New Hacking Tool Lets Users Access a Bunch of DVRs and Their Video Feeds (bleepingcomputer.com) 15
An anonymous reader writes: "An Argentinian security researcher named Ezequiel Fernandez has published a powerful new tool yesterday that can easily extract plaintext credentials for various DVR brands and grant attackers access to those systems, and inherently the video feeds they're supposed to record," reports Bleeping Computer. "The tool, named getDVR_Credentials, is a proof-of-concept for CVE-2018-9995, a vulnerability discovered by Fernandez at the start of last month, [affecting TBK DVR systems]. Fernandez discovered that by accessing the control panel of specific DVRs with a cookie header of 'Cookie: uid=admin,' the DVR would respond with the device's admin credentials in cleartext." Tens of thousands of vulnerable devices available online can be hijacked with their video feeds assembled in voyeur sites, like it's been done in the past.
So Much For "The Internet Of Things" (Score:4, Insightful)
Re: (Score:2)
Re: So Much For "The Internet Of Things" (Score:2)
Re: (Score:3)
Yes all routers are a NAT, thats not the issue. The issue is everybody wants to see their cameras when they're away, Consumers, Businesses, Everybody! So the tech that installs the system opens the ports necessary in the router for the people to have outside access to the system. The problem isn't that they forward ports.. The problem is that the vendors have such shitty security on their devices once that port, or more likely multiple ports get forwarded, chances are there is more than one way past that d
Re:So Much For "The Internet Of Things" (Score:4, Insightful)
If the tech industry was serious about IOT - tens or hundreds of millions of home devices that are internet connected - they should have gotten together, pooled a few Billion dollars of R&D money, and researched ways to make unauthorized access to these IOT products fucking-difficult-to-near-impossible.
This has been done. But it doesn't stop some fly-by-night overseas hardware manufacturer from churning out quick and dirty hardware that does the job, but which does the quickest and dirtiest job on the software front that they can get away with.
But for a counter-example, look at the work Apple has done with HomeKit. The entire setup is required to be encrypted back to front, and has to undergo an Apple certification program. The end result is pretty much bulletproof -- but the certification requirements that make the system so secure has meant few companies (and certainly none of the cheap-and-dirty ones) have released certified hardware.
That's hardly the fault of IoT as a concept. As with anything else, there will be expensive, better secured, better quality versions, and cheaper, crappier, less secure, low quality versions.
Yaz
Somebody still uses these things? (Score:1)
I would guess such people don't have much to steal.
Howto (Score:5, Interesting)
Since the article is light on actual details of how to find vulnerable machines.
Go to shodan.io [shodan.io] and search for '<A HREF="/login.rsp">'
Replace the IP 14.63.122.219:9000 in the example with one from Shodan's results.
Re: (Score:2)
In slashdot, and the GP's defense, if you couldn't figure out how to do that from RTFA with all the pictures and wot not showing exactly what to do... you dont even belong on this site.
Re: (Score:1)
In slashdot, and the GP's defense, if you couldn't figure out how to do that from RTFA with all the pictures and wot not showing exactly what to do... you dont even belong on this site.
Thank you for this comment.
The problem is never finding a hack. There's a shitload of resources online that a 12-year old could navigate. The larger problem to address, is questioning why your DVR isn't on a telemetry VLAN protected by VPN from the internet, which would essentially mitigate this risk until the bug is fixed.
Re: (Score:2)
So, the computing age is dead, then. All hail the Lords of IP! God save them!
Re: (Score:1)