1、 In many cases, attackers usually scan the protocol and port of the camera, and then browse and access the page of device management. If they fail, they will choose a more complex way to scan, so as to find the camera and imitate the authorized user. It is worth noting that attackers do not need software vulnerabilities to attack cameras. Once there are security vulnerabilities in many cameras or other connected devices, they can become the entry point for hacker attacks. From this point of view, the monitoring project can be seen that if the camera product is implemented at the beginning of design and a certain security protection mechanism is built, it is not easy to exploit these vulnerabilities even if the camera is found later. At the same time, the equipment manufacturer will push information in time and upgrade the security level like other network devices;
2. In addition, it is common for attackers to exploit the known software vulnerabilities of cameras in open source or third-party libraries. For example, web servers are relatively fragile components, and you can usually see news about hackers using the vulnerabilities of third-party Web servers to access cameras;
3. The attacker uses command injection attack, which means that because the web application does not filter the data submitted by the user strictly, the hacker can submit the data to the web application by constructing a special command string, and use this method to execute external programs or system commands to attack, Illegally obtain data or network resources, etc. In other words, as long as developers filter data well and make good use of the white list, they can avoid this attack.
First, modify the initial password. At the same time, it is worth noting that in addition to the problem of the initial password, manufacturers may also have "hidden" user names and passwords. Their original meaning is mainly used for product testing, but once they are discovered and used by hackers, it will also have a great impact; Second, timely pay attention to the information pushed by manufacturers and do a good job in equipment safety upgrading.
Of course, this is only the basic work in the face of unknown network challenges. Attackers can bypass the attack, that is, access the camera through weak security authentication. In more complex cases, they can also use malware to use code vulnerabilities in the camera to load other virus files and attack other targets.
Wechat QR code