{"id":1404,"date":"2024-03-04T13:20:55","date_gmt":"2024-03-04T10:20:55","guid":{"rendered":"https:\/\/zerontek.com\/zt\/?p=1404"},"modified":"2024-04-15T20:24:52","modified_gmt":"2024-04-15T17:24:52","slug":"ot-hunt-finding-hmis-with-shodan","status":"publish","type":"post","link":"https:\/\/zerontek.com\/zt\/2024\/03\/04\/ot-hunt-finding-hmis-with-shodan\/","title":{"rendered":"OT Hunt: Finding HMIs with Shodan"},"content":{"rendered":"\n<p>Welcome to the 13th installment of \u201c<a href=\"https:\/\/zerontek.com\/zt\/category\/ot-hunt\/\" target=\"_blank\" rel=\"noreferrer noopener\">OT Hunt<\/a>\u201d, a series that has become a beacon for those navigating the murky waters of Industrial Control Systems\/Operational Technology (ICS\/OT) security. Our journey is more than a quest; it&#8217;s a mission to illuminate the hidden corners of the internet where ICS\/OT devices dwell, often unnoticed and vulnerable. This exploration is not just about discovery; it&#8217;s a clarion call to action for asset owners and ICS\/OT vendors, emphasizing the paramount importance of fortifying their digital fortresses.<\/p>\n\n\n\n<p>In this episode, my curiosity took me to the realm of Human-Machine Interfaces (HMIs), where humans and machines interact closely. Starting with a specific dork saved in my archive <a href=\"https:\/\/github.com\/selmux\/ICS-Security\/blob\/main\/ICS-OT-IoT%20dorks\/ScreenShot-ICS-Shodan\" target=\"_blank\" rel=\"noreferrer noopener\">list of dorks<\/a> on GitHub, I utilized:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><code>screenshot.label:ics<\/code><\/code><\/pre>\n\n\n\n<p>This key resulted  551 devices. However, it&#8217;s crucial to note the diversity in this digital ecosystem; many of the findings came from different services such as VNC, RDP and some  were images from cameras.Those  digital cameras were monitoring and recording HMIs.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"776\" src=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/hmi-process-1024x776.jpg\" alt=\"\" class=\"wp-image-1422\" srcset=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/hmi-process-1024x776.jpg 1024w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/hmi-process-300x227.jpg 300w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/hmi-process-768x582.jpg 768w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/hmi-process-1536x1163.jpg 1536w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/hmi-process.jpg 1665w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I tried to  focus towards a specific target: Automation Direct (<a href=\"https:\/\/www.automationdirect.com\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.automationdirect.com<\/a>) a  company in the ICS\/OT arena. I used the following dork:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>screenshot.label:ics product:\"Automation Direct\"<\/code><\/pre>\n\n\n\n<p>The results were telling\u2014most screenshots captured were indeed HMIs, offering a window into various processes across different plants and operational technologies. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"772\" src=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/hmi2-1024x772.jpg\" alt=\"\" class=\"wp-image-1423\" srcset=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/hmi2-1024x772.jpg 1024w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/hmi2-300x226.jpg 300w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/hmi2-768x579.jpg 768w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/hmi2-1536x1159.jpg 1536w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/hmi2.jpg 1677w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Further refining my search, I employed another dork: <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><code>screenshot.label:ics product:\"VNC\"<\/code><\/code><\/pre>\n\n\n\n<p>, which unveiled 290 HMI interfaces connected to the internet via VNC. This method of connection, while facilitating remote access, also opens the door to potential unauthorized access, especially when security measures are lax.<\/p>\n\n\n\n<p>Another finding was a product by Varicool (<a href=\"https:\/\/varicool.pk\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/varicool.pk\/<\/a>), which featured both a PLC (Programmable Logic Controller) named PLC 12.00 Tandem and an HMI. Please note that this device looks like a  building controller that manages a refrigerator temperature. The VNC connection to this device, alarmingly, had authentication disabled\u2014a red flag waving vigorously for any passerby with malicious intent.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"479\" height=\"543\" src=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/vnc-dis.jpg\" alt=\"\" class=\"wp-image-1420\" srcset=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/vnc-dis.jpg 479w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/vnc-dis-265x300.jpg 265w\" sizes=\"auto, (max-width: 479px) 100vw, 479px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"636\" src=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/varicool-1024x636.jpg\" alt=\"\" class=\"wp-image-1411\" srcset=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/varicool-1024x636.jpg 1024w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/varicool-300x186.jpg 300w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/varicool-768x477.jpg 768w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/varicool-1536x955.jpg 1536w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2024\/03\/varicool.jpg 1596w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Checking  RDP-connected devices, which  displayed Windows login screens, offering no glimpse into the HMI or underlying processes. This observation points to a forgone opportunity to accumulate existing usernames for HMI machines, as each machine reveals the username and asks for a password.<\/p>\n\n\n\n<p>Exploring ICS\/OT security gets more exciting. Our project, <a href=\"https:\/\/www.icsrank.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ICSrank<\/a>, is a unique tool for the ICS\/OT world, showing our dedication to improving ICS\/OT cybersecurity in this essential area. ICSrank isn&#8217;t just a tool; it&#8217;s a guide, providing crucial insights and assessments for stronger cyber defense.<\/p>\n\n\n\n<p>Keep an eye out for more discoveries and insights as we navigate the unexplored areas of ICS\/OT security. By identifying ICS\/OT devices on the internet and addressing exposure issues, we can transform vulnerabilities into strongholds of digital security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the 13th installment of \u201cOT Hunt\u201d, a series that has become a beacon for those navigating the murky waters of Industrial Control Systems\/Operational Technology (ICS\/OT) security. Our journey is more than a quest; it&#8217;s a mission to illuminate the hidden corners of the internet where ICS\/OT devices dwell, often unnoticed and vulnerable. This [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[170,157,4,245,3,46,76,81,168,48,67,23,5],"tags":[244,13,6,75,12,169,47,243,20,241,240,242,27],"class_list":["post-1404","post","type-post","status-publish","format-standard","hentry","category-attack-surface","category-building-automation-systems","category-cyber-security","category-hmi","category-ics-security","category-ics-tools","category-icsrank","category-osint","category-ot-hunt","category-ot-security","category-plc","category-shodan","category-vendors","tag-automationdirect","tag-ics","tag-ics-security","tag-icsrank","tag-ot","tag-ot-hunt","tag-ot-security","tag-rdp","tag-shodan","tag-tandem","tag-varicool","tag-vnc","tag-zerontek"],"_links":{"self":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/comments?post=1404"}],"version-history":[{"count":14,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1404\/revisions"}],"predecessor-version":[{"id":1424,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1404\/revisions\/1424"}],"wp:attachment":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/media?parent=1404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/categories?post=1404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/tags?post=1404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}