关联漏洞
描述
Updated version of this weak password encryption script
介绍
# Argus Surveillance DVR 4.0 - Weak Password Encryption
## CVE-2022-25012
Updated version of this weak password encryption script
Exploit DB REF: https://www.exploit-db.com/exploits/50130
Author REF: https://deathflash1411.github.io/blog/dvr4-hash-crack
NIST REF: https://nvd.nist.gov/vuln/detail/CVE-2022-25012
## Description:
The author had stated that they didnt make additional entries for special ASCII characters.
I have updated this to include them and provide a password output to make it more user friendly
as well as it accepting arguements rather than needing to edit the script to place the password hash.
## Usage
`python3 CVE-2022-25012.py <hash>`
Example:
`python3 CVE-2022-25012.py E1B0BD8F4D7B73573F7EF539A935735753D190839083C165BD8FCA79418DB398F7DF`
## Generating our own proof of concept
We set a complex password in the argus DVR user screen

Using other avenues to gain access to the following file: `C:\ProgramData\PY_Software\Argus Surveillance DVR\DVRParams.ini`
We can see the entry for our user and corresponding password:

We can then run this hash as an arguement (as seen in the usage example)

文件快照
[4.0K] /data/pocs/4314d193299b471c7c276e76e0ce4e57f5a07d49
├── [3.3K] CVE-2022-25012.py
├── [1.0K] LICENSE
└── [1.4K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。