banner



How To Setup Port Forwarding For Ip Camera

Hacking my IP camera

image

Papadopoulos Konstantinos HackerNoon profile picture

Deauthentication Attack + Physical Security

DISCLAIMER: All data and data provided in this article are for informational purposes only. The main goal is to increase security awareness, teach about data security, countermeasures and requite readers information on how to implement a safe and functional organization. If you plan to use the information for illegal purposes, please leave this website now.

A few days agone a friend of mine purchased and installed a new Wifi IP photographic camera at his business firm. Wanting to know how rubber the organisation really was he asked me to take a look and try to "hack" information technology if possible.

The truth is that the Internet of Things (IoT) is a really hot tendency at the moment and a lot of devices are being distributed into the market, many of which are not that reliable or safe .

image

IP cameras are a nice instance of such devices that have invaded many households (or even minor businesses in some cases) equally a smart solution for surveillance and security.

Getting to the point now, I tried to hack the cameras using two generic techniques, not focusing on finding a specific software vulnerability. The ii methods I used were a Deauthentication Attack and a Concrete Security Attack. Then let'south take a closer look at them:

Deauthentication Attack

A Wi-Fi deauthentication attack is a type of denial-of-service attack that targets communication between a user and a Wi-Fi wireless access point.

With this assault, ane can disconnect a client from the admission signal that information technology is connected to . For more than details bank check out the post-obit links: https://en.wikipedia.org/wiki/Wi-Fi_deauthentication_attack and https://www.aircrack-ng.org/~~V:/doku.php?id=deauthentication

image

Sequence diagram for a WiFi deauthentication attack

The Deauthentication Attack falls under the category of pre-connectedness attacks, meaning y'all can disconnect whatsoever device from whatever network before connecting to any of these networks and therefore without the need to know the password for the network.

Having said that, it was possible to disconnect the IP camera from the admission point information technology was connected to (without having the AP password, as I mentioned earlier, since there wasn't fifty-fifty the need to connect to the network), making it useless.

The photographic camera would on normal occasions discover move and/or racket and notify the user with an email if something was detected. Instead, during the assail the video feedback of the IP camera app was frozen and no notifications were sent when nosotros triggered the sensors with move and sound.

Below is the lawmaking I used for this unproblematic assail (for a more detailed analysis on how to perform a deauthentication attack there is a great article on Hacker Noon):

Deauthenticating specifically the IP camera (just 1 client)

              aireplay-ng --deauth [number of deauth packets] -a [AP MAC address] -c [IP camera MAC address] [interface]                Ex: aireplay-ng --deauth 1000 -a 11:22:33:44:55:66 -c 00:AA:11:22:33:44 mon0                          

You can possibly detect the MAC address of the IP camera if you know the device's make since the starting time 6-digits of a MAC accost identify the manufacturer (https://macvendors.com). Yous can also endeavor to speculate which is the AP's MAC accost by the name of the SSID. Otherwise, you can use a more than wide attack with the code below.

Deauthenticating all clients in a specific network

              aireplay-ng --deauth [number of packets] -a [AP MAC address] [interface]            
                              Ex: aireplay-ng --deauth 1000 -a 11:22:33:44:55:66 mon0                          

That wouldn't be the case of class if the camera app was programmed to periodically check the connection with the router/device and report a lost connection by sending an email to the user for example.

It is also of import to point out, that if the IP camera had a wired connection and not a wireless 1 , this set on would non exist possible. When using wireless communication we should always go along in heed that the medium is air and air is accessible to all (thus more than "hackable").

Physical Security Assail

Physical security describes security measures that are designed to deny unauthorized admission to facilities, equipment and resources and to protect personnel and belongings from damage or damage (such every bit espionage, theft, or terrorist attacks).

image

Distribution frame

Information technology doesn't practise much if yous accept superlative quality security "software-wise", merely the physical devices y'all are trying to secure are not themselves placed somewhere prophylactic . In our case, the local distribution frame box, where the internet-telephone cables terminate, was in forepart of my friend'south business firm and unlocked. It would be very easy for someone to arbitrate in the cabinet, cut the cables and remove internet connection thus disabling the IP camera.

Without an Internet connection, the user would be under the illusion that everything is secure since he wouldn't get an email notification (similar he is supposed to if something is detected), and that his IP photographic camera would alert him as soon as someone tried to invade into his house, while the camera would have only stopped working without whatsoever warning.

Below is an extract of a previous article I wrote, "IoT without Internet… how does that affect its functionality?", proposing a solution to this issue:

That is why I am proposing that IoT devices that are connected to the Internet should all include a basic characteristic. That feature is to notify when internet connectivity is lost from the device. If at the side of the IoT device there is no cyberspace admission, of course, there aren't any means of sending an alarm. That is why I am suggesting that at the customer side app there should be monitoring (at a charge per unit that will be determined by the severity of the device's task and need to be online) of the connectedness betwixt device and controller app .
In our previous IP photographic camera case, the i.east. smartphone app would have detected the loss of internet connectivity of the abode router, the user would have been sent a notification, thus taking the appropriate measures to resolve the problem (calling the ISP, sending someone to cheque, etc).

Concord down the 👏 to support and help others notice this article. Thanks for reading!!

Follow me on Twitter @konpap1996

Tags

# computers# iot# cybersecurity# hacking

Related Stories

Source: https://hackernoon.com/hacking-my-ip-camera-1ca66682a739

Posted by: ballardloortambel1953.blogspot.com

0 Response to "How To Setup Port Forwarding For Ip Camera"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel