"Anyone who can connect to port 9000 on the device can send this request and retrieve that information," said someLuser, who declined to reveal his real name when I reached him by instant message. And worse, he was able to use that unprotected connection to retrieve the login credentials for the DVR's web-based control panel. He found that commands sent to the device via a certain connection, port 9000, were accepted without any authentication. "You could look at videos, pause and play, or just turn off the cameras and rob the store."Įarly last week a security researcher who goes by the name someLuser published a blog post detailing his dissection of a DVR built by the security firm Swann, disassembling the device and running tests on it via its serial port. "The DVR gives you access to all their video, current and archived," says Moore. Moore, has discovered that 58,000 of the hackable video boxes, all of which use firmware provided by the Guangdong, China-based firm Ray Sharp, are accessible via the Internet. And one of the researchers, security firm Rapid7's chief security officer H.D. Eighteen brands of security camera digital video recorders (DVRs) are vulnerable to an attack that would allow a hacker to remotely gain control of the devices to watch, copy, delete or alter video streams at will, as well as to use the machines as jumping-off points to access other computers behind a company's firewall, according to tests by two security researchers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |