BrownFineSecurity / onvifscan
Install for your project team
Run this command in your project directory to install the skill for your entire team:
mkdir -p .claude/skills/onvifscan && curl -L -o skill.zip "https://fastmcp.me/Skills/Download/1309" && unzip -o skill.zip -d .claude/skills/onvifscan && rm skill.zip
Project Skills
This skill will be saved in .claude/skills/onvifscan/ and checked into git. All team members will have access to it automatically.
Important: Please verify the skill by reviewing its instructions before using it.
ONVIF device security scanner for testing authentication and brute-forcing credentials. Use when you need to assess security of IP cameras or ONVIF-enabled devices.
0 views
0 installs
Skill Content
--- name: onvifscan description: ONVIF device security scanner for testing authentication and brute-forcing credentials. Use when you need to assess security of IP cameras or ONVIF-enabled devices. --- # Onvifscan - ONVIF Security Scanner You are helping the user scan ONVIF devices for security issues including authentication bypasses and weak credentials using the onvifscan tool. ## Tool Overview Onvifscan is an ONVIF device security scanner that can: - Test for unauthenticated access to ONVIF endpoints - Perform credential brute-forcing attacks ## Instructions When the user asks to scan ONVIF devices, test IP cameras, or assess IoT device security: 1. **Determine scan type**: - `auth`: Authentication and access control testing (recommended to start) - `brute`: Credential brute-forcing on password-protected endpoints 2. **Get target information**: - Ask for the device URL/IP - Determine which scan type to run - Check if they have custom wordlists 3. **Execute the scan**: - Use the onvifscan command from the iothackbot bin directory - Format: `onvifscan <subcommand> <url> [options]` ## Subcommands ### Auth Scan Tests ONVIF endpoints for authentication requirements: ```bash onvifscan auth http://192.168.1.100 ``` Options: - `-v, --verbose`: Show full XML responses - `-a, --all`: Test ALL endpoints including potentially destructive ones - `--format text|json|quiet`: Output format ### Brute Force Attempts credential brute-forcing on protected endpoints: ```bash onvifscan brute http://192.168.1.100 ``` Options: - `--usernames <file>`: Custom usernames wordlist (default: built-in onvif-usernames.txt) - `--passwords <file>`: Custom passwords wordlist (default: built-in onvif-passwords.txt) - `--format text|json|quiet`: Output format ## Examples Quick auth check on a device: ```bash onvifscan auth 192.168.1.100 ``` Auth check with verbose output: ```bash onvifscan auth http://192.168.1.100:8080 -v ``` Brute force with custom wordlists: ```bash onvifscan brute 192.168.1.100 --usernames custom-users.txt --passwords custom-pass.txt ``` ## Important Notes - URLs can omit `http://` - it will be added automatically - Auth scan is non-destructive and safe to run - Use `-a` flag with caution - may test destructive endpoints - Brute force is rate-limited to prevent device overload (max 20 attempts by default) - Built-in wordlists located in `wordlists/` directory