The basic functionality of the application is as follows:
- Application sends out a UDP broadcast on port 5978
- Camera sees the broadcast on port 5978 and inspects the payload – if it sees that the initial part of the payload contains "FF FF FF FF FF FF" it responds (UDP broadcast port 5978) with an encoded payload with its own MAC address
- Application retrieves the camera's response and creates another UDP broadcast but this time it sets the payload to contain the target camera's MAC address, this encoded value contains the command to send over the password
- Camera sees the broadcast on port 5978 and checks that it is meant for it by inspecting the MAC address that has been specified in the payload, it responds with an encoded payload that contains its password (base64 encoded)
After spending some time with the application in a debugger I found what looked like it was responsible for the decoding of the encoded values that are passed:
super exciting screen shot. |
Translated into english: the application first uses a lookup table to translate every byte in the input string, to do this it uses the value of the current byte as an offset into the table. After it is done with "stage1" it traverses the translated input buffer a dword at a time and does some bit shifting and addition to fully decode the value. The following roughly shows the "stage2" routine:
(Dword[0] << 2) + (Dword[1] >> 4) = unencoded byte 1
(Dword[1] << 4) + (Dword[2] >> 2) = unencoded byte 2
(Dword[2] << 6) + Dword[3] = unencoded byte 3
I then confirmed that this routine worked on an "encoded" value that went over the wire from the application to the camera. After confirming the encoding scheme worked, I recreated the network transaction the application does with the camera to create a stand alone script that will retrieve the password from a camera that is on the same lan as the "attacker". The script can be found here, thanks to Jason Doyle for the original finding (@jasond0yle ).
- Wifi Hacker Tools For Windows
- Hackrf Tools
- Game Hacking
- Hacking Tools Kit
- Pentest Tools Subdomain
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Free Download
- Pentest Tools Website
- Blackhat Hacker Tools
- Free Pentest Tools For Windows
- Pentest Tools
- Pentest Tools Linux
- Nsa Hacker Tools
- Pentest Tools Tcp Port Scanner
- Hacker Tools Apk Download
- Nsa Hack Tools
- Hacker Search Tools
- Hack Tools
- Pentest Tools Website
- Hacker Tools Free Download
- Hack Tools Pc
- Hacker Tools Github
- Hacker Tools Free Download
- Hacking Tools For Windows Free Download
- Pentest Automation Tools
- Hacker Security Tools
- Android Hack Tools Github
- Hacker Tools Linux
- Wifi Hacker Tools For Windows
- Usb Pentest Tools
- Pentest Tools Bluekeep
- Hack Rom Tools
- Hacker Search Tools
- Pentest Tools Framework
- Hacker Tools Linux
- Hacker Tools For Ios
- Pentest Tools Subdomain
- Hackers Toolbox
- Tools Used For Hacking
- Hack Apps
- Hacking Tools Mac
- Pentest Tools Github
- Beginner Hacker Tools
- Nsa Hack Tools
- Hackrf Tools
- Hacking Tools Software
- Pentest Tools Open Source
- Hacking Tools 2019
- Hacking Tools For Games
- Hacking Tools For Windows Free Download
- Pentest Tools Alternative
- What Are Hacking Tools
- New Hacker Tools
- Game Hacking
- Pentest Tools Windows
- Hacker Tools Windows
- Pentest Tools For Android
- Nsa Hacker Tools
- Easy Hack Tools
- Pentest Tools Find Subdomains
- Hacking Tools 2020
- Tools Used For Hacking
- Hack Tools Pc
- Tools 4 Hack
- Hack Apps
- Hacker Tools Github
- Ethical Hacker Tools
- Hacker Tools For Windows
- Tools For Hacker
- Hacker Tools Linux
- Pentest Tools Android
- Hacking Tools Online
- Pentest Tools Windows
- Hack And Tools
- Pentest Tools Online
- Pentest Tools Online
- Hacking Tools For Windows
- Pentest Tools Subdomain
- Hacker Tools Github
- Pentest Tools Online
- Hacker Tools Free Download
- Hacking Tools Windows
- Hack Website Online Tool
0 件のコメント:
コメントを投稿