Hikvision Camera Backdoor

Tomas Savenas
1 min readNov 2, 2019

--

A cybersecurity incident to occur probability is slim to none in public catering facilities. Although it is relatively easy to exploit unpatched cameras or other devices on the same network. Business owners focused on their KPIs. They invest in those things which are matters today. Most likely they have a limited budget for IT security.

I had a couple of requests to test local network security and I have seen vulnerable “Hikvision” cameras. An exploit is a publicly available and simple HTTP request. Full disclosure of this backdoor ”Access control bypass in Hikvision IP Cameras” [1].

I don’t want to spend more time on checking every I wrote the Nmap script to check the whole subnet faster [2]

git clone https://github.com/savenas/nmap-scripts
cd nmap-scripts
nmap --script=http-hikvision-backdoor.nse -p 80,443 192.168.0.1/24 -Pn --open

There is a working python exploit script is on exploit-db [3]

Reference:

#1 https://seclists.org/fulldisclosure/2017/Sep/23
#2 https://github.com/savenas/nmap-scripts
#3 https://www.exploit-db.com/exploits/44328

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Tomas Savenas
Tomas Savenas

Written by Tomas Savenas

Kibernetinio saugumo entuziastas; Aktyviausias Lietuvis TryHackMe platformoje; Inovacijų valdymo ir Antreprenerystės Magistrantas @ KTU

No responses yet

Write a response