Analysis of Hacking Methods for Home Cams, IP Cameras, and CCTVs: How Security Guards Handle It
Hello, TTools > Preferences > ports Enter port information to locate Inputs 80, 8080, and 23 that are commonly used by web camerasools > Preferences > ports Enter port information to locate Inputs 80, 8080, and 23 that are commonly used by web camerasTools > Preferences > ports Enter port information to locate Inputs 80, 8080, and 23 that are commonly used by web camerasI'm security defender PR.With the popularity of CCTVs, IP cameras, and homecams, IP cameras that you install to take care of a single child or pet are common around you, but what if someone else could see an IP camera like this?It's a criminal act that could expose your privacy.
There have been several media reports of hacking into real IP cameras and peeping into other people's private lives, but what about now?
Once again, the security guard channel is not about hacking technology, but about how to alert and defend against security risks.
You must not abuse it.
Download Angry IP Scanner
This is Port Scanner based on GUI.
Download: http://angryip.org/
[Tips for setting up a web scanner]
Tools > Preferences > ports Enter port information to locate
Inputs 80, 8080, and 23 that are commonly used by web cameras
The scanning option is to add Tools ch Fetches > web detector.
You can know the model name and version information of CCTV.
[Web Detect Notes]
Boa/0.94.14rc21: CCTV camera
uc-httpd 1.0.0 : CCTV camera
DVRDVS-Webs: CCTV camera
Webs : CCTV camera
Hikvision-Webs: CCTV camera
iBall-Baton: CCTV camera
Microhttpd: router
RomPager/4.07 UPnP/1.0 : router
I will finish posting today by sharing IP camera prevention tips.
There are three precautions.
First! Changing the initial password Many users don't change the initial password because it's annoying.
Experts say changing passwords, including English and special characters, in the settings of PCs and applications can help defend more than 70 percent.
I think more than 80% of defense is possible.
The video that was demonstrated at the beginning is not a hack.
It's just a way of taking advantage of the initial password vulnerability.
Injection attacks or Cross-Site Scripts that acquire Admin privileges were not covered.
But it's the most commonly used hacking method.
That means you are negligent in managing passwords, right?
In fact, there aren't many ways that individuals can do it.
Because it's hard to set up a firewall by making additional investments other than to complicate the initial password.
So I'm protecting the internal network with firewalls on the router.
I'll work on this in the router hack.
Two! Power off or cover with a cloth when not in use If you are at home or if you are not using it for a long time, turn off the power or cover the camera with a cloth to prevent hacking.
Three! Product Software Security Update When purchasing a product, it is not recommended to purchase products that cannot be repaired in Korea or that do not proceed with the overseas direct purchase software update.