The only thing that the tool doesn’t automate is the authentication bypass attacks, the researchers said. ![]() The researchers released an open-source tool called “getmecamtool” that can be used to automate most of these attacks, including injecting executable files into the firmware or patching the Web interface. This would allow the attacker to compromise the camera administrator’s browser when he visits the interface. However, an attacker who configures their browser in this manner would have their connection tunneled through the proxy.Ī third attack scenario involves poisoning the Web interface to load a remotely hosted piece of JavaScript code. This proxy would be set up to behave differently depending on who’s connecting to it.įor example, if the administrator accesses the camera over port 80 the proxy would display the regular Web interface because the administrator wouldn’t have his browser configured to use the camera’s IP address as a proxy. One of them involves creating a hidden backdoor administrator account that’s not listed on the Web interface.Ī second attack involves modifying the firmware to run a proxy server on port 80 instead of the Web interface. However, the researchers described several practical attacks. There are some limitations to what can be run on these devices since they only have 16MB of RAM and a slow CPU and most of the resources are already used by its default processes. ![]() Since the cameras are also connected to the local network, they can be used to identify and remotely attack local devices that wouldn’t otherwise be accessible from the Internet, they said. This means they can run arbitrary software like a botnet client, a proxy or a scanner, the researchers said. The firmware is based on uClinux, a Linux-based operating system for embedded devices, so technically these cameras are Linux machines connected to the Internet.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |