Now that we got that out of the way... I have been seeing posts on sites with people having fun with embedded systems/devices and I was feeling left out. I didn't really want to go out and buy a device so I looked at what was laying around.
Enter the Trendnet TV-IP110w - http://www.trendnet.com/products/proddetail.asp?prod=145_TV-IP110W
To start off the latest firmware for this device can be found at the following location :
First order of business was to update the camera with the most recent firmware:
Device info page confirming firmware version |
Now that the device was using the same version of firmware as I was going to dive into, lets get to work. I will be using binwalk to fingerprint file headers that exist inside the firmware file. Binwalk can be downloaded from the following url: http://code.google.com/p/binwalk/
Running binwalk against the firmware file
binwalk FW_TV-IP110W_1.1.0-104_20110325_r1006.pck
DECIMAL HEX DESCRIPTION
-------------------------------------------------------------------------------------------------------
32320 0x7E40 gzip compressed data, from Unix, last modified: Thu Mar 24 22:59:08 2011, max compression
679136 0xA5CE0 gzip compressed data, was "rootfs", from Unix, last modified: Thu Mar 24 22:59:09 2011, max compression
Looks like there are two gzip files in the "pck" file. Lets carve them out using 'dd'. First cut the head off the file and save it off as '1_unk'
#dd if=FW_TV-IP110W_1.1.0-104_20110325_r1006.pck of=1_unk bs=1 count=32320
32320+0 records in
32320+0 records out
32320 bytes (32 kB) copied, 0.167867 s, 193 kB/s
Next cut out the first gzip file that was identified, we will call this file '2'
#dd if=FW_TV-IP110W_1.1.0-104_20110325_r1006.pck of=2 bs=1 skip=32320 count=646816
646816+0 records in
646816+0 records out
646816 bytes (647 kB) copied, 2.87656 s, 225 kB/s
Finally cut the last part of the file out that was identified as being a gzip file, call this file '3'
#dd if=FW_TV-IP110W_1.1.0-104_20110325_r1006.pck of=3 bs=1 skip=679136
2008256+0 records in
2008256+0 records out
2008256 bytes (2.0 MB) copied, 8.84203 s, 227 kB/s
For this post I am going to ignore files '1_unk' and '2' and just concentrate on file '3' as it contains an interesting bug :) Make a copy of the file '3' and extract it using gunzip
#file 3
3: gzip compressed data, was "rootfs", from Unix, last modified: Thu Mar 24 22:59:09 2011, max compression
#cp 3 3z.gz
#gunzip 3z.gz
gzip: 3z.gz: decompression OK, trailing garbage ignored
#file 3z
3z: Minix filesystem, 30 char names
As we can see the file '3' was a compressed Minix file system. Lets mount it and take a look around.
#mkdir cameraFS
#sudo mount -o loop -t minix 3z cameraFS/
#cd cameraFS/
#ls
bin dev etc lib linuxrc mnt proc sbin server tmp usr var
There is all sorts of interesting stuff in the "/server" directory but we are going to zero in on a specific directory "/server/cgi-bin/anony/"
#cd server/cgi-bin/anony/
#ls
jpgview.htm mjpeg.cgi mjpg.cgi view2.cgi
The "cgi-bin" directory is mapped to the root directory of http server of the camera, knowing this we can make a request to http://192.168.1.17/anony/mjpg.cgi and surprisingly we get a live stream from the camera.
video stream. giving no fucks. |
Now at first I am thinking, well the directory is named "anony" that means anonymous so this must be something that is enabled in the settings that we can disable.... Looking at the configuration screen you can see where users can be configured to access the camera. The following screen shows the users I have configured (user, guest)
Users configured with passwords. |
Still after setting up users with passwords the camera is more than happy to let me view its video stream by making our previous request. There does not appear to be a way to disable access to the video stream, I can't really believe this is something that is intended by the manufacturer. Lets see who is out there :)
Because the web server requires authentication to access it (normally) we can use this information to fingerprint the camera easily. We can use the realm of 'netcam' to conduct our searches
HTTP Auth with 'netcam' realm |
Hopping on over to Shodan (http://www.shodanhq.com) we can search for 'netcam' and see if there is anyone out there for us to watch
9,500 results |
If we check a few we can see this is limited to only those results with the realm of 'netcam' and not 'Netcam'
creepy hole in the wall |
front doors to some business |
Doing this manually is boring and tedious, wouldn't it be great if we could automagically walk through all 9,500 results and log the 'good' hosts.... http://consolecowboys.org/scripts/camscan.py
This python script requires the shodan api libs http://docs.shodanhq.com/ and an API key. It will crawl the shodan results and check if the device is vulnerable and log it. The only caveat here is that the shodan api.py file needs to be edited to allow for including result page offsets. I have highlighted the required changes below.
def search(self, query,page=1):
"""Search the SHODAN database.
Arguments:
query -- search query; identical syntax to the website
page -- page number of results
Returns:
A dictionary with 3 main items: matches, countries and total.
Visit the website for more detailed information.
"""
return self._request('search', {'q': query,'page':page})
Last I ran this there was something like 350 vulnerable devices that were available via shodan. Enjoy.
Update: We are in no way associated with the @TRENDnetExposed twitter account.
Update: We are in no way associated with the @TRENDnetExposed twitter account.
Read more
- Nsa Hacker Tools
- Pentest Tools Nmap
- Nsa Hacker Tools
- Termux Hacking Tools 2019
- Hack Tools Mac
- Hacker Tools 2020
- Hacking Tools Download
- Tools Used For Hacking
- Hacking Tools Pc
- Hacker Tools For Ios
- Kik Hack Tools
- Hacker Tools Hardware
- Ethical Hacker Tools
- New Hacker Tools
- Hacker Tools For Windows
- Pentest Tools Port Scanner
- Best Pentesting Tools 2018
- Hacking Tools 2019
- Hacker Tools For Pc
- Github Hacking Tools
- Pentest Tools Website Vulnerability
- Underground Hacker Sites
- Hack Website Online Tool
- Hacking Tools Windows 10
- Hacker Tools Free Download
- Hacker Tools Linux
- Hacking Tools For Beginners
- Hack Tools
- Hack Tools
- Pentest Tools Windows
- Hacking Tools Free Download
- Hack Tools Download
- Pentest Tools List
- Hacking Tools For Kali Linux
- Pentest Tools
- Hacking Tools For Mac
- Pentest Tools For Ubuntu
- Termux Hacking Tools 2019
- Pentest Tools Android
- Black Hat Hacker Tools
- Pentest Tools Framework
- Hacking Tools For Windows
- Hack Tools For Pc
- Github Hacking Tools
- Hacking Tools 2019
- Hacking App
- Tools Used For Hacking
- How To Make Hacking Tools
- Hacking Tools And Software
- Pentest Tools Open Source
- Hacker Tools Linux
- Best Pentesting Tools 2018
- Computer Hacker
- Hacker Tools For Pc
- Pentest Tools For Mac
- What Is Hacking Tools
- Pentest Tools Apk
- Hacking Tools 2020
- Free Pentest Tools For Windows
- Hacker Tool Kit
- Beginner Hacker Tools
- Hacker Tools 2020
- Pentest Tools Online
- How To Hack
- Pentest Tools Kali Linux
- Pentest Tools Alternative
- Hacking Tools For Windows Free Download
- Hak5 Tools
- Pentest Tools Free
- Hacking Tools For Windows 7
- Pentest Tools Android
- Pentest Tools Free
- Hacker Tool Kit
- Hacker Tools Linux
- Pentest Tools Review
- Pentest Tools Port Scanner
- How To Make Hacking Tools
- Top Pentest Tools
- Pentest Recon Tools
- Hacking Tools Windows 10
- Hacker Tools Online
- How To Hack
- Pentest Tools Nmap
- Hacker Tools Linux
- Best Hacking Tools 2019
- Pentest Tools Tcp Port Scanner
- Pentest Tools Nmap
- Hacking Tools And Software
- Pentest Tools Port Scanner
- New Hacker Tools
- Hack Tools Pc
- Free Pentest Tools For Windows
- Hack Tools 2019
- Pentest Tools Website
- Hacker Techniques Tools And Incident Handling
- Hack Website Online Tool
- Hacker Security Tools
- Pentest Tools Android
- Hack Rom Tools
- Best Hacking Tools 2019
- Best Hacking Tools 2019
- Hacking Tools For Pc
- Easy Hack Tools
- Hacking Tools For Mac
- Blackhat Hacker Tools
- Hacking Tools
- Hacking Tools Windows 10
- Tools Used For Hacking
- Hacker Tools Free
- Hack Tools For Mac
- Hack Tool Apk No Root
- Hacker Tools
- Hacker Tools Hardware
- Hacking Tools For Windows
- Pentest Tools Apk
- Hacker Tools Github
- Hacker Tools For Ios
- Hacker Tool Kit
- Hack Tools For Ubuntu
- Hack Tool Apk No Root
- Hacker Tools 2019
- Pentest Box Tools Download
- Hacker Tools
- Pentest Tools Kali Linux
- Hacker Hardware Tools
- Hacking Tools Windows
- Easy Hack Tools
- Pentest Tools For Mac
- Hacker Tools For Ios
- Bluetooth Hacking Tools Kali
- Kik Hack Tools
- Hacking Tools Free Download
- Hacking Apps
- Best Hacking Tools 2020
- Hacking Tools For Kali Linux
- Hack Tools
- Pentest Tools Alternative
- Top Pentest Tools
- Hack Tools For Pc
- Tools 4 Hack
- Hacking Apps
- Top Pentest Tools
- Install Pentest Tools Ubuntu
- Hacker Tools
- Hacking Tools For Pc
- Hacking Tools For Windows
- Hack Tool Apk
- What Are Hacking Tools
- Pentest Tools Open Source
- Pentest Tools Apk
- Hack Tools
0 comentarios:
Publicar un comentario