A penetration testing tool that discovers and accesses RTSP video surveillance cameras through network scanning and dictionary attacks.
Cameradar is a penetration testing tool that hacks its way into RTSP video surveillance cameras. It scans networks for RTSP endpoints, identifies camera models, and uses dictionary attacks to brute-force credentials and stream routes. The tool helps security professionals test the security of video surveillance systems by automating the discovery and access process.
Security professionals, penetration testers, and ethical hackers who need to assess the security of RTSP-based video surveillance cameras on networks they own or have permission to test.
Developers choose Cameradar because it provides a specialized, automated solution for RTSP camera security testing that combines network discovery with credential brute-forcing in a single tool. Its Docker-first approach and support for custom dictionaries make it flexible and easy to deploy for targeted security assessments.
Cameradar hacks its way into RTSP videosurveillance cameras
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Leverages nmap or masscan to efficiently scan for open RTSP hosts on common ports like 554 and 8554, as shown in the Docker run examples for network targeting.
Detects the specific camera model streaming the RTSP feed, aiding in targeted security assessments and vulnerability mapping.
Allows mounting custom route and credential files via Docker volumes, enabling tailored attacks for specific camera brands, as detailed in the configuration section.
Presents results in a terminal UI and can generate an M3U playlist of discovered streams, providing both human-readable and machine-usable outputs.
The README outlines a multi-step, dependency-heavy process for Android/Termux setup, indicating that native installation can be cumbersome without Docker.
Relies solely on dictionary-based brute-forcing for credentials and routes, lacking support for more advanced exploitation techniques like zero-day vulnerabilities.
Requires nmap or masscan for discovery, adding setup complexity and potential compatibility issues, especially in restricted environments.