-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathdahua-template.html
More file actions
170 lines (166 loc) · 8.94 KB
/
dahua-template.html
File metadata and controls
170 lines (166 loc) · 8.94 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0, minimum-scale=1.0, user-scalable=0">
<meta name="format-detection" content="telephone=no">
<title>IotSploit DEV</title>
<link rel="stylesheet" href="./static/dist/style-libs-min.css">
<link rel="stylesheet" href="./static/dist/styles.css">
</head>
<body>
<header>
<section class="menu-section">
<a class="logo" href="/">
<svg xmlns="http://www.w3.org/2000/svg" width="410" height="43" viewBox="0 0 410 42.94"><defs><style>.cls-1{fill:#1a1a1a;}.cls-2{fill:red;}</style></defs><title>logo</title>
<path class="cls-1" d="M280.31,13.39h4.19v23h-4.19Z"/><path class="cls-1" d="M298,19.5c5.07,0,9.12,3.61,9.12,8.66s-4.06,8.66-9.08,8.66S289,33.26,289,28.16,293,19.5,298,19.5Zm0,13.83A4.93,4.93,0,0,0,303,28.42q0-.12,0-.25a4.93,4.93,0,1,0-9.84,0,4.9,4.9,0,0,0,4.64,5.14H298Z"/><path class="cls-1" d="M313.83,17h-7.56V13.41h19.28V17H318V36.44h-4.15Z"/><path class="cls-1" d="M326.37,31.67a7.23,7.23,0,0,0,4.71,1.82c1.46,0,2.3-.62,2.3-1.65,0-2.59-8.21-1.94-8.21-7.37,0-3.25,2.85-5,6.33-5a8.49,8.49,0,0,1,5.58,1.88l-1.52,2.88a7,7,0,0,0-4.19-1.43c-1.43,0-2.3.55-2.3,1.59,0,2.62,8.21,1.88,8.21,7.3,0,2.92-2.46,5.1-6.26,5.1a9.46,9.46,0,0,1-6.49-2.43Z"/>
<path class="cls-1" d="M341.25,19.88H345v1.24A11.29,11.29,0,0,1,345,22.3H345a6.07,6.07,0,0,1,5.25-2.79c4.48,0,7.33,3.54,7.33,8.66s-3.22,8.66-7.56,8.66a6,6,0,0,1-4.78-2.33h0a9.6,9.6,0,0,1,.1,1.43v7h-4.11Zm8.11,13.47c2.27,0,4.16-1.85,4.16-5.13s-1.73-5.2-4.13-5.2c-2.17,0-4.19,1.56-4.19,5.23,0,2.57,1.42,5.1,4.12,5.1Z"/><path class="cls-1" d="M361.59,13.39h4.09V30.66c0,1.81.62,2.27,1.69,2.27a4.4,4.4,0,0,0,.62,0v3.61a10.64,10.64,0,0,1-1.3.1c-2.27,0-5.1-.58-5.1-5.32Z"/><path class="cls-1" d="M379.17,19.5c5.07,0,9.12,3.61,9.12,8.66s-4.06,8.66-9.08,8.66-9.08-3.57-9.08-8.66S374.17,19.5,379.17,19.5Zm0,13.83a4.93,4.93,0,0,0,4.94-4.91q0-.12,0-.25a4.93,4.93,0,1,0-9.84,0,4.9,4.9,0,0,0,4.64,5.14h.26Z"/><path class="cls-1" d="M392.18,19.88h4.16V36.44h-4.13Z"/><path class="cls-1" d="M401.87,23.39h-2.14V20.11H402V15.37h4v4.74h3.77v3.28H406v6.46A2.94,2.94,0,0,0,409.25,33a3.31,3.31,0,0,0,.75-.06v3.61a10.58,10.58,0,0,1-1.26.1c-2.3,0-6.88-.68-6.88-6.23Z"/><circle class="cls-2" cx="394.23" cy="15.09" r="1.93"/><path class="cls-2" d="M282.4,6.74a1.93,1.93,0,0,0-1.87,1.45H276.3l-2.41-2.42H0v1H273.47l2.42,2.42h4.63a1.93,1.93,0,1,0,1.87-2.42Z"/><path class="cls-2" d="M274,11.56a1.92,1.92,0,0,0-1.16.4L271,10.11H0v1H270.57l1.64,1.64A1.93,1.93,0,1,0,274,11.59Z"/><path class="cls-2" d="M278,3.87a1.93,1.93,0,1,0-1.83-2.42H0v1H276.15A1.93,1.93,0,0,0,278,3.87Z"/>
</svg>
</a>
<div class="menu">
<ul>
<li><a href="/#why">Why</a></li>
<li><a href="/#services">Services</a></li>
<li><a href="/#how">How to get started</a></li>
<li><a class="active" href="/dahua-template.html">Dahua vulnerability</a></li>
<li><a href="/#contacts">Contacts</a></li>
</ul>
</div>
<button class="mobile-menu" onclick="$('.menu').slideToggle('slow')">
<img src="./static/img/icons/icon-menu.svg" alt="">
</button>
</section>
</header>
<main class="template">
<section class="main--bg">
<div class="title">
Dahua backdoor check
</div>
</section>
<section class="check">
<div class="check-form--wrap">
<div class="check-form--title">IOTSploit shares details of malicious remote hacks into Dahua video cameras
</div>
<div class="check-form--description">
<div class="description--default">
<p>On 7 March 2017 an anonymous researcher Bashis published on <a href="http://seclists.org"
target="_blank">seclists.org</a>
an account of security
vulnerabilities discovered in some video cameras (and similar CCTV equipment) manufactured by
Dahua.
</p>
<p>
According to Shodan, an IOT search engine, there is an estimated <b>400,000 IP</b> addresses
that
currently use Dahua equipment worldwide.
</p>
<p>
The discovered vulnerability allows an outside user to remotely hack into Dahua kit and gain
control of admin privileges
</p>
</div>
<div class="description--bord-text-wrap">
<div class="description--bord-text">
IOTsploit’s mission is to enable enterprises discover and eliminate vulnerabilities in their IOT
devices such as connected cameras and to equip them with effective
tools and methods to secure their software,
sensors and networks.
</div>
<a href="#" class="description--bord-text--link">
→ Affected Dahua devices
</a>
</div>
</div>
</div>
</section>
<section class="form dahua-wrap">
<div class="title">Dahua DVR RPC Vulnerability</div>
<form action="" id="from--animation">
<div class="line--progress"></div>
<input type="text" id="ip_address" placeholder="Enter Dahua camera IP">
<button type="button" class="ip-check--btn">Check</button>
<div class="status">
<div id="status--load">
<div class="status--wrap">
<img src="./static/img/icons/reload.svg" alt="">
<span>Checking . . .</span>
</div>
</div>
<div id="status--current">
<div class="status--wrap">
<img src="./static/img/icons/ok.svg" alt="">
<span>Not Vulnerable</span>
</div>
</div>
<div id="status--failed">
<div class="status--wrap">
<img src="./static/img/icons/error.svg" alt="">
<span>Vulnerable</span>
</div>
</div>
<div id="status--error">
<div class="status--wrap">
<img src="./static/img/icons/icon-warning.svg" alt="">
<span>Error</span>
</div>
</div>
</div>
</form>
</section>
<section class="chart">
<div class="title">Daily log of Dahua devices affected by the
discovered vulnerability:
</div>
<canvas id="myChart" width="400" height="400" style="display: none"></canvas>
</section>
</main>
<footer>
<div class="footer-content">
<div class="footer-menu">
<ul>
<li><a href="/#why">Why</a></li>
<li><a href="/#services">Services</a></li>
<li><a href="/#how">How to get started</a></li>
<li><a class="active" href="/dahua-template.html">Dahua vulnerability</a></li>
<li><a href="/#contacts">Contacts</a></li>
</ul>
</div>
<div class="contacts">
<a class="mail" href="#">hello@iotsploit.ai</a>
<div class="address">
350 Fifth Avenue, 34th floor
New York, NY 10118-3299 USA
</div>
<a class="phone" href="#">+996(550)500-000</a>
</div>
<div class="footer-social">
<a class="social--icon fb" href="#">
<img src="./static/img/icons/icon-facebook.svg" alt="">
</a>
<a class="social--icon tw" href="#">
<img src="./static/img/icons/icon-twitter.svg" alt="">
</a>
<a class="social--icon git" href="#">
<img src="./static/img/icons/icon-github.svg" alt="">
</a>
<a class="social--icon medium" href="#">
<img src="./static/img/icons/icon-medium.svg" alt="">
</a>
</div>
</div>
<div class="footer-copyright">
© 2017 Iotsploit
</div>
</footer>
<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','https://www.google-analytics.com/analytics.js','ga');
ga('create', 'UA-83208754-4', 'auto');
ga('send', 'pageview');
</script>
<script src="./static/dist/libraries-min.js"></script>
<script src="./static/dist/scripts-min.js"></script>
</body>
</html>