Got it

How hackers attack cameras

301 0 4 0 0

How Hackers Attack Cameras

 

With the further popularity of network video surveillance cameras, especially in the current trend of the Internet of Things era, surveillance solutions connect with more and more devices. Although it brings great convenience, it also brings many new problems, such as network security, which is the most important one. In the past few years, there has been a lot of news about video cameras being attacked by the network. Video surveillance is as vulnerable as other devices in the face of network security challenges. How to strengthen network security still needs to start with its common attacked ways:

 

1. In many cases, the attacker usually scans the protocol and port of the camera, then browses and accesses the page managed by the device. If it fails, he will choose a more complex way to scan to find the camera and imitate the authorized user. It is worth noting that attackers can attack cameras without software vulnerabilities. Many design flaws of cameras or other connected devices can become hackers'entry points once they have security vulnerabilities. From this point, we can see that if a certain security protection mechanism is built at the beginning of the design of the camera product, it is not easy to exploit these vulnerabilities even if the camera is found to have vulnerabilities in the follow-up. At the same time, the device vendors will promptly push information, like other network devices, to upgrade the security level by upgrading.

2. Another common way is that attackers exploit software vulnerabilities known by cameras in open source or third-party libraries. For example, network servers are relatively vulnerable components. Usually, news about hackers using vulnerabilities of third-party network servers to access cameras can be seen.

 

3. Attackers use Command Injection attacks, which means that because Web applications do not filter data submitted by users strictly, hackers can submit data to Web applications by constructing special command strings, and use this way to execute external programs or system commands to attack, illegally obtain data or network funds. Source, etc. In other words, as long as developers filter data well and make good use of whitelists, they can avoid such attacks.

 

To sum up the above attack methods, users should:

 

One is to modify the initial password, and at the same time it is worth noticing that besides the initial password, the other is to pay attention to the vendor's push information in time and do a good job of equipment security upgrade.



Translated from: http://security.asmag.com.cn/test/201903/70547.html. 


Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.