47808/udp - Pentesting BACNet

Protocol Information

BACnet is a communications protocolarrow-up-right for Building Automation and Control (BAC) networks that leverage the ASHRAEarrow-up-right, ANSIarrow-up-right, and ISOarrow-up-right 16484-5 standard[1]arrow-up-right protocol.

BACnet was designed to allow communication of building automationarrow-up-right and control systems for applications such as heating, ventilating, and air-conditioning control (HVACarrow-up-right), lighting control, access control, and fire detection systems and their associated equipment. The BACnet protocol provides mechanisms for computerized building automation devices to exchange information, regardless of the particular building service they perform. From Wikipediaarrow-up-right

Default port: 47808

PORT      STATE SERVICE
47808/udp open  BACNet -- Building Automation and Control NetworksEnumerate

Enumeration

Manual

pip3 install BAC0
import BAC0
bbmdIP = '<IP>:47808'
bbmdTTL = 900
bacnet = BAC0.connect(bbmdAddress=bbmdIP, bbmdTTL=bbmdTTL) #Connect
bacnet.vendorName.strValue
#I couldn't find how to obtain the same data as nmap with this library or any other
#talk me if you know how please

Automatic

This script does not attempt to join a BACnet network as a foreign device, it simply sends BACnet requests directly to an IP addressable device.

Shodan

  • port:47808 instance

  • "Instance ID" "Vendor Name"

Last updated