OT Hunt: Finding HMIs with Shodan

OT Hunt: Finding HMIs with Shodan

Welcome to the 13th installment of “OT Hunt”, a series that has become a beacon for those navigating the murky waters of Industrial Control Systems/Operational Technology (ICS/OT) security. Our journey is more than a quest; it's a mission to illuminate the hidden corners of the internet where ICS/OT devices dwell, often unnoticed and vulnerable. This exploration is not just about discovery; it's a clarion call to action for asset owners and ICS/OT vendors, emphasizing the paramount importance of fortifying their digital fortresses.

In this episode, my curiosity took me to the realm of Human-Machine Interfaces (HMIs), where humans and machines interact closely. Starting with a specific dork saved in my archive list of dorks on GitHub, I utilized:

screenshot.label:ics        

This key resulted 551 devices. However, it's crucial to note the diversity in this digital ecosystem; many of the findings came from different services such as VNC, RDP and some were images from cameras.Those digital cameras were monitoring and recording HMIs.

I tried to focus towards a specific target: Automation Direct (https://www.automationdirect.com) a company in the ICS/OT arena. I used the following dork:

screenshot.label:ics product:"Automation Direct"        

The results were telling—most screenshots captured were indeed HMIs, offering a window into various processes across different plants and operational technologies.

Further refining my search, I employed another dork:

screenshot.label:ics product:"VNC"        

, which unveiled 290 HMI interfaces connected to the internet via VNC. This method of connection, while facilitating remote access, also opens the door to potential unauthorized access, especially when security measures are lax.

Another finding was a product by Varicool (https://varicool.pk/), which featured both a PLC (Programmable Logic Controller) named PLC 12.00 Tandem and an HMI. Please note that this device looks like a building controller that manages a refrigerator temperature. The VNC connection to this device, alarmingly, had authentication disabled—a red flag waving vigorously for any passerby with malicious intent.

Checking RDP-connected devices, which displayed Windows login screens, offering no glimpse into the HMI or underlying processes. This observation points to a forgone opportunity to accumulate existing usernames for HMI machines, as each machine reveals the username and asks for a password.

Exploring ICS/OT security gets more exciting. Our project, ICSrank, is a unique tool for the ICS/OT world, showing our dedication to improving ICS/OT cybersecurity in this essential area. ICSrank isn't just a tool; it's a guide, providing crucial insights and assessments for stronger cyber defense.

Keep an eye out for more discoveries and insights as we navigate the unexplored areas of ICS/OT security. By identifying ICS/OT devices on the internet and addressing exposure issues, we can transform vulnerabilities into strongholds of digital secuWelcome to the 13th installment of “OT Hunt”, a series that has become a beacon for those navigating the murky waters of Industrial Control Systems/Operational Technology (ICS/OT) security. Our journey is more than a quest; it's a mission to illuminate the hidden corners of the internet where ICS/OT devices dwell, often unnoticed and vulnerable. This exploration is not just about discovery; it's a clarion call to action for asset owners and ICS/OT vendors, emphasizing the paramount importance of fortifying their digital fortresses.

In this episode, my curiosity took me to the realm of Human-Machine Interfaces (HMIs), where humans and machines interact closely. Starting with a specific dork saved in my archive list of dorks on GitHub, I utilized:

screenshot.label:ics        

This key resulted 551 devices. However, it's crucial to note the diversity in this digital ecosystem; many of the findings came from different services such as VNC, RDP and some were images from cameras.Those digital cameras were monitoring and recording HMIs.


I tried to focus towards a specific target: Automation Direct (https://www.automationdirect.com) a company in the ICS/OT arena. I used the following dork:

screenshot.label:ics product:"Automation Direct"        

The results were telling—most screenshots captured were indeed HMIs, offering a window into various processes across different plants and operational technologies.


Further refining my search, I employed another dork:

screenshot.label:ics product:"VNC"        

, which unveiled 290 HMI interfaces connected to the internet via VNC. This method of connection, while facilitating remote access, also opens the door to potential unauthorized access, especially when security measures are lax.

Another finding was a product by Varicool (https://varicool.pk/), which featured both a PLC (Programmable Logic Controller) named PLC 12.00 Tandem and an HMI. Please note that this device looks like a building controller that manages a refrigerator temperature. The VNC connection to this device, alarmingly, had authentication disabled—a red flag waving vigorously for any passerby with malicious intent.


Checking RDP-connected devices, which displayed Windows login screens, offering no glimpse into the HMI or underlying processes. This observation points to a forgone opportunity to accumulate existing usernames for HMI machines, as each machine reveals the username and asks for a password.

Exploring ICS/OT security gets more exciting. Our project, ICSrank, is a unique tool for the ICS/OT world, showing our dedication to improving ICS/OT cybersecurity in this essential area. ICSrank isn't just a tool; it's a guide, providing crucial insights and assessments for stronger cyber defense.

Keep an eye out for more discoveries and insights as we navigate the unexplored areas of ICS/OT security. By identifying ICS/OT devices on the internet and addressing exposure issues, we can transform vulnerabilities into strongholds of digital security.

要查看或添加评论,请登录

Sulaiman Alhasawi的更多文章

  • OT Lab: Hacking OpenPLC

    OT Lab: Hacking OpenPLC

    Having an OT lab is crucial for any OT security practitioner or learner. It’s where you gain practical, hands-on skills…

    10 条评论
  • 2024: A Year in OT Cybersecurity

    2024: A Year in OT Cybersecurity

    As 2024 comes to a close, I’m proud to reflect on an incredible year filled with contributions to OT cybersecurity…

    13 条评论
  • Open Source Tools for OT Defenders

    Open Source Tools for OT Defenders

    In my recent podcast "ICS/OT Blue Team" on ICS Arabia Podcast with Shaker Hashlan , we dived into a topic critical for…

    1 条评论
  • Unveiling the Risks of Exposed T5 PLCs, Vulnerable Routers, and RTSP Misconfigurations

    Unveiling the Risks of Exposed T5 PLCs, Vulnerable Routers, and RTSP Misconfigurations

    Welcome to the 21st installment of “OT Hunt” where we dive into the challenges and opportunities within the realm of…

    3 条评论
  • HTML5 in the Wild: Transforming OT Interfaces but Opening New Risks

    HTML5 in the Wild: Transforming OT Interfaces but Opening New Risks

    Introduction Welcome to the 20th installment of "OT Hunt” where we dive into the challenges and opportunities within…

  • How to Find Water Systems on the Internet: A Guide to ICS/OT OSINT

    How to Find Water Systems on the Internet: A Guide to ICS/OT OSINT

    Welcome to the 19th installment of “OT Hunt” where we delve into the world of ICS/OT devices connected to the internet.…

    8 条评论
  • OT Hunt: clearSCADA

    OT Hunt: clearSCADA

    Welcome to the 18th installment of “OT Hunt” where we delve into the world of ICS/OT devices connected to the internet.…

    1 条评论
  • How to Find and Probe ENCO PLCs on the Internet Just Like FrostyGoop malware

    How to Find and Probe ENCO PLCs on the Internet Just Like FrostyGoop malware

    Welcome to the 17th installment of “OT Hunt” where we delve into the world of ICS/OT devices connected to the internet.…

  • Finding WAGO 750-88x PLC Using Google

    Finding WAGO 750-88x PLC Using Google

    Welcome to the 16th installment of “OT Hunt” where we delve into the world of ICS/OT devices connected to the internet.…

    1 条评论
  • How Google Can Be Used in ICS/OT OSINT

    How Google Can Be Used in ICS/OT OSINT

    Welcome to the second installment of our series "ICS/OT OSINT" where we delve into the use of Open Source Intelligence…

社区洞察

其他会员也浏览了