HikPwn, a simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8. This project was born out of curiosity while I was capturing and watching network traffic generated by some of Hikvision’s software and devices.
git clone https://github.com/4n4nk3/HikPwn.git
pip install -r requirements.txt
- Python 3.8 on Linux 4.19 x86_64
Functions and characteristics:
- Passive discovery of Hikvision devices.
- Active discovery and enumeration of Hikvision devices via UDP probing.
Work in progress… stay tuned!
- Add detection and exploitation capabilities for ICSA-17-124-01.
usage: hikpwn.py [-h] --interface INTERFACE --address ADDRESS [--active]
HikPwn, a simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8. by Ananke: https://github.com/4n4nk3.
-h, --help show this help message and exit
--interface INTERFACE the network interface to use
--address ADDRESS the ip address of the selected network interface
--active enable "active" discovery
You may be interested in...
Using eth0 as network interface and XXX.XXX.XXX.XXX as its IP address...
[*] Started 30 seconds of both passive and active discovery...
[*] Active discovery's results:
Serial Number xxxxxxxxxxxxxxxxxxxxx
DHCP in use false
Software Version V5.4.3build 160810
DSP Version V7.3 build 160801
Boot Time 2019-03-01 00:05:33
Activation Status true
Password Reset Ability true
[*] Passive discovery didn't find any device.
This project is for educational purposes only. Don’t use it for illegal activities. I don’t support nor condone illegal or unethical actions and I can’t be held responsible for possible misuse of this software.