HikPwn : Simple Scanner For Hikvision Devices With Basic Vulnerability Scanning

HikPwn, a simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8. This project was born out of curiosity while I was capturing and watching network traffic generated by some Hikvision’s software and devices.

Setup Instructions

git clone https://github.com/4n4nk3/HikPwn.git
cd HikPwn
pip install -r requirements.txt

Tested On

Python 3.8 on Linux 4.19 x86_64

Functions & Characteristics

  • Passive discovery of Hikvision devices.
  • Active discovery and enumeration of Hikvision devices via UDP probing.

Also Read – MSSQLi-DUET : MSSQL Injection-based Domain User Enumeration Tool

TODO

  • Add detection and exploitation capabilities for ICSA-17-124-01.

Help

Usage: hikpwn.py [-h] –interface INTERFACE –address ADDRESS [–active]

HikPwn, a simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8. by Ananke: https://github.com/4n4nk3.

Optional Arguments:
-h, –help show this help message and exit
–interface INTERFACE the network interface to use
–address ADDRESS the ip address of the selected network interface
–active enable “active” discovery

Censored Preview

This project is for educational purposes only. Don’t use it for illegal activities. I don’t support nor condone illegal or unethical actions and I can’t be held responsible for possible misuse of this software.

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago