Related Security Tools

Authors

Quick Usage Examples

The command line usage for VideoJak is the following:

In a single VLAN network, you can run videojak using the following command line usage.

  • bughira@vipervast# videojak -i eth0 // //

Where eth0 is the interface to reach the target network.

In CDP environments, here is an example of running videojak in MitM Learning Mode, to discover the VVID, and VLAN Hop:

  • bughira@vipervast# videojak -i eth0 -c 1 // //
  • bughira@vipervast# videojak -i eth0 -c 0 // //

If you already know the VVID, you can run videojak in MitM Target Mode to VLAN Hop to a specified Voice VLAN (200):

  • bughira@vipervast# videojak -i eth0 -v 200 // //

Media Denial of Service attack demo

The following screeshots show the step by step instructions for launching media denial of service attacks:


The above screeshot shows videojak arp poisoning the network connected to interface eth0 using CDP Spoof mode.


The above screeshot shows videojak detecting an active IP video call session.


The above screeshot shows videojak launching a media denial of service attack against the detected IP Video call session.

IP Video Replay Attack Demo

The IP Video replay attack is a bit complex to launch and needs a packet capture utility installed on the attacking system. The following screeshots demonstrate the step by step instructions for launching the IP Video Replay attack.

  • Launch videojak against target network or device (video surveillace camera)
  • Take a packet capture of the live video stream using your favorite packet capture utility.
  • Use the videosnarf utility shipped with videojak to extract the video stream out of packet capture.
  • Use the ffmpeg tool to convert extracted video stream into .avi file.
  • Store .avi file in the working directory of videojak.
  • Press 'f' on the videojak console to detect IP video surveillance camera stream.
  • Select the device type from the given options - Cisco 7985 phones, Axis Camera, other
  • Choose the attack type from 1) Infinite looping and 2) One time attack.
  • Choose the avi file to play from the list
  • Press Ctrl+C or 's' to stop the active attack.


The above screeshot shows videojak in MiTM attack mode and sniffing all network traffic.


The above screeshot shows the command line packet capture tool tshark capturing all traffic and dumping traffic into output file, blah.pcap.


The above screeshot shows videosnarf extracting video stream out of blah.pcap.


The above screeshot shows the command line tool ffmpeg converting the .264 file extracted by videosnarf into an .avi file format.


The above screeshot shows videojak launching the IP Video replay file attack against the selected video stream.