WS-Discovery protocol scanner for discovering and enumerating ONVIF cameras and IoT devices on the network. Use when you need to discover ONVIF devices, cameras, or WS-Discovery enabled equipment on a network.
Installation
Details
Usage
After installing, this skill will be available to your AI coding assistant.
Verify installation:
skills listSkill Instructions
name: wsdiscovery description: WS-Discovery protocol scanner for discovering and enumerating ONVIF cameras and IoT devices on the network. Use when you need to discover ONVIF devices, cameras, or WS-Discovery enabled equipment on a network.
Wsdiscovery - WS-Discovery Protocol Scanner
You are helping the user discover and enumerate devices using the WS-Discovery protocol (commonly used by ONVIF cameras and IoT devices) using the wsdiscovery tool.
Tool Overview
Wsdiscovery implements the WS-Discovery protocol to discover network devices that support this standard. It's particularly useful for finding ONVIF cameras, network video recorders (NVRs), and other IoT devices that advertise themselves via WS-Discovery.
Instructions
When the user asks to discover ONVIF devices, find network cameras, or scan for WS-Discovery devices:
-
Understand the target:
- Ask for the target hostname or IP address
- Determine if they want verbose output (full XML responses)
- Decide on output format
-
Execute the scan:
- Use the wsdiscovery command from the iothackbot bin directory
- Basic usage:
wsdiscovery <hostname_or_ip> - For verbose output:
wsdiscovery <hostname_or_ip> -v - For JSON output:
wsdiscovery <hostname_or_ip> --format json
-
Output formats:
--format text(default): Human-readable colored output with device details--format json: Machine-readable JSON--format quiet: Minimal output
What It Discovers
The tool extracts and displays:
- IP addresses and ports
- Endpoint references (device UUIDs)
- Device types
- Manufacturer information
- Device names and models
- Hardware versions
- Serial numbers
- Firmware versions
- Location information
- Service endpoints (XAddrs) - URLs for device management
- Metadata versions
Examples
Discover devices on a specific host:
wsdiscovery 192.168.1.100
Discover with full XML responses:
wsdiscovery 192.168.1.100 -v
Output device information as JSON:
wsdiscovery 192.168.1.100 --format json
Scan network broadcast address to find all devices:
wsdiscovery 239.255.255.250
Important Notes
- WS-Discovery uses multicast/broadcast discovery
- Devices must support the WS-Discovery protocol to be found
- Common with ONVIF cameras, printers, and network media devices
- Service endpoints (XAddrs) can be used with onvifscan for further testing
- The tool parses ONVIF-specific scope information when available
More by BrownFineSecurity
View allAndroid APK decompiler that converts DEX bytecode to readable Java source code. Use when you need to decompile APK files, analyze app logic, search for vulnerabilities, find hardcoded credentials, or understand app behavior through readable source code.
Professional network reconnaissance and port scanning using nmap. Supports various scan types (quick, full, UDP, stealth), service detection, vulnerability scanning, and NSE scripts. Use when you need to enumerate network services, detect versions, or perform network reconnaissance.
ONVIF device security scanner for testing authentication and brute-forcing credentials. Use when you need to assess security of IP cameras or ONVIF-enabled devices.
IoT network traffic analyzer for detecting IoT protocols and identifying security vulnerabilities in network communications. Use when you need to analyze network traffic, identify IoT protocols, or assess network security of IoT devices.