Exploitation Tools

HikvisionExploiter – Automated Exploitation And Surveillance Utility For Hikvision Cameras

HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network cameras exploiting the Web interface Version 3.1.3.150324.

It downloads snapshots and compiles them into videos for efficient surveillance monitoring, Then retrieves the camera device info and downloads the “configurationFile” to all the registered Users Creds.

Table Of Contents

  • Features
  • Requirements
  • Installation
  • Usage
  • Configuration
  • Finding Targets
  • License

Features

  1. Automated Directory Accessibility Checks for Hikvision Cameras
  2. Snapshot Downloading and Storage
  3. Device Information Retrieval and Logging
  4. User Information Retrieval and Logging
  5. Encrypted Configuration File Downloading and Decryption
  6. Comprehensive CVE Vulnerability Checks
    • CVE-2021-36260 Detection
    • CVE-2017-7921 Detection
    • CVE-2022-28171 Detection
  7. Multi-Target Support with targets.txt
  8. Detailed Logging for Each Target
  9. Real-Time Feedback with Colored Output
  10. Interrupt Handling with SIGQUIT
  11. Customizable Configuration Options
  12. Organized Output for Snapshots, Logs, and Decrypted Files

Requirements

  • Python 3.6 or higher
  • FFmpeg
  • requests library
  • PyCrypto library (for decrypt_configurationFile.py, install using pip install pycrypto)

Installation

Clone The Repository

git clone https://github.com/HexBuddy/HikvisionExploiter.git
cd HikvisionExploiter

Install required packages

pip3 install -r requirements.txt

Install FFmpeg

Download and install FFmpeg from FFmpeg’s official website.

Usage

Create a targets.txt file

Create a targets.txt file in the root directory of the project with the following format:

IP:PORT

Each line should contain an IP address and port of a Hikvision camera.

Run The Script

python3 checker.py

The script will check the accessibility of the directories on the specified cameras, download snapshots, and compile them into videos.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

BypassAV : Techniques To Evade Antivirus And EDR Systems

BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and…

15 hours ago

ComDotNetExploit : Exploiting Windows Protected Process Light (PPL)

ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows…

15 hours ago

Trigon : A Revolutionary Kernel Exploit For iOS

Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability.…

15 hours ago

Bug Bounty Report Templates : Enhancing Efficiency In Vulnerability Reporting

Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They…

15 hours ago

FullBypass : A Tool For AMSI And PowerShell CLM Bypass

FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained…

16 hours ago

Carseat : A Python Implementation Of Seatbelt

Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool,…

20 hours ago