The basic functionality of the application is as follows:
- Application sends out a UDP broadcast on port 5978
- Camera sees the broadcast on port 5978 and inspects the payload – if it sees that the initial part of the payload contains "FF FF FF FF FF FF" it responds (UDP broadcast port 5978) with an encoded payload with its own MAC address
- Application retrieves the camera's response and creates another UDP broadcast but this time it sets the payload to contain the target camera's MAC address, this encoded value contains the command to send over the password
- Camera sees the broadcast on port 5978 and checks that it is meant for it by inspecting the MAC address that has been specified in the payload, it responds with an encoded payload that contains its password (base64 encoded)
After spending some time with the application in a debugger I found what looked like it was responsible for the decoding of the encoded values that are passed:
super exciting screen shot. |
Translated into english: the application first uses a lookup table to translate every byte in the input string, to do this it uses the value of the current byte as an offset into the table. After it is done with "stage1" it traverses the translated input buffer a dword at a time and does some bit shifting and addition to fully decode the value. The following roughly shows the "stage2" routine:
(Dword[0] << 2) + (Dword[1] >> 4) = unencoded byte 1
(Dword[1] << 4) + (Dword[2] >> 2) = unencoded byte 2
(Dword[2] << 6) + Dword[3] = unencoded byte 3
I then confirmed that this routine worked on an "encoded" value that went over the wire from the application to the camera. After confirming the encoding scheme worked, I recreated the network transaction the application does with the camera to create a stand alone script that will retrieve the password from a camera that is on the same lan as the "attacker". The script can be found here, thanks to Jason Doyle for the original finding (@jasond0yle ).
- Termux Hacking Tools 2019
- Hacker Tools List
- Hacker Tools Windows
- Pentest Tools Framework
- Hacking Tools For Windows 7
- Pentest Tools For Ubuntu
- Hacker Tools Free
- Hacker Security Tools
- Pentest Tools Website
- Pentest Automation Tools
- Hack Tool Apk No Root
- Hack Tools Online
- Hacking Tools For Beginners
- Pentest Recon Tools
- Hacker Tool Kit
- Android Hack Tools Github
- Pentest Tools Nmap
- Hacker
- Hacking Apps
- Tools Used For Hacking
- Pentest Tools Alternative
- Hackers Toolbox
- Best Hacking Tools 2020
- Tools Used For Hacking
- Hack App
- Hackers Toolbox
- Hacking Tools Online
- Hacker Tools Mac
- Hacker Tools For Ios
- Pentest Tools Android
- Hack Tools Online
- Hacker Tool Kit
- What Is Hacking Tools
- Hacking Tools Github
- Pentest Tools Website Vulnerability
- Github Hacking Tools
- Hacking Tools For Windows Free Download
- Hacking Tools And Software
- Game Hacking
- Pentest Tools For Ubuntu
- What Are Hacking Tools
- Hack Tools For Ubuntu
- New Hack Tools
- Hacker Tools Software
- Hak5 Tools
- Hacking Tools For Pc
- Hacker Tools 2020
- Tools Used For Hacking
- Hacker Tools Linux
- Pentest Tools For Mac
- Pentest Tools Download
- Hak5 Tools
- Pentest Tools Website Vulnerability
- Wifi Hacker Tools For Windows
- Hack Website Online Tool
- Bluetooth Hacking Tools Kali
- Black Hat Hacker Tools
- Hacker Tools Linux
- Hack Website Online Tool
- Hacker Tools 2020
- Hacking App
- Hacker Tool Kit
- Hacker Tools For Mac
- Hacking Tools Windows 10
- Blackhat Hacker Tools
- Hacking Tools 2020
- Hacker Tools 2019
- Best Pentesting Tools 2018
- Hacking Tools Kit
- Hackers Toolbox
- Kik Hack Tools
- Pentest Tools Nmap
- Pentest Tools Github
- Ethical Hacker Tools
- Top Pentest Tools
- Pentest Tools Port Scanner
- Hack Tools Mac
- Hack Tool Apk No Root
- Pentest Tools Framework
- Nsa Hack Tools Download
- Hacking Apps
- Pentest Tools Online
- Hacker Tools 2019
- Hack And Tools
- Hack Tools
- Pentest Tools Website Vulnerability
- Hacking Tools For Windows 7
- Top Pentest Tools
- Best Pentesting Tools 2018
- Hacks And Tools
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Windows
- Pentest Tools Online
- Android Hack Tools Github
- Nsa Hacker Tools
- Hack Tools 2019
- Hacking Tools For Games
- Hacking Apps
- Nsa Hacker Tools
- Underground Hacker Sites
- Pentest Tools Port Scanner
- Pentest Tools Website Vulnerability
- Tools 4 Hack
- Pentest Tools Open Source
- Hacking Tools And Software
- Pentest Reporting Tools
- Usb Pentest Tools
- Tools 4 Hack
- Pentest Box Tools Download
- Pentest Tools Framework
- Best Hacking Tools 2019
- Hack Apps
- Pentest Tools List
- How To Make Hacking Tools
- Hacker Tools For Pc
- Hak5 Tools
- Hacker Search Tools
- Pentest Tools Tcp Port Scanner
- Pentest Tools Nmap
- Hacking Tools And Software
- Pentest Tools Subdomain
- Hacker Tools
- Hacker Tools Free Download
- Pentest Tools Apk
- How To Make Hacking Tools
- Hacker Tools 2019
- Hacker Tools Online
- What Are Hacking Tools
- Pentest Recon Tools
- Best Hacking Tools 2019
- Hacker Tools For Ios
- Wifi Hacker Tools For Windows
- Pentest Tools For Windows
- Pentest Tools Find Subdomains
- Install Pentest Tools Ubuntu
- Pentest Tools List
- Hack Tools For Games
- Pentest Tools Open Source
- Hack Tools For Mac
- Hacking Tools For Windows 7
- Pentest Tools Linux
- Hacking Tools Online
- Hack App
- Ethical Hacker Tools
- Hack Website Online Tool
- Hackrf Tools
- Hacking App
- Pentest Tools Tcp Port Scanner
- Hacker Tools For Windows
- Beginner Hacker Tools
- Pentest Tools List
- Install Pentest Tools Ubuntu
- Hacker Tools For Pc
- Hacker Tools List
- Hacking Tools For Pc
- Termux Hacking Tools 2019
- Hacker Tools 2019
- How To Hack
- Hacking Tools Windows 10
- Pentest Tools For Mac
No comments:
Post a Comment