Skip to content

Updated version of this weak password encryption script

License

Notifications You must be signed in to change notification settings

s3l33/CVE-2022-25012

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

Argus Surveillance DVR 4.0 - Weak Password Encryption

CVE-2022-25012

Updated version of this weak password encryption script

Exploit DB REF: https://www.exploit-db.com/exploits/50130

Author REF: https://deathflash1411.github.io/blog/dvr4-hash-crack

NIST REF: https://nvd.nist.gov/vuln/detail/CVE-2022-25012

Description:

The author had stated that they didnt make additional entries for special ASCII characters. I have updated this to include them and provide a password output to make it more user friendly as well as it accepting arguements rather than needing to edit the script to place the password hash.

Usage

python3 CVE-2022-25012.py <hash>

Example:

python3 CVE-2022-25012.py E1B0BD8F4D7B73573F7EF539A935735753D190839083C165BD8FCA79418DB398F7DF

Generating our own proof of concept

We set a complex password in the argus DVR user screen

image

Using other avenues to gain access to the following file: C:\ProgramData\PY_Software\Argus Surveillance DVR\DVRParams.ini

We can see the entry for our user and corresponding password:

image

We can then run this hash as an arguement (as seen in the usage example)

image

About

Updated version of this weak password encryption script

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages