{"id":924,"date":"2022-10-01T11:51:32","date_gmt":"2022-10-01T08:51:32","guid":{"rendered":"https:\/\/zerontek.com\/zt\/?p=924"},"modified":"2022-10-02T11:17:07","modified_gmt":"2022-10-02T08:17:07","slug":"yokogawa-mw100","status":"publish","type":"post","link":"https:\/\/zerontek.com\/zt\/2022\/10\/01\/yokogawa-mw100\/","title":{"rendered":"OT Hunt: Yokogawa  MW100"},"content":{"rendered":"\n<p>I have always been thinking about other OT products that are exposed on the internet and have not been -yet- found or researched  by the ICS security community. The type of OT products that haven&#8217;t been researched by existing tools such as Nmap , Wireshark , Metasploit , Shodan &#8230; etc. I didn&#8217;t mean vulnerability research, CVEs for many OT vendors  surely exist  , my focus is on tools. My goal for this research is  to contribute in this direction. <\/p>\n\n\n\n<p>This morning I was reading an <a rel=\"noreferrer noopener\" href=\"https:\/\/www.arcweb.com\/industry-best-practices\/yokogawa-demonstrates-reality-open-process-automation?mc_cid=1d097b7031&amp;mc_eid=UNIQID\" target=\"_blank\">article <\/a>about Yokogawa and Open Process Automation, My curiosity immediately sparked up and I typed &#8220;yokogawa&#8221; in Shodan search engine. It&#8217;s my favorite search engine for ICS so far and I have a long relationship with it. I got only 26 results , nothing much. There was a number of ports . I was interested only about ICS ports, or ports that expose ICS devices. I found out that Shodan labeled one of the results as &#8220;ICS&#8221; bingo !. I examined it and I found the following information:<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/yoko-tcp-1024x319.jpg\" alt=\"\" class=\"wp-image-929\" width=\"768\" height=\"239\" srcset=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/yoko-tcp-1024x319.jpg 1024w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/yoko-tcp-300x94.jpg 300w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/yoko-tcp-768x239.jpg 768w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/yoko-tcp.jpg 1434w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<p>You can see It looks like an OT device or a device that is used for OT operations. The product name is &#8220;MW100&#8221; . A google search gave the following:  its full name is <a rel=\"noreferrer noopener\" href=\"https:\/\/www.yokogawa.com\/solutions\/discontinued\/standalone-mw100\/\" target=\"_blank\">DAQMaster MW100<\/a>. I found out its a data acquisition and data-logging software that is used for  acquiring and monitoring  data. It also connects remotely &#8211; for I\/O purposes &#8211;  to devices such as PLC, DCS, SCADA ! and it supports various protocols such as Modbus RTU, Modubs TCP, WITS, Ethernet IP, and DNP 3 . Sounds interesting ?!<\/p>\n\n\n\n<p>I checked its official website and its labeled as a &#8220;discontinued&#8221; product !It&#8217;s also labelled as &#8220;deprecated&#8221; under the &#8220;Device type&#8221; meta data in Shodan.  MW100 uses port 44818 by default according to its <a rel=\"noreferrer noopener\" href=\"https:\/\/web-material3.yokogawa.com\/IM04L51B01-18EN_020.pdf\" target=\"_blank\">document<\/a>. Why it&#8217;s still online despite being deprecated ? Shodan search engine labelled the host that has &#8220;MW100&#8221;  as &#8220;ICS&#8221; but I noticed that it didn&#8217;t label another host as &#8220;ICS&#8221; because MW100 used a UDP port:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/yoko-udp-1024x297.jpg\" alt=\"\" class=\"wp-image-935\" width=\"768\" height=\"223\" srcset=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/yoko-udp-1024x297.jpg 1024w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/yoko-udp-300x87.jpg 300w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/yoko-udp-768x223.jpg 768w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/yoko-udp.jpg 1408w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<p>When I typed the IP addresses for both hosts (TCP\/UDP results ) I was taken to a web interface, that  allows you to  read and possibly write data (I did&#8217;t attempt it). The URL looks like http:\/\/ip-address\/web\/index.shtm or http:\/\/ip-address\/web\/mon_dg.shtm .<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/mw100-1024x359.jpg\" alt=\"\" class=\"wp-image-940\" width=\"768\" height=\"269\" srcset=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/mw100-1024x359.jpg 1024w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/mw100-300x105.jpg 300w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/mw100-768x269.jpg 768w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/mw100-1536x538.jpg 1536w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2022\/10\/mw100-2048x718.jpg 2048w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<p>To sum up , OT devices that are not yet researched and also expired OT devices can be found online by search engines. Some of them have web interfaces that expose information or enable editing due to poor configurations. Sometimes Shodan doesn&#8217;t classify ICS devices as &#8220;ICS&#8221;. I hope that asset owners pay attention to their assets&#8217; web presence and reduce their attack surface.  This is my first topic  of &#8220;OT Hunt&#8221; project. Stay tuned for next topics. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>I have always been thinking about other OT products that are exposed on the internet and have not been -yet- found or researched by the ICS security community. The type of OT products that haven&#8217;t been researched by existing tools such as Nmap , Wireshark , Metasploit , Shodan &#8230; etc. I didn&#8217;t mean vulnerability [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[170,4,3,46,163,81,168,48,23,5,166],"tags":[28,171,7,13,6,80,12,169,47,20],"class_list":["post-924","post","type-post","status-publish","format-standard","hentry","category-attack-surface","category-cyber-security","category-ics-security","category-ics-tools","category-nmap","category-osint","category-ot-hunt","category-ot-security","category-shodan","category-vendors","category-yokogawa","tag-asset-identification","tag-attack-surface","tag-cyber-security","tag-ics","tag-ics-security","tag-osint","tag-ot","tag-ot-hunt","tag-ot-security","tag-shodan"],"_links":{"self":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/comments?post=924"}],"version-history":[{"count":47,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/924\/revisions"}],"predecessor-version":[{"id":975,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/924\/revisions\/975"}],"wp:attachment":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/media?parent=924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/categories?post=924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/tags?post=924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}