Exploiting Network Surveillance Cameras Like a Hollywood Hacker

Presented at Black Hat USA 2013, Aug. 1, 2013, 3:30 p.m. (60 minutes).

This talk will examine 0-day vulnerabilities that can be trivially exploited by remote attackers to gain administrative and root-level access to consumer and enterprise network surveillance cameras manufactured by D-Link, Trendnet, Cisco, IQInvision, Alinking and 3SVision. Thousands of these cameras are Internet accessible, and known to be deployed in homes, businesses, hotels, casinos, banks and prisons, as well as military and industrial facilities.

Additionally, a proof-of-concept attack will be demonstrated in which a remote attacker can leverage the described vulnerabilities to freeze and modify legitimate video streams from these cameras, in true Hollywood fashion.


Presenters:

  • Craig Heffner - TNS
    Craig Heffner is a Vulnerability Researcher with Tactical Network Solutions in Columbia, MD. He has 6 years experience analyzing wireless and embedded systems and operates the devttys0 blog which is dedicated to embedded hacking topics. He has presented at events such as Black Hat and DEF CON and teaches embedded device exploitation courses. His skin has never been exposed to sunlight and is bioluminescent at 200 meters (656 feet) below sea level.

Links:

Similar Presentations: