** **** *** *** ****** a **** **** *** *****, *** *** *** **** ******* PTZ ********. 

 

Impact ** ************ ***** *** *************

** **** **** *********** *** ****** ** ****** *** ****** ** ******* ********** ** ** *******. ** **** **** * *** ** ***** *** **** curious ***** **** **** *** ****. *************,***** ** ** *** to ** **** *** **** ****** *** ***** ** *** more ********* *******. *** ******* *** ** **** ******** ****** ***** be *** ************ ************* ** ******* *** ***** ** ****** default *********** ****** *** **.

Comments (9)

I'm going to assume that the use of this tool is being monitored by the feds...

Maybe it is the Feds....

"Matherly hopes people will be reluctant to hack devices if they have to provide financial information."

Well, hrrmm, where did I put that stolen credit card number...?....

How about email verification upon purchasing services online?

Well, hrmmmm, where did I put the login info for that stolen or made up email account....?....

I always wondered what would happen if I had a computer connected directly to the internet (not behind my router) and ran something like IQFinder or Dahua ConfigTool... what it would find out there...

Generally speaking, you should not have to hook up your computer direct to the Internet. But you might be a long time looking, expecially if the tool only let's you scan one newtork address at a time.

Back in the early days (2000) before people got the idea to run firewalls, a lot of people and businesses had computers directly connected without firewalls and with have shared folders exposed to the Internet. Sometimes an office would have a public IP address for all their computers and with shared folder access going across the Internet for everyone. I'd run across small doctors offices and other types of business. I'd try to find some sort of document with info on who they were and send them anonymous emails about their vulnerabilities. Sometimes I''d connect to their shared printers and try to send them a message that way.

One time I took a chance and called a private investigator directly who had shared folders with dozens of people's background checks all exposed on the Internet; dates of birth, SS#'s, all the places they ever lived. He was mad and suspicious at first, but then hired me to come clean up and secure his network for him. He became a good customer, and friend, until he passed away a few years later.

All that from scanning ISP IP ranges that were in my own area.

probably not much, those tools rely on Ethernet broadcasts on the local segment which would stop at your cable/dsl modem.

Useful information... for sales and best practices. Thanks.

Do you know if Shodan uses some identification in the network, so an application can know this program is looking for information in a given network?

Maybe the connection port is not common as a way from the creators of Shodan to give people the opportunity of step away?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

Spring 2019 IP Networking Course on Jan 10, 2019
You can register for the Spring 2019 IP Networking course here. This is the only networking course designed specifically for video surveillance...
Bosch VDOO 2018 Vulnerability on Dec 20, 2018
Security research firm VDOO has discovered a critical vulnerability in Bosch IP cameras. Inside, we cover the available details of this new...
Genetec UL Cybersecurity Certificate (2900-2-3) Examined on Dec 19, 2018
Proving a company is cybersecure has become a major concern for security companies. But how trustworthy are these certificates? Earlier in 2018, a...
No GDPR Penalties For UK Swann 'Spying Hack' on Nov 20, 2018
The UK’s data protection agency has closed its investigation into Infinova-owned Swann Security UK, the ICO confirmed to IPVM, deciding to take “no...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
China Hacks Video Servers Causing Uproar on Oct 05, 2018
An incident causing an international uproar is hitting home in the video surveillance industry as a Bloomberg report, "The Big Hack: How China...
Genetec Takes Aim At 'Untrustworthy' 'Foreign Government-Owned Vendors' on Sep 24, 2018
Genetec is taking aim at 'untrustworthy' 'foreign government-owned vendors'. This is not a new theme for Genetec as nearly 2 years ago, Genetec...
Hikvision FIPS 140-2 Cybersecurity Certification Examined on Aug 27, 2018
A week after the US government passed a law banning Hikvision, Hikvision announced it had obtained a FIPS 140-2 certification from the US...
Sony Gen 5 IP Cameras Critical Vulnerabilities on Jul 26, 2018
Cybersecurity vulnerabilities remain prevalent in video surveillance devices. Now Talos researchers have discovered multiple vulnerabilities in...

Most Recent Industry Reports

Hanwha Smaller Multi Imager Tested (PNM-9000VQ) on Feb 14, 2019
Hanwha's first repositionable multi imager PNM-9081VQ tested well, but was huge, over 12" wide and weighing in at over 10 pounds. Now, they have...
ADT And 'The Defenders' Silent About Massive Complaints on Feb 14, 2019
ADT's largest dealer, "The Defenders" has been the subject of a massive number of complaints over many years and many forums, most recently a CBS...
Hikvision Chairman Praises United Front on Feb 14, 2019
Hikvision’s controlling shareholder held a meeting last month praising the United Front, a Communist Party organization known for its secretive...
Sales Turnover At Anyvision on Feb 13, 2019
Anyvision raised a $43 million Series A and according to their newest investor: what you need to do is push the gas pedal and build an...
Cisco Meraki Cloud VMS/Cameras Tested on Feb 13, 2019
Cisco Meraki says their cameras "bring Meraki magic to the enterprise video security world". According to Meraki, their magic is their management...
Uniview / UNV Favorability Results 2019 on Feb 12, 2019
Uniview / UNV, the self-proclaimed #3 China manufacturer, while starting late, has been working to make inroads internationally. In IPVM's 2019...
Nortek Mobile Access Reader BluePass Examined on Feb 12, 2019
Nortek's Linear access control division claims to make mobile credentials "more secure and easier to use than ever before" with their BluePass...
Solink Raises $16 Million - Company Profile on Feb 12, 2019
Most industry professionals have never heard of Solink, a company whose tagline is: It's time to revolutionize the way business uses...
Barnes Buchanan 2019: Despite 'Strange Narrative' Great Time To Be In Security on Feb 11, 2019
A "strange narrative" is being spun, said Michael Barnes at the 2019 Barnes Buchanan Conference. However, despite that narrative, it is a "great...
Milestone Drops Hikvision From Elite Partners on Feb 11, 2019
Milestone has quietly dropped Hikvision from their 'Elite Partners', less than 3 years after adding the Chinese government-owned...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact