We found a camera that was installed without anyones knowledge on a jobsite, we currently have the IP camera system in our possession and there is a username and password for the device.
I have discovered that the username is "root" however the password is what we are trying to get past to see who set this up, perhaps we can get an email address off of it or if it was streaming to a website and or a NAS device or something.
So I'm currently using Hydra for Ubuntu to brute force attack the password. It is not a Basic Authentication password, it is a digest authentication. I do have a password list and when I use Hydra it comes back with several passwords it thinks is it but not the correct one.
I have read that it is due to the web interface attack that its not getting rejected on certain passwords therefore its giving me false positives.
below is what I am currently asking hydra to do but perhaps I need to add in something else to this, let me know what you think.
hydra -l root -P pwlist.txt (ip address) http-get /
I have tried this command also with -e ns and -f triggers also changing the end to http-head but still getting false positives.
Does anybody have any idea as to how I can get around this?