Hack like itâs 2077 â Presenting amerka mobile: A tool for geolocating and hacking Internet exposed devices
If you ever dreamed of hacking into buildings, facilities or critical infrastructures like in the game Watch Dogs or the TV show Leverage, you might be interested in amerka mobile, a tool that allows you to geolocate and hack Internet exposed devices that are operating in various types of buildings and infrastructures. Amerka mobile is a mobile version of amerka, a web interface that uses Shodan API to find devices such as cameras, building operation systems, parking spots, UPS units, SCADA devices and more. You can use amerka mobile to go to a particular place and examine its physical security, as well as exploit any vulnerabilities in the devices you find.
Amerka mobile is designed to raise awareness about the possible attack vectors on any building that exposes its vulnerable devices or control panels directly to the Internet without authentication or with weak credentials. It also shows how physical security and Internet connected devices should be secured in order to keep the whole facility safe. If you can control a building remotely, it's so much easier to break in, you can turn off cameras, sensors, lights or open doors remotely. Moreover, it's possible to track water or electricity consumption to know when the place is the most attended and carry out the attack when no one will be present.
To use amerka mobile, you need Pastebin credentials and developer key. You can geolocate specific buildings or facilities in the web interface and all the results will be available on your phone. You can also get live updates from Operator, who is behind the web interface locating and hacking devices. The mobile application is an additional feature to go to the building, examine physical security and hack it with different methods, including social engineering, to take over the building.
Amerka mobile is based on amerka project by Wojciech [^2^], who published an article about it on his blog [^3^]. He also provides some examples of how he used amerka to find devices in airports, hospitals, power plants and other places. He emphasizes that during his research no system has been breached, hacked or compromised. He also states that the code for mobile application probably never will be shared.
If you want to learn more about amerka mobile and how to hack like it's 2077, you can check out his blog post [^3^] or follow him on Twitter [@woj_ciech](https://twitter.com/woj_ciech).
So how does amerka mobile work It uses Shodan, the world's first search engine for Internet-connected devices [^1^]. Shodan crawls the entire Internet every week and provides a comprehensive view of all exposed services and devices. You can use Shodan to discover everything from power plants, mobile phones, refrigerators and Minecraft servers. You can also use Shodan to monitor your own network exposure and keep track of any devices that are directly accessible from the Internet.
Amerka mobile leverages Shodan API to find devices based on keywords, location, port, operating system and more. You can enter a keyword such as \"airport\" or \"hospital\" and amerka will show you all the devices that match that keyword in a map. You can also enter a specific location such as \"New York\" or \"Paris\" and amerka will show you all the devices in that area. You can filter the results by port, operating system or device type to narrow down your search.
Once you find a device that interests you, you can tap on it to see more details such as IP address, hostname, organization, country, city and coordinates. You can also see a screenshot of the device's web interface if available. Some devices may require authentication or have strong security measures, but some may not. You can try to access the device's web interface by tapping on the \"Open in browser\" button. You may be able to control the device or access its data if you find a vulnerability or a default password.
Amerka mobile also allows you to communicate with Operator, who is behind the web interface locating and hacking devices. You can chat with Operator via text or voice and get live updates on your target. Operator can also send you commands or scripts to run on the device if you have access to it. You can also share your location with Operator so he or she can guide you to the best spot to hack the device. ec8f644aee