The Search Engine For Hacking IP Cameras (Shodan)

Author: IPVM Team, Published on Sep 10, 2013

With the US FTC cracking down on an IP camera manufacturer for security / privacy violations, concern over camera vulnerabilities have increased significantly. In this note, we review an online tool that is rapidly gaining in popularity as the search engine to quickly find and compromise online devices like IP cameras. We show you how it is done with a video screencast that demonstrates how lightning fast this engine makes hacking cameras.

Background of Shodan

******** * ****** ****** **** ****** *** ** **** ******* connected ** *** ********. **** ***** ** ** *******, *******, and *******, *** **** **** *********** ******* **** ******* ******, SCADA *******, *** ******* *********. 

** *** ********** ******* ** ******** ********** **** ******** ** allow ********* ** **** ******* ********* ** *** ******** ***** their ********. ** *** *******, ****** **** ** *** *********** **** *** ******* **************. **** ** ******* ** **********, ****** ** ***** **** ** do * ***** ****** ** *** **** ********** ******* *** out ***** *** ********* ** *** ********. 

Where ** ******* * ******* 

**** ** *** ******* ******* ** *********** **** *********** ** ******. *** *******, ******* ******* *** dams ** ************ ** ************* ** **** ******* *******. ******* ******** controls *** ***** ******* *** ** ****** ***** ****** ** limited ** ********** *****. *******, **** *** **** ********* ** the ********, *** ****** ********** ** ****** ****, ***. **** leaves **** ******* ** ****** *** ***** ****** **** ** Shodan. *** ******* **** ** *** ***** ***********, ** ** important ** ****** ******* ******** ********.

******** **** ** ***** ** **** ****** **** ***** ****** for *** ** ********* ***** ** ****** * ***** *** limiting *** ****** ** ****** ******* * ****** *** *** without ****** * ************. ******** ***** ****** **** ** ********* ** **** ******* ** **** **** ** ******* ********* ***********. That ***** **** * ***** ******* **** ******* **** *** technical ****-*** ** ***** *** ******* *** ******** ** * utilities company. 

'Hacking' * ****** ** **** **** ** *******

** ******** **** ******* ** **** *** *** ** *****:

Shodan *** ** *******

******** *********** ***** **** *** ***** * *** ** **** ********* ******* **** ******* ** ** ******, ** *** next **** **** ** ** **** **** ***** ******* *** secure. The ******* **** ** ******* ** **** **** ** ****, ******* for *********** ** *********, *** ******* *********. ******* *********** *** readily ********* ****** (*.*., ********** ********* *********). *** ***, *** ******* *** ********** ******* *** ******* *** the ******* **** **** **-**** *** ******* **** ******** *** Foscam *** *** ****** *** *******, *** ****** *** ******* are ******* ** ****. 

**** ** ** ******* ** **** ****** ******* **** **** week ******* **** **** ******* ********* ********* ** *** ******** and ***** *********. ***** ** ***** ******* **** ************. *** fourth ** ***** ***** ******* ***** ***********. 

*** *** ****** ***** ********, *** **** *** *** ****** a **** **** *** *****, *** *** *** **** ******* PTZ ********. 

 

Impact ** ************ ***** *** *************

** **** **** *********** *** ****** ** ****** *** ****** ** ******* ********** ** ** *******. ** **** **** * *** ** ***** *** **** curious ***** **** **** *** ****. *************,***** ** ** *** to ** **** *** **** ****** *** ***** ** *** more ********* *******. *** ******* *** ** **** ******** ****** ***** be *** ************ ************* ** ******* *** ***** ** ****** default *********** ****** *** **.

Comments (9)

I'm going to assume that the use of this tool is being monitored by the feds...

Maybe it is the Feds....

"Matherly hopes people will be reluctant to hack devices if they have to provide financial information."

Well, hrrmm, where did I put that stolen credit card number...?....

How about email verification upon purchasing services online?

Well, hrmmmm, where did I put the login info for that stolen or made up email account....?....

I always wondered what would happen if I had a computer connected directly to the internet (not behind my router) and ran something like IQFinder or Dahua ConfigTool... what it would find out there...

Generally speaking, you should not have to hook up your computer direct to the Internet. But you might be a long time looking, expecially if the tool only let's you scan one newtork address at a time.

Back in the early days (2000) before people got the idea to run firewalls, a lot of people and businesses had computers directly connected without firewalls and with have shared folders exposed to the Internet. Sometimes an office would have a public IP address for all their computers and with shared folder access going across the Internet for everyone. I'd run across small doctors offices and other types of business. I'd try to find some sort of document with info on who they were and send them anonymous emails about their vulnerabilities. Sometimes I''d connect to their shared printers and try to send them a message that way.

One time I took a chance and called a private investigator directly who had shared folders with dozens of people's background checks all exposed on the Internet; dates of birth, SS#'s, all the places they ever lived. He was mad and suspicious at first, but then hired me to come clean up and secure his network for him. He became a good customer, and friend, until he passed away a few years later.

All that from scanning ISP IP ranges that were in my own area.

probably not much, those tools rely on Ethernet broadcasts on the local segment which would stop at your cable/dsl modem.

Useful information... for sales and best practices. Thanks.

Do you know if Shodan uses some identification in the network, so an application can know this program is looking for information in a given network?

Maybe the connection port is not common as a way from the creators of Shodan to give people the opportunity of step away?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

No GDPR Penalties For UK Swann 'Spying Hack' on Nov 20, 2018
The UK’s data protection agency has closed its investigation into Infinova-owned Swann Security UK, the ICO confirmed to IPVM, deciding to take “no...
Winter 2019 IP Networking Course on Nov 05, 2018
This is the only networking course designed specifically for video surveillance professionals.  Lots of network training exists but none of it...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
China Hacks Video Servers Causing Uproar on Oct 05, 2018
An incident causing an international uproar is hitting home in the video surveillance industry as a Bloomberg report, "The Big Hack: How China...
Genetec Takes Aim At 'Untrustworthy' 'Foreign Government-Owned Vendors' on Sep 24, 2018
Genetec is taking aim at 'untrustworthy' 'foreign government-owned vendors'. This is not a new theme for Genetec as nearly 2 years ago, Genetec...
Hikvision FIPS 140-2 Cybersecurity Certification Examined on Aug 27, 2018
A week after the US government passed a law banning Hikvision, Hikvision announced it had obtained a FIPS 140-2 certification from the US...
Sony Gen 5 IP Cameras Critical Vulnerabilities on Jul 26, 2018
Cybersecurity vulnerabilities remain prevalent in video surveillance devices. Now Talos researchers have discovered multiple vulnerabilities in...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring (now US government banned) Dahua as a...

Most Recent Industry Reports

ACRE-Acquired Open Options Access Company Profile on Dec 17, 2018
Who is the company ACRE is acquiring? In this note, we examine Open Options line for best customer fit, key features, pricing, and main...
Open Options Acquired By ACRE on Dec 17, 2018
ACRE is doing deals again. A year after they sold Mercury, they are buying another access control company - Open Options. In this note, we...
8MP / 4K Fixed Lens Camera Shootout - Dahua, Hikvision, TVT, Uniview on Dec 17, 2018
8MP / 4K fixed lens models are now common in lower cost lines, with nearly every Chinese brand and their OEMs now offering multiple options. To...
Network Cable Shootout - Belden, Commscope, Hikvision, Honeywell, NavePoint CCA, Windy City Wire on Dec 17, 2018
Every IP camera install needs UTP cabling. But how much of a difference is there between dirt cheap generic cables found online and the bigger,...
Hikvision Government Parent Holds Communist Party Congress on Dec 17, 2018
The Communist Party committee of Hikvision’s government parent, CETHIK, held a Party Congress earlier this month where senior executives, including...
Imperial Capital Security Investor Conference 2018 Review - ADT, Resideo, Alarm.com, Arlo, Eagle Eye, ACRE, More on Dec 14, 2018
Imperial Capital Security Investor Conference is an event matching industry executives with financiers that frequently leads to future funding...
Cisco Meraki New Cameras and AI Analytics on Dec 14, 2018
Meraki has released their second generation of video surveillance with 3 new cameras, AI-based video analytics, and 2 cloud-based storage...
Foolish Strategy: OEMing Facial Recognition on Dec 13, 2018
Almost as 'hot' as face recognition marketing right now is OEMing facial recognition. Last year, they were a who's who of company's with...
DVR Examiner - Video Recovery from Recorder Hard Drives on Dec 13, 2018
Bypassing passwords and long download times on-site, DVR Examiner collects and organizes video evidence directly from a hard drive extracted from...
2019 Access Control Book Released on Dec 12, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact