Skip to content

Instantly share code, notes, and snippets.

@lattice0
Last active March 28, 2024 06:29
Show Gist options
  • Select an option

  • Save lattice0/c23561ff62af5647c4ac0f3d8d26a739 to your computer and use it in GitHub Desktop.

Select an option

Save lattice0/c23561ff62af5647c4ac0f3d8d26a739 to your computer and use it in GitHub Desktop.

Revisions

  1. lattice0 revised this gist Jul 5, 2018. 1 changed file with 5 additions and 1 deletion.
    6 changes: 5 additions & 1 deletion gistfile1.txt
    Original file line number Diff line number Diff line change
    @@ -8,4 +8,8 @@ nmap -e eth0 192.168.1.0/24
    nmap -e eth0 192.168.1.104 -p 0-65535

    #SSH and foward the HTTP port of the discovered camera
    ssh -L 8080:192.168.1.189:port ...
    ssh -L 8080:192.168.1.189:port ...

    #FAST wireless port scan for a given IP

    nmap -p0-65535 192.168.1.198 -T5
  2. lattice0 revised this gist May 4, 2018. 1 changed file with 0 additions and 2 deletions.
    2 changes: 0 additions & 2 deletions gistfile1.txt
    Original file line number Diff line number Diff line change
    @@ -3,10 +3,8 @@ sudo ip address add 192.168.1.133/24 dev eth0

    #First, scan the eth0 interface to find all the IPs connected to it
    nmap -e eth0 192.168.1.0/24
    sudo nmap -n -e eth0 192.168.1.0/24 -T5 -sT2

    #Now that you found the camera's IP, scan which ports are open to find the HTTP port (suupose the IP is ...189)
    sudo nmap -n 192.168.1.104 -e eth0 -T5 -sT -p 0-65535
    nmap -e eth0 192.168.1.104 -p 0-65535

    #SSH and foward the HTTP port of the discovered camera
  3. lattice0 revised this gist Jan 25, 2018. 1 changed file with 1 addition and 0 deletions.
    1 change: 1 addition & 0 deletions gistfile1.txt
    Original file line number Diff line number Diff line change
    @@ -7,6 +7,7 @@ sudo nmap -n -e eth0 192.168.1.0/24 -T5 -sT2

    #Now that you found the camera's IP, scan which ports are open to find the HTTP port (suupose the IP is ...189)
    sudo nmap -n 192.168.1.104 -e eth0 -T5 -sT -p 0-65535
    nmap -e eth0 192.168.1.104 -p 0-65535

    #SSH and foward the HTTP port of the discovered camera
    ssh -L 8080:192.168.1.189:port ...
  4. lattice0 revised this gist Jan 25, 2018. 1 changed file with 2 additions and 1 deletion.
    3 changes: 2 additions & 1 deletion gistfile1.txt
    Original file line number Diff line number Diff line change
    @@ -3,9 +3,10 @@ sudo ip address add 192.168.1.133/24 dev eth0

    #First, scan the eth0 interface to find all the IPs connected to it
    nmap -e eth0 192.168.1.0/24
    sudo nmap -n -e eth0 192.168.1.0/24 -T5 -sT2

    #Now that you found the camera's IP, scan which ports are open to find the HTTP port (suupose the IP is ...189)
    sudo nmap -n 192.168.1.189 -T5 -n -sT -p 0-65535
    sudo nmap -n 192.168.1.104 -e eth0 -T5 -sT -p 0-65535

    #SSH and foward the HTTP port of the discovered camera
    ssh -L 8080:192.168.1.189:port ...
  5. lattice0 created this gist Jan 25, 2018.
    11 changes: 11 additions & 0 deletions gistfile1.txt
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,11 @@
    #Give an IP address in the range of the camera to the eth0 interface
    sudo ip address add 192.168.1.133/24 dev eth0

    #First, scan the eth0 interface to find all the IPs connected to it
    nmap -e eth0 192.168.1.0/24

    #Now that you found the camera's IP, scan which ports are open to find the HTTP port (suupose the IP is ...189)
    sudo nmap -n 192.168.1.189 -T5 -n -sT -p 0-65535

    #SSH and foward the HTTP port of the discovered camera
    ssh -L 8080:192.168.1.189:port ...