Skip to content

mitchwolfe1/CCTV-GoAhead-Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

CCTV-GoAhead-Exploit

Multi-threaded CCTV Camera exploit for the GoAhead webserver vulnerability (CVE-2017-5674)

First:

python3 cctvscan.py <File Name>
(e.g. python3 cctvscan.py scanned.txt)

This uses the Shodan IOT search engine to find CCTV cameras with the GoAhead vulnerability.

Second:

python3 cctvbrute.py <input file> <output file>
(e.g. python3 cctvbrute.py scanned.txt vuln.txt)

Once you have bruted the list, you can browse to the webserver by typing the IP:PORT into your browser. Then you can login with the credentials.

About

CCTV Camera scanner using the GoAhead webserver exploit

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages