
Now we can start configuring the module from the Metasploit interface. The first thing is to change the parameter GROOMSIZE to 50. The hash for admin was put into our internal password cracking rig and cracked as seen in the list below. Not specifying whatever ports to the cameradar application volition scan the 554 in addition to 8554 ports. 5 hours in, I had 65 points, allowing me to pass with the lab report. This bug allows remote attackers to execute arbitrary code via RTSP request message. cam/realmonitor Specific path for the stream.


So I needed to get it from the live stream in the web interface.
