Skip to content

[addtool] Camera Exploitation Tool #1116

@piyush-security

Description

@piyush-security

[homepage]
https://github.com/TasosY2K/camera-exploit-tool
[/homepage]

[tags]
camera, exploitation, scanner
[/tags]

[short_descr]
Automated exploit scanner for cameras on the internet.
[/short_descr]

[long_descr]

Internet Camera Exploitation Tool

This is a tool meant to assist cyber security researchers on discovering outdated and vulnerable camera systems on the internet by utilizing shodan.io

I was able to discover thousands of vulnerable cameras using it
image
image
image

Vendors Affected

[+] Hikvision

[+] Avtech

[+] TVT

[+] Cacti

more to come...

Features

  • Fetching of hosts from shodan.io
  • Check for vulnerable cameras
  • Automatically run commands on exploited devices (Only Hikvision for now)
  • Automatically grab camera credentials (Only for Avtech)
  • Multi-threading for faster scanning
  • Usage of Socks5 proxies for anonymity
  • Storing results in Sqlite3 database
  • Logging all actions in log files

Prerequisites

To use this tool you need to have the following:

  • Shodan API key (Membership required for more than 1 page)
  • Socks5 authenticated proxies

Installation

git clone https://github.com/TasosY2K/camera-exploit-tool
pip install -r requirements.txt
python3 scanner.py --help

Usage

Collect hosts in database
# Collect Hikvision hosts
python3 scanner.py --shodan --api-token <shodan_token> --query 'product:"Hikvision IP Camera"' --pages 1

# Collect Avtech hosts
python3 scanner.py --shodan --api-token <shodan_token> --query 'linux upnp avtech' --pages 1

# Collect TVT hosts
python3 scanner.py --shodan --api-token <shodan_token> --query 'product:"Cross Web Server"' --pages 1

# Collect Cacti hosts
python3 scanner.py --shodan --api-token <shodan_token> --query 'Login to Cacti' --pages 1
Check hosts for exploit
python3 scanner.py --check --proxy-file proxies.txt --threads 20
Automatically run command on exploited hosts
python3 scanner.py --autopwn --proxy-file proxies.txt --payload "id"

Exploits Used

https://www.exploit-db.com/exploits/40500

2021-36260 https://www.exploit-db.com/exploits/50441

https://github.com/k1p0d/h264_dvr_rce

CVE-2022-46169 https://github.com/sAsPeCt488/CVE-2022-46169

[/long_descr]

[image]
image

[/image]

Metadata

Metadata

Assignees

No one assigned

    Labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions