The basic functionality of the application is as follows:
- Application sends out a UDP broadcast on port 5978
- Camera sees the broadcast on port 5978 and inspects the payload – if it sees that the initial part of the payload contains "FF FF FF FF FF FF" it responds (UDP broadcast port 5978) with an encoded payload with its own MAC address
- Application retrieves the camera's response and creates another UDP broadcast but this time it sets the payload to contain the target camera's MAC address, this encoded value contains the command to send over the password
- Camera sees the broadcast on port 5978 and checks that it is meant for it by inspecting the MAC address that has been specified in the payload, it responds with an encoded payload that contains its password (base64 encoded)
After spending some time with the application in a debugger I found what looked like it was responsible for the decoding of the encoded values that are passed:
super exciting screen shot. |
Translated into english: the application first uses a lookup table to translate every byte in the input string, to do this it uses the value of the current byte as an offset into the table. After it is done with "stage1" it traverses the translated input buffer a dword at a time and does some bit shifting and addition to fully decode the value. The following roughly shows the "stage2" routine:
(Dword[0] << 2) + (Dword[1] >> 4) = unencoded byte 1
(Dword[1] << 4) + (Dword[2] >> 2) = unencoded byte 2
(Dword[2] << 6) + Dword[3] = unencoded byte 3
I then confirmed that this routine worked on an "encoded" value that went over the wire from the application to the camera. After confirming the encoding scheme worked, I recreated the network transaction the application does with the camera to create a stand alone script that will retrieve the password from a camera that is on the same lan as the "attacker". The script can be found here, thanks to Jason Doyle for the original finding (@jasond0yle ).
Continue reading
- Free Pentest Tools For Windows
- Black Hat Hacker Tools
- Hacking Tools Hardware
- Best Hacking Tools 2019
- Best Hacking Tools 2019
- Github Hacking Tools
- Hacker Tools Free Download
- Nsa Hack Tools Download
- Pentest Tools Windows
- Pentest Tools Nmap
- Hacker Tools Software
- Pentest Tools Download
- Hacker Tools Software
- Pentest Tools Port Scanner
- Bluetooth Hacking Tools Kali
- Pentest Box Tools Download
- Hack Tools For Games
- Hacking Tools For Windows Free Download
- How To Hack
- Hacker Tools Github
- Hacking Apps
- Hacking Tools Name
- Free Pentest Tools For Windows
- New Hacker Tools
- Hacker Tools
- Hack Tools For Pc
- Physical Pentest Tools
- Bluetooth Hacking Tools Kali
- Hacking Tools Windows
- How To Make Hacking Tools
- Hacking Tools Free Download
- Pentest Tools Bluekeep
- Pentest Tools Tcp Port Scanner
- Hacker Tools For Pc
- Hacking Tools For Windows 7
- Pentest Tools Free
- Hack Tools Pc
- Hack Website Online Tool
- Hacking Tools Online
- Kik Hack Tools
- Hacker Tools Apk
- Hack Tools Download
- Hacking Tools For Games
- Pentest Tools Framework
- Hacker Tool Kit
- Pentest Tools Open Source
- Hacking Tools For Mac
- Hack Rom Tools
- Pentest Tools Bluekeep
- Hacker
- Hacking Tools For Windows 7
- Black Hat Hacker Tools
- Hacker Tools 2019
- Hacker Tools Windows
- Hacking Tools Free Download
- Hacking Tools 2019
- Pentest Tools Tcp Port Scanner
- Install Pentest Tools Ubuntu
- Growth Hacker Tools
- Hacking Tools For Windows
- Hak5 Tools
- Hacker Tools For Mac
- Hack App
- Hacking Tools Windows
- Top Pentest Tools
- Install Pentest Tools Ubuntu
- Underground Hacker Sites
- Hacker Tools 2019
- Pentest Box Tools Download
- Hack Tools Download
- Hacker Search Tools
- Hacker Tools Software
- Hack And Tools
- Hacking Tools Kit
- Nsa Hack Tools Download
- Hack App
- How To Make Hacking Tools
- Usb Pentest Tools
- How To Hack
- Hacker Security Tools
- Hack Tools Mac
- Pentest Tools Download
- Hacking Tools Windows 10
- Growth Hacker Tools
- Hacker Tools For Ios
- Hack Tools Pc
- Pentest Tools For Windows
- Hack Tools For Windows
- Hacking Tools Mac
- Pentest Tools Website Vulnerability
- Pentest Tools List
- Hacker Tools Apk Download
- Hacker Tools Software
- Bluetooth Hacking Tools Kali
No comments:
Post a Comment