

Two years ago, a backdoor was found on the company's cameras that was alleged to enable access to devices installed in major corporate customers, with data sent back to China.

Hold down the 👏 to support and help others find this article.This isn't the first such issue to hit Dahua. smartphone app would have detected the loss of internet connectivity of the home router, the user would have been sent a notification, thus taking the appropriate measures to resolve the problem (calling the ISP, sending someone to check, etc). In our previous IP camera example, the i.e. That is why I am suggesting that at the client side app there should be monitoring (at a rate that will be determined by the severity of the device’s task and need to be online) of the connection between device and controller app. If at the side of the IoT device there is no internet access, of course, there aren’t any means of sending an alert. That feature is to notify when internet connectivity is lost from the device. That is why I am proposing that IoT devices that are connected to the Internet should all include a basic feature. Without an Internet connection, the user would be under the illusion that everything is secure since he wouldn’t get an email notification (like he is supposed to if something is detected), and that his IP camera would alert him as soon as someone tried to invade into his house, while the camera would have just stopped working without any warning.īelow is an extract of a previous article I wrote, “ IoT without Internet… how does that affect its functionality?”, proposing a solution to this issue: It would be very easy for someone to intervene in the cabinet, cut the cables and remove internet connection thus disabling the IP camera. In our case, the local distribution frame box, where the internet-telephone cables terminate, was in front of my friend's house and unlocked. It doesn’t do much if you have top quality security “software-wise”, but the physical devices you are trying to secure are not themselves placed somewhere safe. Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). When using wireless communication we should always keep in mind that the medium is air and air is accessible to all (thus more “hackable”). It is also important to point out, that if the IP camera had a wired connection and not a wireless one, this attack would not be possible. That wouldn't be the case of course if the camera app was programmed to periodically check the connection with the router/device and report a lost connection by sending an email to the user for example. Otherwise, you can use a more wide attack with the code below.ĭeauthenticating all clients in a specific network aireplay-ng -deauth -a Įx: aireplay-ng -deauth 1000 -a 11:22:33:44:55:66 mon0
#HACKED IP CAM MAC#
You can also try to speculate which is the AP’s MAC address by the name of the SSID.

You can possibly find the MAC address of the IP camera if you know the device’s brand since the first 6-digits of a MAC address identify the manufacturer ( ).
#HACKED IP CAM HOW TO#
Instead, during the attack the video feedback of the IP camera app was frozen and no notifications were sent when we triggered the sensors with motion and sound.īelow is the code I used for this simple attack (for a more detailed analysis on how to perform a deauthentication attack there is a great article on Hacker Noon):ĭeauthenticating specifically the IP camera (only one client) aireplay-ng -deauth -a -c Įx: aireplay-ng -deauth 1000 -a 11:22:33:44:55:66 -c 00:AA:11:22:33:44 mon0 The camera would on normal occasions detect movement and/or noise and notify the user with an email if something was detected. Having said that, it was possible to disconnect the IP camera from the access point it was connected to ( without having the AP password, as I mentioned earlier, since there wasn’t even the need to connect to the network), making it useless.
#HACKED IP CAM PASSWORD#
The Deauthentication Attack falls under the category of pre-connection attacks, meaning you can disconnect any device from any network before connecting to any of these networks and therefore without the need to know the password for the network. Sequence diagram for a WiFi deauthentication attack
