The basic functionality of the application is as follows:
- Application sends out a UDP broadcast on port 5978
- Camera sees the broadcast on port 5978 and inspects the payload – if it sees that the initial part of the payload contains "FF FF FF FF FF FF" it responds (UDP broadcast port 5978) with an encoded payload with its own MAC address
- Application retrieves the camera's response and creates another UDP broadcast but this time it sets the payload to contain the target camera's MAC address, this encoded value contains the command to send over the password
- Camera sees the broadcast on port 5978 and checks that it is meant for it by inspecting the MAC address that has been specified in the payload, it responds with an encoded payload that contains its password (base64 encoded)
After spending some time with the application in a debugger I found what looked like it was responsible for the decoding of the encoded values that are passed:
![]() |
| super exciting screen shot. |
Translated into english: the application first uses a lookup table to translate every byte in the input string, to do this it uses the value of the current byte as an offset into the table. After it is done with "stage1" it traverses the translated input buffer a dword at a time and does some bit shifting and addition to fully decode the value. The following roughly shows the "stage2" routine:
(Dword[0] << 2) + (Dword[1] >> 4) = unencoded byte 1
(Dword[1] << 4) + (Dword[2] >> 2) = unencoded byte 2
(Dword[2] << 6) + Dword[3] = unencoded byte 3
I then confirmed that this routine worked on an "encoded" value that went over the wire from the application to the camera. After confirming the encoding scheme worked, I recreated the network transaction the application does with the camera to create a stand alone script that will retrieve the password from a camera that is on the same lan as the "attacker". The script can be found here, thanks to Jason Doyle for the original finding (@jasond0yle ).
Related articles
- Hacker
- Termux Hacking Tools 2019
- Hacking Tools Kit
- Hack Tools Pc
- Free Pentest Tools For Windows
- Hack And Tools
- Computer Hacker
- Hacking Tools Name
- Pentest Tools Download
- Ethical Hacker Tools
- Tools For Hacker
- Hacking Tools Hardware
- Hacker Tools Free Download
- Hack Tools For Pc
- Hak5 Tools
- Hacking Tools For Kali Linux
- Hacking Tools For Kali Linux
- New Hack Tools
- Pentest Tools Alternative
- Hacking Tools Usb
- Tools Used For Hacking
- Hacker Tools Apk Download
- Android Hack Tools Github
- Hacking Tools 2020
- Pentest Automation Tools
- Hacker Search Tools
- World No 1 Hacker Software
- Wifi Hacker Tools For Windows
- Pentest Tools Subdomain
- Hacking Tools For Games
- What Are Hacking Tools
- Hacker Tools List
- Hacking Tools Free Download
- Hacking Tools For Windows Free Download
- Pentest Tools Android
- Pentest Tools For Ubuntu
- Android Hack Tools Github
- Android Hack Tools Github
- Hacking Tools For Beginners
- Hack And Tools
- Hack Tools 2019
- How To Hack
- Pentest Tools
- Growth Hacker Tools
- Hacking Tools For Windows Free Download
- Hack Tools 2019
- Hacker Search Tools
- Pentest Tools Open Source
- Pentest Tools Online
- Best Hacking Tools 2020
- How To Make Hacking Tools
- Growth Hacker Tools
- Hacking Tools Free Download
- Hacker Hardware Tools
- Pentest Tools Online
- Hacking Tools Windows
- Underground Hacker Sites
- Hacker Tools Windows
- Blackhat Hacker Tools
- Hacking Tools For Windows Free Download
- Hacks And Tools
- Github Hacking Tools
- Wifi Hacker Tools For Windows
- Kik Hack Tools
- Hacker Tools Linux
- Hacking Tools Download
- Pentest Tools Kali Linux
- Hacker Tools Linux
- Hacker Tools For Ios
- Hacker Tools Mac
- Best Pentesting Tools 2018
- Hack App
- Hacking App
- Best Pentesting Tools 2018
- Hacking Tools 2019
- Hack Website Online Tool
- How To Hack
- Hacker Tools 2019
- Hacking Tools Download
- Pentest Tools List
- Hacker Tools
- Hack Tool Apk No Root

沒有留言:
張貼留言