The Search Engine For Hacking IP Cameras (Shodan)

By IPVM Team, Published Sep 10, 2013, 12:00am EDT (Info+)

With the US FTC cracking down on an IP camera manufacturer for security / privacy violations, concern over camera vulnerabilities have increased significantly. In this note, we review an online tool that is rapidly gaining in popularity as the search engine to quickly find and compromise online devices like IP cameras. We show you how it is done with a video screencast that demonstrates how lightning fast this engine makes hacking cameras.

Background of Shodan

******** * ****** ****** **** ****** you ** **** ******* ********* ** the ********. **** ***** ** ** cameras, *******, *** *******, *** **** more *********** ******* **** ******* ******, SCADA *******, *** ******* *********. 

** *** ********** ******* ** ******** programmer **** ******** ** ***** ********* to **** ******* ********* ** *** Internet ***** ***** ********. ** *** website, ****** **** ** *** *********** **** *** ******* **************. **** ** ******* ** **********, ****** is ***** **** ** ** * quick ****** ** *** **** ********** devices *** *** ***** *** ********* to *** ********. 

Where ** ******* * ******* 

**** ** *** ******* ******* ** Shodan***** **** *********** ** ******. *** example, ******* ******* *** **** ** crematoriums ** ************* ** **** ******* *******. Usually ******** ******** *** ***** ******* are ** ****** ***** ****** ** limited ** ********** *****. *******, **** are **** ********* ** *** ********, for ****** ********** ** ****** ****, etc. **** ****** **** ******* ** anyone *** ***** ****** **** ** Shodan. *** ******* **** ** *** login ***********, ** ** ********* ** change ******* ******** ********.

******** **** ** ***** ** **** people **** ***** ****** *** *** by ********* ***** ** ****** * login *** ******** *** ****** ** search ******* * ****** *** *** without ****** * ************. ******** ***** ****** **** ** ********* ** **** ******* ** **** **** to ******* ********* ***********. **** ***** like * ***** ******* **** ******* with *** ********* ****-*** ** ***** and ******* *** ******** ** * utilities company. 

'Hacking' * ****** ** **** **** ** *******

** ******** **** ******* ** **** you *** ** *****:

Shodan *** ** *******

******** *********** ***** **** *** ***** * way [**** ** ****** *********] ** **** ********* ******* **** ******* up ** ******, ** *** **** **** step ** ** **** **** ***** devices *** ******. *** ******* **** ** cameras ** **** **** ** ****, ******* for *********** ** *********, *** ******* passwords. ******* *********** *** ******* ********* online (*.*., ********** ********* *********). *** ***, *** ******* *** ********** targets *** ******* *** *** ******* have **** **-**** *** ******* **** TRENDnet *** ****** *** *** ****** end *******, *** ****** *** ******* are ******* ** ****. 

**** ** ** ******* ** **** search ******* **** **** **** ******* four **** ******* ********* ********* ** the ******** *** ***** *********. ***** of ***** ******* **** ************. *** fourth ** ***** ***** ******* ***** credentials. 

*** *** ****** ***** ********, *** only *** *** ****** * **** feed *** *****, *** *** *** also ******* *** ********. 

 

Impact ** ************ ***** *** *************

** **** **** *********** *** ****** to ****** *** ****** ** ******* ********** to ** *******. ** **** **** * *** of ***** *** **** ******* ***** what **** *** ****. *************,***** ** no *** ** ** **** *** many ****** *** ***** ** *** more ********* *******. *** ******* *** ** curb ******** ****** ***** ** *** surveillance ************* ** ******* *** ***** to ****** ******* *********** ****** *** up.

Comments (9)

I'm going to assume that the use of this tool is being monitored by the feds...

Maybe it is the Feds....

"Matherly hopes people will be reluctant to hack devices if they have to provide financial information."

Well, hrrmm, where did I put that stolen credit card number...?....

How about email verification upon purchasing services online?

Well, hrmmmm, where did I put the login info for that stolen or made up email account....?....

I always wondered what would happen if I had a computer connected directly to the internet (not behind my router) and ran something like IQFinder or Dahua ConfigTool... what it would find out there...

Generally speaking, you should not have to hook up your computer direct to the Internet. But you might be a long time looking, expecially if the tool only let's you scan one newtork address at a time.

Back in the early days (2000) before people got the idea to run firewalls, a lot of people and businesses had computers directly connected without firewalls and with have shared folders exposed to the Internet. Sometimes an office would have a public IP address for all their computers and with shared folder access going across the Internet for everyone. I'd run across small doctors offices and other types of business. I'd try to find some sort of document with info on who they were and send them anonymous emails about their vulnerabilities. Sometimes I''d connect to their shared printers and try to send them a message that way.

One time I took a chance and called a private investigator directly who had shared folders with dozens of people's background checks all exposed on the Internet; dates of birth, SS#'s, all the places they ever lived. He was mad and suspicious at first, but then hired me to come clean up and secure his network for him. He became a good customer, and friend, until he passed away a few years later.

All that from scanning ISP IP ranges that were in my own area.

probably not much, those tools rely on Ethernet broadcasts on the local segment which would stop at your cable/dsl modem.

Useful information... for sales and best practices. Thanks.

Do you know if Shodan uses some identification in the network, so an application can know this program is looking for information in a given network?

Maybe the connection port is not common as a way from the creators of Shodan to give people the opportunity of step away?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts reporting, tutorials and software funded by subscriber's payments enabling us to offer the most independent, accurate and in-depth information.
Loading Related Reports