Osint Tool: Kamerka-GUI

R4V3N

Adanmış Üye
3 Tem 2016
6,250
38
25
Kocaeli
What is Kamerka-GUI?

The main purpose of the Kamerka-GUI Ultimate Internet of Things/Industrial Control Systems reconnaissance tool is to map attack surfaces, in terms of Industrial Control Devices, for any country.

The tool was developed by Wojciech.
The tool was originally designed to identify nearby surveillance cameras that could be accessed from the internet, but two years ago its developer expanded its features and now can be used to find a wide variety of systems, including printers, ICS and IoT devices.

Users who wanna use Kamerka over its GUI must install it on a server. This can be done on a local server by installing Celery task queue application for Python3, Django, Redis, and Python web applications.

No specific configuration edits are required for Kamerka to work properly. The tool also uses the Whois XML API, Shodan API ($59) or BinaryEdge, Flickr and Google Maps API to browse the web and manage the collected data.

We have 3 Python commands to run Kamerka on a local server, the application works on port 8000 and can be used in a web browser on localhost.

Researchers believe that tool can be extremely useful for the state and government to identify critical infrastructure that could be exposed to malicious attacks.

Wojciech says he will continue to improve Kamerka. “I see a lot of possibilities for further development — more queries, integration with Nmap and PLCscan, offensive capabilities, more social media sources or automated separation of critical infrastructure from other devices,” he explained.

We can also view the results on a map and use the Google Street View API to view buildings hosting target devices.

Installation

We need to copy the github link first:
https://github.com/woj-ciech/Kamerka-GUI

Then open terminal and go to desktop, to do that:

Kod:
cd Desktop

We can download the tool here, type:

Kod:
git clone https://github.com/woj-ciech/Kamerka-GUI

KBXtZN.png


Go to that folder after it's downloaded.

Kod:
cd Kamerka-GUI

iJ8PNR.png


Now we need to install requirements.txt file.

Kod:
pip3 install -r requirements.txt

SoAzqj.png


Type the following command to run the tool:

Kod:
python3 manage.py makemigrations

ZU2QI0.png


Kod:
python3 manage.py migrate

8Uz4GR.png


Kod:
python3 manage.py runserver

FooBE5.png


Now our tool is installed on 127.0.0.1:8000

Open a new tab in terminal.

9nVeK4.png


We need to type a command to forward APIs.

Kod:
celery worker -A kamerka --loglevel=info

3CfYi2.png


Now install redis package.

veqUHz.png


Lastly, open 3rd tab in terminal and type

Kod:
redis-server

Pp5xfn.png


Then open your browser, finally.

M5NgGi.png


Go to 127.0.0.1:8000 and you'll see Kamerka tool.

j46gj5.png


Here's a video for you guys:

https://www.youtube.com/watch?v=IPMXe6eeu-A

Summary

While in its initial version Kamerka scanned only for security cameras -- hence the Kamerka name -- the tool has received several updates in the past year. Current versions can scan and identify.

- Internet-connected security cameras
- Internet-connected printers
- Internet-connected ICS/SCADA industrial equipment
- Systems and sensors that work on top of the MQTT protocol
- Devices that broadcast an RTSP-based live video stream
- Tweets, Instagram posts, and Flicker images that contain geolocati0n details

Kamerka gathers this information, collects it in an Elasticsearch database, and then plots it on a Google Map. For each device plotted on the map, users can click and see a tooltip with exposed ports and various other métadata.

Here's an example:

qtoPQe.jpg


Source: https://www.turkhackteam.org/sosyal-muhendislik/1922026-osint-araci-kamerka-gui.html
Translator: R4V3N
 
Moderatör tarafında düzenlendi:
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.