Ingram is a powerful tool designed to scan for vulnerabilities in network cameras, supporting devices from major brands like Hikvision, Dahua, Uniview, and Dlink.
It operates on Linux and Mac systems, requiring Python 3.8 or higher, though Python 3.11 is not recommended due to compatibility issues.
To install Ingram, follow these steps:
git clone https://github.com/jorhelp/Ingram.git to download the tool.cd Ingram pip3 install virtualenv python3 -m virtualenv venv source venv/bin/activatepip3 install -r requirements.txt.targets.txt) with IP addresses or IP segments you want to scan. Each line should contain a single target, optionally specifying a port (e.g., 192.168.0.1:80).python3 run_ingram.py -i targets.txt -o output_folder. You can specify ports with -p and concurrency with -t.results.csv, not_vulnerable.csv) and snapshots of some devices.Ingram is strictly for security testing purposes and should not be used for illegal activities. The tool’s developers disclaim any responsibility for misuse.
Thanks to contributors like Aiminsun for CVE-2021-36260, chrisjd20 for Hikvision config file decryption, and mcw0 for DahuaConsole.
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…