The basic functionality of the application is as follows:
- Application sends out a UDP broadcast on port 5978
- Camera sees the broadcast on port 5978 and inspects the payload – if it sees that the initial part of the payload contains "FF FF FF FF FF FF" it responds (UDP broadcast port 5978) with an encoded payload with its own MAC address
- Application retrieves the camera's response and creates another UDP broadcast but this time it sets the payload to contain the target camera's MAC address, this encoded value contains the command to send over the password
- Camera sees the broadcast on port 5978 and checks that it is meant for it by inspecting the MAC address that has been specified in the payload, it responds with an encoded payload that contains its password (base64 encoded)
After spending some time with the application in a debugger I found what looked like it was responsible for the decoding of the encoded values that are passed:
![]() |
super exciting screen shot. |
Translated into english: the application first uses a lookup table to translate every byte in the input string, to do this it uses the value of the current byte as an offset into the table. After it is done with "stage1" it traverses the translated input buffer a dword at a time and does some bit shifting and addition to fully decode the value. The following roughly shows the "stage2" routine:
(Dword[0] << 2) + (Dword[1] >> 4) = unencoded byte 1
(Dword[1] << 4) + (Dword[2] >> 2) = unencoded byte 2
(Dword[2] << 6) + Dword[3] = unencoded byte 3
I then confirmed that this routine worked on an "encoded" value that went over the wire from the application to the camera. After confirming the encoding scheme worked, I recreated the network transaction the application does with the camera to create a stand alone script that will retrieve the password from a camera that is on the same lan as the "attacker". The script can be found here, thanks to Jason Doyle for the original finding (@jasond0yle ).
Continue reading
- Android Hack Tools Github
- Beginner Hacker Tools
- Pentest Tools Apk
- Pentest Tools Free
- Tools 4 Hack
- Hack Tools Pc
- Hacking Apps
- Hacker
- Android Hack Tools Github
- Pentest Tools For Mac
- Nsa Hacker Tools
- Hackers Toolbox
- Hack Tools 2019
- Pentest Tools Bluekeep
- Hacker Tools Online
- Pentest Box Tools Download
- Pentest Tools Find Subdomains
- Hack Tools For Mac
- Hacker Security Tools
- Hacking Tools For Windows Free Download
- Pentest Tools For Mac
- Hacking Tools 2019
- Pentest Tools Github
- Tools For Hacker
- Hacker Tools Github
- Pentest Tools Port Scanner
- Pentest Tools Bluekeep
- Hack Tools
- Hack Tools Online
- Best Pentesting Tools 2018
- Hacking Tools For Kali Linux
- Hacking Tools Usb
- Hack Website Online Tool
- Github Hacking Tools
- Hak5 Tools
- Best Hacking Tools 2019
- Hackrf Tools
- Pentest Box Tools Download
- Hacking Apps
- Hacker Tools Hardware
- Hak5 Tools
- Hack Rom Tools
- How To Install Pentest Tools In Ubuntu
- Tools Used For Hacking
- Hacker Tools
- Hacking Tools For Windows 7
- Pentest Tools Download
- Hacking Tools For Beginners
- Ethical Hacker Tools
- Hack Website Online Tool
- Free Pentest Tools For Windows
- Hack Tools Mac
- Best Hacking Tools 2020
- Pentest Tools For Ubuntu
- Hacking Tools Name
- Hack Tools 2019
- Hacker Tools For Mac
- Hack Tools Download
- Pentest Automation Tools
- Hacking Tools Download
- Hacking Tools Mac
- Pentest Tools Review
- Hak5 Tools
- Hack Tools For Windows
- Hack Tools For Games
- Hacking Tools 2020
- Hacking Tools Kit
- Hacking Tools For Kali Linux
- Hack Tools For Ubuntu
No hay comentarios.:
Publicar un comentario