HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network cameras exploiting the Web interface Version 3.1.3.150324. It downloads snapshots and compiles them into videos for efficient surveillance monitoring, Then retrieves the camera device info and downloads the "configurationFile" to all the registered Users Creds.
Demo.mp4
- Automated Directory Accessibility Checks for Hikvision Cameras
- Snapshot Downloading and Storage
- Device Information Retrieval and Logging
- User Information Retrieval and Logging
- Encrypted Configuration File Downloading and Decryption
- Comprehensive CVE Vulnerability Checks
- CVE-2021-36260 Detection
- CVE-2017-7921 Detection
- CVE-2022-28171 Detection
- Multi-Target Support with
targets.txt
- Detailed Logging for Each Target
- Real-Time Feedback with Colored Output
- Interrupt Handling with SIGQUIT
- Customizable Configuration Options
- Organized Output for Snapshots, Logs, and Decrypted Files
- Python 3.6 or higher
- FFmpeg
requests
library- PyCrypto library (for
decrypt_configurationFile.py
, install usingpip install pycrypto
)
git clone https://github.com/HexBuddy/HikvisionExploiter.git
cd HikvisionExploiter
pip3 install -r requirements.txt
Download and install FFmpeg from FFmpeg's official website.
Create a targets.txt
file in the root directory of the project with the following format:
IP:PORT
Each line should contain an IP address and port of a Hikvision camera.
python3 checker.py
The script will check the accessibility of the directories on the specified cameras, download snapshots, and compile them into videos.
directory_path
: The directory path to check for accessibility (default:/onvif-http/snapshot?auth=YWRtaW46MTEK
).targets.txt
: The file containing the IP addresses and ports of the target Hikvision cameras.
You can find potential targets using Shodan with the following Shodan dork:
3.1.3.150324
This dork searches for Hikvision cameras with the specific firmware version.
This project is licensed under the MIT License. See the LICENSE file for details.