Futaba _ Webs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

CCTV Hacking πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Today we are going to be covering the Shodan API and how to use it for CCTV hacking to tap into camera feeds, as well as how to gather information about various IoT gateway devices on the internet and exploit the services on them. This is also going to dive into complex topics like: port forwarding, router exploitation, the routersploit framework, the metasploit framework, as well as how the internet works under the hood. I'm not going to directly tap into a camera feed live as that's illegal (even if it's a public cam for a park), but I am going to show you how to talk to specific ports using an IP address, whether it be in numeral format or alphabetical format. It's the same process you'll be using to tap into camera feeds should you find an open port.

πŸŽƒ Article πŸŽƒ Glossary πŸŽƒ Catalog πŸŽƒ Home πŸŽƒ Search Mode

πŸŽƒ Article Glossary

πŸ•Έ Synopsis πŸ•Έ

Today we are going to be covering the Shodan API and how to use it for CCTV hacking to tap into camera feeds, as well as how to gather information about various IoT gateway devices on the internet and exploit the services on them. This is also going to dive into complex topics like: port forwarding, router exploitation, the routersploit framework, the metasploit framework, as well as how the internet works under the hood. I'm not going to directly tap into a camera feed live as that's illegal (even if it's a public cam for a park), but I am going to show you how to talk to specific ports using an IP address, whether it be in numeral format or alphabetical format. It's the same process you'll be using to tap into camera feeds should you find an open port.

Disclaimer

As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, let's begin!

πŸ•Έ Article Topics πŸ•Έ

I'll be discussing the following topics in order:

πŸŽƒ Premise

πŸŽƒ What is an API?

πŸŽƒ What is the Shodan API?

πŸŽƒ What is a Router?

πŸŽƒ What is DNS?

πŸŽƒ What is DHCP?

You can click on any of the topics to simply check that one out if it interests you!

NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!

πŸ•Έ Key Links πŸ•Έ

Here's a quick run down on all the main links that are in the article in case you want to check them out first.

πŸŽƒ LinkedIn Version

πŸŽƒ Patreon Version

πŸŽƒ Shodan

πŸŽƒ CCTV Hacking

Premise πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

For this demonstration, since we'll be using metasploit for it, you're going to need a Shodan premium membership to get a lifetime API key(s). Sadly, Shodan now requires you to be a premium member if you wish to use the API freely.

You can still query searches on the site if you are looking for something and tap into feeds via GUI, but you won't have access to the full features of the core API if you wish to craft your own exploits with them via metasploit and your own code for example.

Link to Shodan

Link to video

Like always, before we dive into the actual exploit, let's touch up on a bit of terminology and major concepts so that you understand how the overall process works. Wouldn't be a good article without that.

What is an API? πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

You've probably heard this term a lot, and probably need a bit of clarification on what this is. An API (Application programming interface) is essentially the core biological functions that make up a computer program. In most cases nowadays it's used in context with "automation" software for web applications, stuff like the "Shodan API" for example, that have core integrated functions that allow you to query information about IoT devices on the web. Another example of an API, would be a kernel, which pertains to the core functions that make up an operating system, and dictates how hardware and software interact with each other, allowing you to control the system.

Another good example would be the Windows32 API, that hackers and researchers use for stuff like DLL and Code injections to hook and hijack Windows system processes. They can also use it for little pranks like preventing you from opening your CD Drive, or shutting off your monitor by broadcasting a system command to all handles on the main system, shutting it off and on as they please.

What is the Shodan API? πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

The Shodan API is an OSINT tool that is used to track and gather information about various IoT gateway devices (routers), services hosted on them, as well as their corresponding IP's that are connected to the internet. This allows you to gain insight and exploit various services hosted on them and tap into things like: CCTV surveillance systems, home security systems, as well as file sharing services, SSH services, and of course, WEB APPLICATION services. You can also exploit any vulnerabilities that are in the firmware of the router itself, allowing you to pwn it and compromise the internal network.

Fun fact, when you are talking to a web server, you aren't actually talking to the main system itself directly, you are talking to the router that is hosting the service on behalf of it, indirectly. This also comes into play when you are port scanning with NMAP. When you scan with NMAP, you're actually scanning the router that is hosting many services on behalf of other systems on the internal network, or a singular one if that's the case.

As we know, the internet is made up of various communication devices, routers, that interconnect to one another, allowing end users to exchange data, access services like web applications (web sites), and communicate over the internet. All of this is possible through a technique known as port forwarding, that allows internal networks to safely communicate with each other. The internet wouldn't be possible without it, and without it, internal networks and highly sensitive information would be highly exposed and easily compromised.





What is a Router? πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

A router is a form of network communication device that is used to host a network, forward communications to and from the network via DNS, domain name server, as well as assign IP addresses to systems that are on the local network. The router is also known as the default gateway.

What is DNS? πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

DNS, Domain name server, hosted on port 53, is what allows you to query, as well as translate the alphabetical address of a website into something that the machine can understand, numeral format, routing you to your destination. Alphabetical names are used because they are a lot easier for us to remember.

What is DHCP? πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

DHCP, dynamic host configuration protocol, is what is used to automatically assign IP addresses to host systems on the network, otherwise systems would have to statically assign themselves as one that falls within the network range. If this isn't set properly it can cause issues such as you being unable to access the internet, even though it says you have internet.


portfolio img

If you like to see the more advanced version of this article that talks about methods that can be used to mitigate, as well as any videos included, SUBSCRIBE TO MY PATREON CYBER SECURITY TIER!

If you enjoyed this post give it a thumbs up! I’ll be keeping track of whose reacting from now on as there is a β€œspecial” reason for it. Just know the more you support my content the more there is in stored!


- The Hacker Who Laughs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

portfolio img

πŸŽƒ CONTACT ME

AnOnYmOuS

futaba.webs@gmail.com

New York, NY United States