Site icon CCTV Wiki

Ingram – CCTV vulnerability scanning tool

Introduction

Mainly for the vulnerability scanning framework of network cameras, it has integrated common equipment such as Hikvision, Dahua, and Uniview. More camera devices and router devices will be added later.

Install

Windows still has some bugs, Linux and Mac can be used normally. Please make sure to install Python 3.7 and above, 3.8 is recommended

git clone https://github.com/jorhelp/Ingram.git

cd Ingram
pip3 install git+https://github.com/arthaud/python3-pwntools.git
pip3 install -r requirements.txt

So far the installation is complete!

Run

# You can use the pound sign (#) to comment
# single IP address 192.168.0.1
# IP address and port to scan 192.168.0.2:80
# IP segment with ‘/’ 192.168.0.0/16
# IP segment with ‘-‘ 192.168.0.0-192.168.255.255

python run_ingram.py -i “the file you want to scan” -o “output folder”

python run_ingram.py -i “the file you want to scan” -o “output folder” -p 80 81 8000

python run_ingram.py -i “the file you want to scan” -o “output folder” -t 800

optional arguments:
-h, –help print parameter information
-i IN_FILE, –in_file IN_FILE file to scan
-o OUT_DIR, –out_dir OUT_DIR Scan result output path
-p PORT [PORT …], –port PORT [PORT …] The port to scan, you can specify multiple ports, such as -p 80 81 82
-t TH_NUM, –th_num TH_NUM The number of concurrent, adjusted according to the network conditions
-T TIME_OUT, –time_out TIME_OUT time out
–debug debug mode

#wechat
config.set_val(‘WXUID’, ‘这里写uid’)
config.set_val(‘WXTOKEN’, ‘这里写token’)

Result

.
├── not_vulnerable.csv
├── results.csv
├── snapshots
└── log.txt

Disclaimer

This tool is for security testing only, and is strictly prohibited for illegal use, and the consequences have nothing to do with the team

Acknowledgments & Citations

Thanks to Aiminsun for CVE-2021-36260
Thanks to chrisjd20 for hikvision config file decryptor
Thanks to mcw0 for DahuaConsole

Thanks to jorhelp for Ingram

Exit mobile version