{"id":1498,"date":"2024-04-30T13:18:47","date_gmt":"2024-04-30T10:18:47","guid":{"rendered":"https:\/\/zerontek.com\/zt\/?p=1498"},"modified":"2024-04-30T13:18:47","modified_gmt":"2024-04-30T10:18:47","slug":"how-google-can-be-used-in-ics-ot-osint","status":"publish","type":"post","link":"https:\/\/zerontek.com\/zt\/2024\/04\/30\/how-google-can-be-used-in-ics-ot-osint\/","title":{"rendered":"How Google Can Be Used in ICS\/OT OSINT"},"content":{"rendered":"\n<p>Welcome to the second installment of our series &#8220;<a href=\"https:\/\/zerontek.com\/zt\/category\/ics-ot-osint\/\" target=\"_blank\" rel=\"noreferrer noopener\">ICS\/OT OSINT<\/a>&#8221; where we delve into the use of Open Source Intelligence (OSINT) to boost cybersecurity within Industrial Control Systems (ICS) and Operational Technology (OT). This series offers insights into practical strategies, highlights unique challenges, and shares breakthroughs that shape how OSINT is utilized in these crucial sectors. As a personal and experimental endeavor, I acknowledge the potential for errors or oversights in my analysis.<\/p>\n\n\n\n<p>In my previous topic &#8220;<a href=\"https:\/\/zerontek.com\/zt\/2022\/11\/10\/ot-hunt-moxa-nport\/\" target=\"_blank\" rel=\"noreferrer noopener\">OT Hunt: Moxa Nport<\/a>&#8221; I demonstrated how to locate Moxa Nport devices using Shodan. This time, I&#8217;ll show you how to access their web interface via Google and extract various types of OSINT-related information on ICS devices. This technique can be applied to any ICS\/OT device, provided you know what you&#8217;re looking for. My project, <a href=\"https:\/\/www.icsrank.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ICSRank<\/a>, aims to guide you in initiating OSINT activities related to ICS\/OT and discovering them on the internet. This feature will be available in future releases.<\/p>\n\n\n\n<p>Today&#8217;s case study focuses on the Moxa Nport web console. Moxa Nport has numerous models, such as 5150, 5210, 5387, 5250, 5110, and 5130. To find a specific model, like 5130, simply append &#8220;A&#8221; after the digits. Thus, the Google dork would be:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\nintitle:\"Nport Web Console\" intext:\"5130A\"\n<\/code><\/pre>\n\n\n\n<p>If you&#8217;re searching by local IP address, the dork becomes:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\nintitle:\"Nport Web Console\" intext:192.168.0.250<\/code><\/pre>\n\n\n\n<p>This can also reveal its public IP, which might expose internal details about the ICS network.<\/p>\n\n\n\n<p>Finding an ICS device by its MAC address is another crucial piece of information:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>intitle:\"Nport Web Console\" intext:00:90:E8:58:DB:7B<\/code><\/pre>\n\n\n\n<p>You can also list existing Nport devices with specific firmware versions:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>intitle:\"Nport Web Console\" intext:\"1.2 Build 15041515\"<\/code><\/pre>\n\n\n\n<p>This is particularly important because many attackers look for vulnerable devices based on their firmware. Hence, this dork can be very useful, and I encourage you to use your creativity to build on this information.<\/p>\n\n\n\n<p>As you can see, you can target specific hosts like MAC address or local IP, or scan the internet to find information such as model name and build version. This OSINT technique is crucial in OT cybersecurity. We&#8217;re not just determining if a device is online; we&#8217;re accessing a login portal and gathering detailed device information (IP, Model, Firmware, MAC address). If these details are crafted and researched well, the targeted device can be compromised. This technique should also be seriously considered by defenders to secure and take appropriate steps towards protecting their devices if they are exposed.<\/p>\n\n\n\n<p>In closing, I invite you to explore our project, <a href=\"https:\/\/www.icsrank.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ICSRank<\/a>\u2014a unique tool tailored for the ICS\/OT domain, exemplifying our commitment to enhancing ICS\/OT cybersecurity. With its capabilities to Discover, Assess, and Secure, I<a href=\"https:\/\/www.icsrank.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CSRank<\/a> stands as a vital resource in fortifying ICS\/OT environments against cyber threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the second installment of our series &#8220;ICS\/OT OSINT&#8221; where we delve into the use of Open Source Intelligence (OSINT) to boost cybersecurity within Industrial Control Systems (ICS) and Operational Technology (OT). This series offers insights into practical strategies, highlights unique challenges, and shares breakthroughs that shape how OSINT is utilized in these crucial [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1508,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[170,4,212,252,172,81,48],"tags":[7,13,6,253,173,12,47],"class_list":["post-1498","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-attack-surface","category-cyber-security","category-google-dorks","category-ics-ot-osint","category-moxa","category-osint","category-ot-security","tag-cyber-security","tag-ics","tag-ics-security","tag-ics-ot-osint","tag-moxa-nport","tag-ot","tag-ot-security"],"_links":{"self":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/comments?post=1498"}],"version-history":[{"count":12,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1498\/revisions"}],"predecessor-version":[{"id":1511,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1498\/revisions\/1511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/media\/1508"}],"wp:attachment":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/media?parent=1498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/categories?post=1498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/tags?post=1498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}