Last active
March 28, 2024 06:29
-
-
Save lattice0/c23561ff62af5647c4ac0f3d8d26a739 to your computer and use it in GitHub Desktop.
Revisions
-
lattice0 revised this gist
Jul 5, 2018 . 1 changed file with 5 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -8,4 +8,8 @@ nmap -e eth0 192.168.1.0/24 nmap -e eth0 192.168.1.104 -p 0-65535 #SSH and foward the HTTP port of the discovered camera ssh -L 8080:192.168.1.189:port ... #FAST wireless port scan for a given IP nmap -p0-65535 192.168.1.198 -T5 -
lattice0 revised this gist
May 4, 2018 . 1 changed file with 0 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -3,10 +3,8 @@ sudo ip address add 192.168.1.133/24 dev eth0 #First, scan the eth0 interface to find all the IPs connected to it nmap -e eth0 192.168.1.0/24 #Now that you found the camera's IP, scan which ports are open to find the HTTP port (suupose the IP is ...189) nmap -e eth0 192.168.1.104 -p 0-65535 #SSH and foward the HTTP port of the discovered camera -
lattice0 revised this gist
Jan 25, 2018 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -7,6 +7,7 @@ sudo nmap -n -e eth0 192.168.1.0/24 -T5 -sT2 #Now that you found the camera's IP, scan which ports are open to find the HTTP port (suupose the IP is ...189) sudo nmap -n 192.168.1.104 -e eth0 -T5 -sT -p 0-65535 nmap -e eth0 192.168.1.104 -p 0-65535 #SSH and foward the HTTP port of the discovered camera ssh -L 8080:192.168.1.189:port ... -
lattice0 revised this gist
Jan 25, 2018 . 1 changed file with 2 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -3,9 +3,10 @@ sudo ip address add 192.168.1.133/24 dev eth0 #First, scan the eth0 interface to find all the IPs connected to it nmap -e eth0 192.168.1.0/24 sudo nmap -n -e eth0 192.168.1.0/24 -T5 -sT2 #Now that you found the camera's IP, scan which ports are open to find the HTTP port (suupose the IP is ...189) sudo nmap -n 192.168.1.104 -e eth0 -T5 -sT -p 0-65535 #SSH and foward the HTTP port of the discovered camera ssh -L 8080:192.168.1.189:port ... -
lattice0 created this gist
Jan 25, 2018 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,11 @@ #Give an IP address in the range of the camera to the eth0 interface sudo ip address add 192.168.1.133/24 dev eth0 #First, scan the eth0 interface to find all the IPs connected to it nmap -e eth0 192.168.1.0/24 #Now that you found the camera's IP, scan which ports are open to find the HTTP port (suupose the IP is ...189) sudo nmap -n 192.168.1.189 -T5 -n -sT -p 0-65535 #SSH and foward the HTTP port of the discovered camera ssh -L 8080:192.168.1.189:port ...