Discover vulnerable cameras with Shodan

Shodan is one of the most popular and at the same time dangerous machines s, which provides you with information from network devices, such as routers/switches/traffic-lights/scada/cameras, etc.

There are many ways to find webcams through Shodan. Usually, using your webcam name is a good start. Remember, Shodan distributes the information on the camera banner, not the content.

Today we will show you how you can easily find vulnerable cameras with the help of Shodan and the Metasploit Framework. To start the Metasploit Framework on a Kali Linux machine, type “msfconsoleAt your terminal.

Enter “search shodan”To see all available modules / exploits related to the shodan search engine.

From all the above results, just type “use auxiliary / gather / shodan_search"

This module uses the Shodan API to search Shodan. Output from the module is displayed on the screen and can be stored in a or in the MSF database. Enter “Show options” for all the required options related to the above module.

Now, go to the Shodan website for more information on API key .

To set the Shodan key, enter “set SHODAN_APIKEY ”And you must also specify the query you want to search.

In our case, we will show the vulnerable Webcams, so type “set QUERY webcamxp”And then run the module by typing either  run either exploit on the Metasploit console

Once you run the module, you will receive all the results shown by all the vulnerable open webcams hosted in different locations.

Some of these cameras are not protected, but most require authentication. The first step is to try the default username and password. We have created a short list of the default usernames and passwords of some of the most widely used webcams below.

  • ACTi: admin / 123456 or Admin / 123456
  • Axis (traditional): root / pass,
  • Axis (new): requires a password created during the first login
  • Cisco: No. password, is created during the first login
  • Grandstream: admin / admin
  • IQinVision: root / system
  • Mobotix: admin / meinsm
  • Panasonic: admin / 12345
  • Samsung Electronics: root / root or admin / 4321
  • Samsung Techwin (old): admin / 1111111
  • Samsung Techwin (new): admin / 4321
  • Sony: admin / admin
  • TRENDnet: admin / admin
  • Toshiba: root / ikwd
  • Vivotek: root/
  • WebcamXP: admin/

We can not say for sure that the above credentials will work, but many careless and lazy administrators, as well as ordinary everyday users, leave the default settings and in these cases, the above usernames and passwords will give you access to private cameras around the world!

You can do the same through the web portal, for example, if you want to search the webcams only in the US, then the search query is “webcamxp country: US", Which will display all the results from the US, as shown below.

To be even more specific, we can limit our search to an individual city. Let's see what we can find in Mexico. We can find the following cameras by typing “webcamxp city: Mexico"

Shodan also allows us to be very specific in searching for web-enabled devices. In some cases, we can specify the length and width of the devices we want to find.

In this case, we will look for WebcamXP cameras in the length and width (19.4357, -99.1439) of Mexico City. When we search, we get a list of each WebXP camera in these coordinates in the world.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.086 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).