module
CCTV DVR Login Scanning Utility
Disclosed | Created |
---|---|
N/A | 2018-05-30 |
Disclosed
N/A
Created
2018-05-30
Description
This module tests for standalone CCTV DVR video surveillance
deployments specifically by MicroDigital, HIVISION, CTRing, and
numerous other rebranded devices that are utilizing default vendor
passwords. Additionally, this module has the ability to brute
force user accounts.
Such CCTV DVR video surveillance deployments support remote
viewing through Central Management Software (CMS) via the
CMS Web Client, an IE ActiveX control hosted over HTTP, or
through Win32 or mobile CMS client software. By default,
remote authentication is handled over port 5920/TCP with video
streaming over 5921/TCP.
After successful authentication over 5920/TCP this module
will then attempt to determine if the IE ActiveX control
is listening on the default HTTP port (80/TCP).
deployments specifically by MicroDigital, HIVISION, CTRing, and
numerous other rebranded devices that are utilizing default vendor
passwords. Additionally, this module has the ability to brute
force user accounts.
Such CCTV DVR video surveillance deployments support remote
viewing through Central Management Software (CMS) via the
CMS Web Client, an IE ActiveX control hosted over HTTP, or
through Win32 or mobile CMS client software. By default,
remote authentication is handled over port 5920/TCP with video
streaming over 5921/TCP.
After successful authentication over 5920/TCP this module
will then attempt to determine if the IE ActiveX control
is listening on the default HTTP port (80/TCP).
Author
Justin Cacak
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.