Cyber security

Kamerka GUI – Advanced Reconnaissance For IoT And ICS

Kamerka GUI stands as the ultimate reconnaissance tool for the Internet of Things (IoT) and Industrial Control Systems (ICS).

Developed with support from powerful platforms like Shodan and enhanced by resources from Binary Edge and WhoisXMLAPI, this tool offers an unparalleled view into the security posture of critical infrastructures worldwide.

Explore how Kamerka GUI leverages open-source information and exploits to pinpoint and analyze vulnerable connected devices across various sectors.

NSA And CISA Recommend Immediate Actions To Reduce Exposure Across Operational Technologies And Control Systems

Shodan, Kamerka, are creating a “perfect storm” of

  1. easy access to unsecured assets,
  2. use of common, open-source information about devices, and
  3. an extensive list of exploits deployable via common exploit frameworks (e.g., Metasploit, Core Impact, and Immunity Canvas).

Usage

1. Scan for Internet facing Industrial Control Systems, Medical and Internet of Things devices based on country or coordinates.

2. Gather passive intelligence from WHOISXML, BinaryEdge and Shodan or active by scanning target directly.

3. Thanks to indicators from devices and google maps, pinpoit device to specific place or facility (hospital, wastewater treatment plant, gas station, university, etc.)

4. (Optional, not recommended) 4. Guess/Bruteforce or use default password to gain access to the device. Some exploits are implemented for couple specific IoTs.

5. Report devices in critical infrastructure to your local CERT.

Features

  • More than 100 ICS devices
  • Gallery section shows every gathered screenshot in one place
  • Interactive Google maps
  • Google street view support
  • Possibility to implement own exploits or scanning techiques
  • Support for NMAP scan in xml format as an input
  • Find the route and change location of device
  • Statistics for each search
  • Search Flick photos nearby your device
  • Position for vessels is scraped from device directly, rather than IP based
  • Some devices return hints or location in the response. It’s parsed and displayed as an indicator that helps to geolocate device.

Installation

Requirements

  • beautiful soup
  • python3
  • django
  • pynmea2
  • celery
  • redis
  • Shodan paid account
  • BinaryEdge (Optional)
  • WHOISXMLAPI (Optional)
  • Flickr (Optional)
  • Google Maps API
  • Pastebin PRO (Optional)
  • xmltodict
  • python-libnmap

Make sure your API keys are correct and put them in keys.json in main directory.

Run

git clone https://github.com/woj-ciech/Kamerka-GUI/
pip3 install -r requirements.txt
python3 manage.py makemigrations
python3 manage.py migrate
python3 manage.py runserver

In a new window (in main directory) run celery worker celery worker -A kamerka --loglevel=info

For new version of Celery celery --app kamerka worker

In a new window fire up redis apt-get install redis redis-server

And server should be available on http://localhost:8000/

For more information click here.

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

SharpIncrease – Mastering Malware Obfuscation To Bypass Security Detection

Adversaries may use binary padding to add junk data and change the on-disk representation of…

4 hours ago

Deployment Instructions – Setting Up The PinguCrew Project With Docker, Python, And Node.js

At the moment the default configuration when the run_server butler command uses docker containers to run the…

4 hours ago

ROP ROCKET – The Next Evolution Of ROP Chain Generation

This new, advanced ROP framework made it debute at at DEF CON 31 with some…

4 hours ago

ANDROPHSY – Comprehensive Forensic Tool For Android Smartphones

ANDROPHSY is an opensource forensic tool for Android smartphones that helps digital forensic investigator throughout…

5 hours ago

App Metadata – A Comprehensive Guide To iOS, Android, And UWP Application Metadata Extraction

This package has been deprecated, and is not being maintained by MSFT anymore. This library…

5 hours ago

Check-If-Email-Exists : A Tool To Verify Email Addresses Without Sending Emails

This is open-source, but I also offer a SaaS solution that has check-if-email-exists packaged in a nice friendly web…

1 day ago