Security webcams are often way too easy to hack. In this article + video I show you how this is done. How simple it is to hack a lot of cameras. After many years, it still seems there a few people who are told what is security. Or is it that most people just don’t know what the consequences might be and just ignore the warnings?
One of the big ironies of life can be that the devices we create to protect us, can sometimes be used against us.
One of the reasons for writing this article is to show how easy it can be to hack a surveillance camera in a very simple way.
Before continue, I am writing this post so that:
✓ Factories of these security cams will also focus on security
✓ That software makers will focus more on security. (This must be there nr 1 focus.)
✓ People should be well informed about the security of these (any) devices.
How is it possible that this has been going on for years. How difficult is it to inform people.
IMPORTANT THINGS TO REMEMBER
This article was written for educational purposes and pentest only.
The author can not be held responsible for damages caused by the use of these resources.
You will not misuse the information to gain unauthorized access.
This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.
Just remember, Performing any hacks without written permission is illegal ..!
To monitor what’s happening in your area, the security cameras have to be connected to the internet. And the moment you connect any device to the internet “hypothetically” someone can get access to it. See the article about Shodan Eye a tool that I make, you will read that you can search for any device that is connected to the internet. (Later more about this).
What’s even scarier is once a camera is compromised, a “hacker” can make “lateral movements” into other connected devices..!
So a hacker could, in theory, disable your alarm system, hack your computer, torment your household by blasting music, turn on your tv and much more. As long as it is connected to the same network..!
“People don’t care about Security and Privacy,
I’m convinced that people care… And if they don’t,
It’s our duty to show them why they should..!”
How to secure your security webcam
Create a complex password
Don’t use the default user name and password that comes with your device that you buy. Change your passwords to something long and difficult to break. Don’t use last names, addresses, pet names or birthdays. I recommend a combination of upper and lower case letters, numbers and symbols.
Change your passwords frequently..!
Regularly update your security camera’s firmware
Keep your software up to date. This helps patch vulnerabilities in your software that could allow hackers access to your device. Surveillance camera vendors often expect users to update the devices manually. So every few months, you should check to see if yours has an available update. Set up manual security updates, if that’s an option.
Keep your firewall activated
Installing a firewall between your Internet connection and all of your devices is one more way to protect yourself. A firewall is a network security system. It provides a wall of defense by monitoring traffic to and from your network. In short, it helps keep the bad guys out. Keep in mind, most firewalls need to be turned on.
Place security webcams on their own network
It’s also recommended that you consider placing your security cameras on a network of their own. Isolating your cameras to a single network means that if the cameras are somehow compromised, the hacker won’t be able to gain access to any of your other devices. I recommend using a cloud server for your security camera.
Buy a security cam from a reputable vendor
Choose a company that treats security with more responsibility. Get informed or explore what the best security camera is for you.
Never click on suspicious links in emails or download files from people you don’t know, tricking you into installing malware. This is one of the most common ways that hackers gain access to your machine.
Botnets have been one of the most common methods of malware implementation and have infected hundreds of millions of computers. Because botnets infect new technologies such as “Internet of Things” (IoT) devices in homes, public spaces, and secure areas.
They perform major operations while remaining small
Most people would be shocked to hear that the spam they receive comes from thousands or even millions of computers, just like theirs. The real owners of those computers can still use them and are probably unaware that something is wrong, except that their computer sometimes seems slow. Most botnets have an extremely small footprint. They usually also have the ability to mask themselves so that they can carry out large-scale attacks without being noticed.
They connect open-source and unsecured devices
Mirai, a botnet discovered in 2016, mainly attacked IoT devices, including security webcams and internet routers. In essence, devices infected with Mirai malware became bots that would scan the internet to find IoT devices. Mirai would then use common standard usernames and passwords set by device manufacturers to attempt to infiltrate and infect those devices. Usually, infected devices would function normally
Different ways to hack Security Webcams
“In the years I’ve spent as a professional hacker, I’ve learned that the simplest approach is usually the best. As hackers, we tend to get down into the weeds, focusing on technology, not realizing there may be non-technical methods at our disposal that work as well or better than their high-tech counterparts. I always kept an eye out for the simplest solution to advanced challenges”
– Johnny Long 2011.
Hacking Security Cameras Using Google Dorks
What data can we find using google dorks?
- Username and passwords
- Admin login pages
- Sensitive documents
- Govt/military data
- Email lists
- Bank account details
- Vulnerable websites
- So much more …
A Google Dork is a search that uses one or more of these advanced techniques to reveal something interesting. Something important to keep in mind, the web can be crawled by anyone. Google automatically indexes a website, and unless sensitive information is explicitly blocked from indexing (nofollow, robots.txt), all of the content can be searched via Dorks or advanced search operators.
A few security webcam searches using Dorks
intitle:liveapplet Mostly security cameras, car parks, colleges, clubs, bars etc. intitle:”snc-rz30 home” Mostly security cameras, shops, car parks inurl:LvAppl intitle:liveapplet Mostly security cameras, car parks, colleges etc. inurl:lvappl A huge list of webcams around the world, mostly security cameras, car parks, colleges etc. inurl:axis-cgi/jpg Mostly security cameras inurl:”webcam.html” Mostly European security cameras intitle:”Live View / – AXIS” Mostly security cameras, car parks, colleges etc. intitle:”LiveView / – AXIS” Mostly security cameras, car parks, colleges etc. inurl:view/view.shtml Mostly security cameras, car parks, colleges etc. control/userimage.html
Google Dorks Lists
In the video down below, I show more examples of hacking security cameras with Google Dorks.
Hacking Security Cameras Using Shodan
Shodan is a search engine for Internet-connected devices. Google lets you search for websites, Shodan lets you search for every device connected to the internet. You can find out more here on this page.
Find security cams on the Shodan website
Searching for Hikvision:
At this moment I’m working on a (big) list of Shodan Dorks that I will put online soon. For now, you can find a small one here (In the Shodan Eye script):
Install Shodan on your terminal
To install the Shodan library, simply:
pip install shodan
Or if you don’t have pip installed (which you should seriously install):
Once the tool is installed you have to initialize the environment with your API key using shodan init
shodan init YOUR_API_KEY
You can get your API key from your Shodan account page located at:
Get you Shodan API key
Security webcams hacking
Now that you have installed Shodan on your computer,
let’s have some fun..! 🙂
The search begins. Copy the IP address and port, and put it in your browser. <ipaddress:8080>
In the video down below, I show more examples of hacking security cameras with Google Dorks.
Shodan Host Search
With Shodan, you also can find more information about the IP address. And even find some vulnerabilities if there are any.
shodan host <IP address>
Security Webcam hacking with Shodan Eye getting more information.
Install Shodan Eye
You can find the script here:
git clone https://github.com/BullsEye0/shodan-eye.git
pip3 install -r requirements.txt
How to use Shodan Eye
(You will be asked for a Shodan API key)
Doing a Nmap scan for even more info
To find out more about the IP of the Security camera and to find some vulnerabilities, always do a Nmap scan. After that, you can search for an exploit. I have made an article about How to use Nmap NSE Scripts to find Vulnerabilities So that you can even find more vulnerabilities on an IP address.
With the use of Shodan, you can discover (some) open ports. But to discover more open ports on an IP address you better take a step to Nmap. We make an extensive Nmap scan below.
For this article I have used the following command:
sudo nmap -sV -T5 <IP address>
The command meaning:
-sV = Attempts to determine the version of the service running on port
-T5 = Insane (5) speeds scan; assumes you are on an extraordinarily fast network
* Optional -A = for a Traceroute
Looking for Exploits
In this example we search for: exploits Vivotek FD8134V webcam rtsp. (See the photo above)
This way you can search for exploits for every vulnerability that you encounter.
“What hackers do is figure out technology and experiment with it in ways many people never imagined. They also have a strong desire to share this information with others and to explain it to people whose only qualification may be the desire to learn.”
― Emmanuel Goldstein
Video Security Webcam Hacking
To make things even clearer, I have recorded a video.
All IP addresses are randomly selected.
Obviously I’m assuming that the information I give would not be misused. See Disclaimer.
Become a member on LBRY
Plus earning LBRY for watching videos ♥️
Here an invitation link, so that we both benefit.
In this way, you also support my work.
Obviously you can also follow me on YouTube (But not all videos will be placed there).
It took a while before I decided to make an article about this. I also discussed this with various people. Because it is so simple to hack those security webcams. My goal is to warn everyone about this. Also, the factories that make these security web cameras.
(People are not – insufficiently informed) People are not aware of the risks they run.
Be aware that everything you connect to the internet is – can be visible to everyone.
If you have any questions about this article, any feedback, suggestions if you want to share your thoughts, please feel free to do it using the below comment form.