“Kamerka has been completely updated. Now you can scan #ICS #IoT, collect information in a more convenient user interface,” the specialist writes on his page.

1. Scan for Internet facing Industrial Control Systems, Medical and Internet of Things devices based on country or coordinates.
2. Gather passive intelligence from WHOISXML, BinaryEdge and Shodan or active by scanning target directly.
3. Thanks to indicators from devices and google maps, pinpoit device to specific place or facility (hospital, wastewater treatment plant, gas station, university, etc.)

4. (Optional, not recommended) 4. Guess/Bruteforce or use default password to gain access to the device. Some exploits are implemented for couple specific IoTs.
5. Report devices in critical infrastructure to your local CERT.


By Treadstone 71

@Treadstone71LLC Cognitive Warfare Training, Intelligence and Counterintelligence Tradecraft, Influence Operations, Cyber Operations, OSINT,OPSEC, Darknet, Deepweb, Clandestine Cyber HUMINT, customized training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, Disinformation detection, Analysis as a Service