Ingram is a powerful tool designed to scan for vulnerabilities in network cameras, supporting devices from major brands like Hikvision, Dahua, Uniview, and Dlink.
It operates on Linux and Mac systems, requiring Python 3.8 or higher, though Python 3.11 is not recommended due to compatibility issues.
To install Ingram, follow these steps:
git clone https://github.com/jorhelp/Ingram.git
to download the tool.cd Ingram pip3 install virtualenv python3 -m virtualenv venv source venv/bin/activate
pip3 install -r requirements.txt
.targets.txt
) with IP addresses or IP segments you want to scan. Each line should contain a single target, optionally specifying a port (e.g., 192.168.0.1:80
).python3 run_ingram.py -i targets.txt -o output_folder
. You can specify ports with -p
and concurrency with -t
.results.csv
, not_vulnerable.csv
) and snapshots of some devices.Ingram is strictly for security testing purposes and should not be used for illegal activities. The tool’s developers disclaim any responsibility for misuse.
Thanks to contributors like Aiminsun for CVE-2021-36260, chrisjd20 for Hikvision config file decryption, and mcw0 for DahuaConsole.
The cp command, short for "copy," is the main Linux utility for duplicating files and directories. Whether…
Introduction In digital investigations, images often hold more information than meets the eye. With the…
The cat command short for concatenate, It is a fast and versatile tool for viewing and merging…
What is a Port? A port in networking acts like a gateway that directs data…
The ls command is fundamental for anyone working with Linux. It’s used to display the files and…
The pwd (Print Working Directory) command is essential for navigating the Linux filesystem. It instantly shows your…