Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

GUI Now Available for Kamerka ICS/IoT Reconnaissance Tool

A graphical user interface (GUI) is now available for Kamerka, the open source reconnaissance tool that allows users to identify internet-exposed industrial control systems (ICS) and Internet of Things (IoT) devices.

A graphical user interface (GUI) is now available for Kamerka, the open source reconnaissance tool that allows users to identify internet-exposed industrial control systems (ICS) and Internet of Things (IoT) devices.

Created by a researcher known as Wojciech, Kamerka’s first version was launched in November 2018. The tool was initially designed to identify nearby surveillance cameras that were accessible from the internet, but over the past year its developer has expanded its features and capabilities, and it can now be used to find a wide range of systems, including printers, ICS and IoT devices. The latest version adds support for several types of systems, including fuel tanks.

Until now, Kamerka could only be used through a command line interface (CLI), but Wojciech this week made available a browser-based GUI that makes it much easier to conduct searches. The web app was created with Django and it uses the default Django SQLite database.

Kamerka GUI

Users who want to utilize Kamerka via its GUI need to set it up on a server. This can be done on a local server by installing Python3, Django, Redis, and the Celery task queue implementation for Python web apps — no special configuration changes are required for Kamerka to work. The tool also uses the Whois XML API, Shodan, BinaryEdge, Flickr and the Google Maps API to scan the web and manage the collected data.

The last step for setting up Kamerka on a local server involves running a few python commands, and the application will be available in the web browser on localhost on port 8000.

Learn More About Exposed ICS/IoT Systems at SecurityWeek’s 2020 ICS Cyber Security Conference

In the GUI, users can select the type of system — ICS or IoT — select a country or input geographical coordinates, and choose the type of device or protocol they are looking for. The tool then displays the results, which include the number of identified devices, ports, and some of the known vulnerabilities impacting the targeted systems. They can also view results on a map and use Google Street View to see the building housing an exposed device.

Kamerka dashboard

Wojciech recently demonstrated how Kamerka can be used to gather intelligence on critical infrastructure in the United States, and he provided additional examples in a blog post published on Wednesday.

Advertisement. Scroll to continue reading.

The researcher believes the tool can be highly useful to local, state and federal government organizations for identifying critical infrastructure that may be exposed to malicious attacks.

Wojciech says he will continue to improve Kamerka. “I see a lot of possibilities for further development — more queries, integration with Nmap and PLCscan, offensive capabilities, more social media sources or automated separation of critical infrastructure from other devices,” he explained.

The complete source code for the Kamerka GUI is available on GitHub and the researcher has also set up a demo website.

Related: Tool Links Internet-Exposed ICS to Google Street View

Related: Intelligence Gathering on U.S. Critical Infrastructure

Related: Researcher Shows How Adversaries Can Gather Intel on U.S. Critical Infrastructure

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.

IoT Security

An innocent-looking portable speaker can hide a hacking device that launches CAN injection attacks, which have been used to steal cars.

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...