A couple weeks ago a vulnerability was posted for the dlink DCS-9xx series of cameras. The author of the disclosure found that the setup application that comes with the camera is able to send a specifically crafted request to a camera on the same network and receive its password in plaintext. I figured this was a good chance to do some analysis and figure out exactly how the application carried out this functionality and possibly create a script to pull the password out of a camera.
The basic functionality of the application is as follows:
- Application sends out a UDP broadcast on port 5978
- Camera sees the broadcast on port 5978 and inspects the payload – if it sees that the initial part of the payload contains "FF FF FF FF FF FF" it responds (UDP broadcast port 5978) with an encoded payload with its own MAC address
- Application retrieves the camera's response and creates another UDP broadcast but this time it sets the payload to contain the target camera's MAC address, this encoded value contains the command to send over the password
- Camera sees the broadcast on port 5978 and checks that it is meant for it by inspecting the MAC address that has been specified in the payload, it responds with an encoded payload that contains its password (base64 encoded)
After spending some time with the application in a debugger I found what looked like it was responsible for the decoding of the encoded values that are passed:
super exciting screen shot. |
(Dword[0] << 2) + (Dword[1] >> 4) = unencoded byte 1
(Dword[1] << 4) + (Dword[2] >> 2) = unencoded byte 2
(Dword[2] << 6) + Dword[3] = unencoded byte 3
- Hack Website Online Tool
- New Hacker Tools
- Tools 4 Hack
- Nsa Hack Tools Download
- Hack And Tools
- Pentest Tools Android
- Easy Hack Tools
- Hacker
- Hackers Toolbox
- How To Hack
- Hacking Tools Name
- Hacking Tools Windows
- World No 1 Hacker Software
- Hacking Tools For Windows Free Download
- Pentest Tools Apk
- Hacking Tools For Games
- Top Pentest Tools
- Hack App
- Hackrf Tools
- Pentest Tools List
- Hacker Search Tools
- Hacker Tools Linux
- Black Hat Hacker Tools
- Hack Apps
- Pentest Tools For Android
- Hacking App
- Nsa Hack Tools
- Hacks And Tools
- Easy Hack Tools
- Hack Tools Mac
- World No 1 Hacker Software
- Tools Used For Hacking
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Online
- Pentest Tools Linux
- Bluetooth Hacking Tools Kali
- Hack Tools For Mac
- Hack Website Online Tool
- Pentest Tools Port Scanner
- Hacker Tools List
- Underground Hacker Sites
- Hacking Tools Free Download
- Pentest Tools Online
- Game Hacking
- Pentest Reporting Tools
- Hacker Tools Apk
- How To Install Pentest Tools In Ubuntu
- Termux Hacking Tools 2019
- Hack Tools
- Hacking Tools Pc
- Pentest Tools Find Subdomains
- Pentest Tools For Windows
- Hacker Tools For Mac
- Top Pentest Tools
- Hacker Tools Apk
- Pentest Tools Subdomain
- Pentest Tools Online
- Hacker Tools For Windows
- Pentest Tools Port Scanner
- New Hack Tools
- Hacking Tools For Pc
- Pentest Tools Android
- Hacking Tools Usb
- Hacking Tools Download
- Hacker Tools 2020
- Hacker Hardware Tools
- Hacking Tools Pc
- Hack Tools For Mac
- Hacker Tools List
- Hacker Tools For Windows
- Hacker Tools Free Download
- Pentest Tools Bluekeep
- Hacking Tools For Windows 7
- Hacker Tools For Pc
- Hacking Tools For Games
- Hack Tools
- Hacking Tools 2019
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Free Download
- Hacking Tools Software
- Pentest Tools Bluekeep
- Black Hat Hacker Tools
- Tools Used For Hacking
- Install Pentest Tools Ubuntu
- Hacker Tools Github
- Pentest Tools Framework
- Wifi Hacker Tools For Windows
- Hacking Tools 2020
- Pentest Tools Review
- Hack Tools Mac
- Underground Hacker Sites
- Nsa Hack Tools
- Hacking Tools For Beginners
- Hacker Tools Free
- Android Hack Tools Github
- Hacking App