Skip to content

Hikvision IP Camera versions 5.2.0 - 5.3.9 (Builds 140721 < 170109) - Access Control Bypass

Notifications You must be signed in to change notification settings

dedsxc/hikxploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

hikxsploit

Official exploit release : https://www.exploit-db.com/exploits/44328

Description

Hikvision IP Camera versions 5.2.0 - 5.3.9 (Builds 140721 < 170109) - Access Control Bypass

hixploit is a python tool that will give you the opportunity to gather all hikvision cctv that are vulnerable.

It exploits a backdoor in Hikvision camera firmware versions 5.2.0 - 5.3.9 (Builds: 140721 - 170109), deployed between 2014 and 2016, to assist the owner recover their password.

  1. Use shodan API to scan hikvision camera worldwide
  2. Exploit all cameras discovered by shodan API
  3. Gather informations about country / city of the exploited camera
  4. Write into csv file all cameras which have been exploited successfully

Install

git clone https://github.com/dedsxc/hikxploit

python3 -m pip install -r requirements.txt

Usage

  1. Get your API key in shodan.io
  2. Modify hikxploit.py file for : shodan_api_key="YOUR_API_KEY"
  3. Launch the script

Disclaimer

legal disclaimer: Usage of hikxploit for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

About

Hikvision IP Camera versions 5.2.0 - 5.3.9 (Builds 140721 < 170109) - Access Control Bypass

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages