Camera hacking is not very new for hacker community . Due to
mis-configuration in the Camera security , the cameras that can be
accessed over the internet can be viewed by anyone without any
Authentication . Though there is no real hacking in this but its
somewhat nice to explore .
I would use this to explain the
necessity of security configuration for IP cams . The Cams that have
been used to provide the security , are now accessible to anyone without
any authentication , and have become the biggest security Loophole.
The hacking tutorial section is now full of useless threads,The worst of all most of them are questions and other shits.
So yeah here i am writing a new tutorial trying to make this section back to what it used to be.
So yeah here i am writing a new tutorial trying to make this section back to what it used to be.
====================
Pro Tip :Secure yourself before doing this.This is Purely for Educational Purposes and Dangerous . Don’t Access Password Protected Cameras
====================
How to Watch Security Cameras on the Internet :
1-Open your browser.
2-Go to http://www.google.com
3-Copy paste a code and put it in google click enter and bam you will get some cameras by clicking on the search links .
2-Go to http://www.google.com
3-Copy paste a code and put it in google click enter and bam you will get some cameras by clicking on the search links .
Here I have accumulated a list of Google
Dorks that can be used to explore some of the IP cams that can be
accessed Online without any Authentication .
inurl:/view.shtml intitle:”Live View / – AXIS” | inurl:view/view.shtml^ inurl:ViewerFrame?Mode= inurl:ViewerFrame?Mode=Refresh inurl:axis-cgi/jpg inurl:view/index.shtml inurl:view/view.shtml liveapplet intitle:liveapplet allintitle:”Network Camera NetworkCamera” intitle:axis intitle:”video server” intitle:liveapplet inurl:LvAppl intitle:”EvoCam” inurl:”webcam.html” intitle:”Live NetSnap Cam-Server feed” intitle:”Live View / – AXIS 206M” intitle:”Live View / – AXIS 206W” intitle:”Live View / – AXIS 210″ inurl:indexFrame.shtml Axis intitle:start inurl:cgistart intitle:”WJ-NT104 Main Page” intitle:snc-z20 inurl:home/ intitle:snc-cs3 inurl:home/ intitle:snc-rz30 inurl:home/ intitle:”sony network camera snc-p1″ viewnetcam.com intitle:”Toshiba Network Camera” user login intitle:”i-Catcher Console – Web Monitor”
Here is a Screenshot :
You can modify these dorks as per your
needs during a penetration test on an organisation . Consider when you
might be doing Penetration testing for a Bank or a multinational that
has lots of IP cameras with remote access over internet enabled , this
might be the First Loophole to report .
So friends you enjoyed our tutorial “How to Watch Security Cameras on the Internet” .. If yes don’t forget to say thanks.
Disclaimer
: Don’t try to access a password protected camera or you might get into
real trouble . Doing Hacking is punishable under Law and we hold no
responsibility of what you do with this information . Purely for
Educational Purposes .
0 comments: