J Sigmo
Known around here
- Feb 5, 2018
- 996
- 1,336
..."Gentlemen Jackers"...
Haha!
Sorry, my mind is in the gutter today.
..."Gentlemen Jackers"...
What if the OP is in on this car heist plan, he turned off his system and then stole the car. Then come on this form to make a post to show the cops as a distraction.
LOL I was also thinking the same thing.What if the OP is in on this car heist plan, he turned off his system and then stole the car. Then come on this form to make a post to show the cops as a distraction.
The OP's been absent enough from this thread, I wonder if the cops already came to that conclusion.What if the OP is in on this car heist plan, he turned off his system and then stole the car. Then come on this form to make a post to show the cops as a distraction.
Nonsense again. Krack has been repaired. Any modern update router is not vulnerable. Please dont mislead.My comments:-
Does that type of NVR by any chance have an IR Receiver that could have been accessed/operated from outside through a window?
Some NVR's have come with TV style IR remote controls.
The Wi-Fi network will be vulnerable to KRACK KRACK - Wikipedia it is a vulnerability in the WPA2 protocol itself so it no longer really matters how good your WPA2 password and username (used as a P/W salt) are - easy especially with the repetitive network traffic coming from video cameras showing images that mostly have nothing moving on the video.
AFAIK RADIUS uses MD5 encryption for one of its initial handshakes - MD5 is known to be insecure - there is an extension to use with RADIUS to mitigate the MD5 problem - try Diameter (protocol) - Wikipedia or Kerberos (protocol) - Wikipedia it is all a question of picking a style of security vulnerability you can work around.
Was it possible to access the Wired LAN by unplugging a camera to access its Ethernet cable? - is there access control running on the hardwired LAN to prevent any device just being plugged in temporarily instead of a camera?
Did not notice (too lazy to go back and read it again) if Camera passwords had been changed from default.
Did not notice if system is set to record only on motion or continuously - continuous recording is the only way to go (with motion alerts of course).
Using an Internet providers router is almost always a recipe for disaster - they cannot cope with non-stop data traffic.
RF Radio Frequency attack on cameras with Radio Jamming Device (Army Surplus device from a jeep or other vehicle to jam roadside IED's) - do the cameras have metal bodies that have been effectively earthed or are the cameras plastic bodied - the RF would happily travel down that UTP LAN cable and could affect the NVR - that would depend on a thousand variables BUT jamming IAD's works and that also depends on thousands of variables.
UPS Uninterruptable Power Supply - you MUST have one & everything vital for operation MUST be plugged into it - get a big name/brand UPS like APC in a decent size / capacity & NOT the APC Home Office/Domestic versions meaning the Commercial grade.
Have you tested your UPS battery's recently? Meaning unplug the mains and see if the UPS will actually run and power the connected load for say 80% of the run time the UPS is reporting (via its management interface) that it can manage.
But as you guys have already said it could just be the perp looking for excuses to give to local law enforcement.
Nonsense again. Krack has been repaired. Any modern update router is not vulnerable. Please dont mislead.
You really think these car theives unplugged a camera did their thing and plugged it back in all nice? really?
All this is nonsense. Nothing happens.
Part 3 - Wireless Security
In my PROFESSIONAL opinion Wireless and Security are two technologies that oppose each-other dramatically; like hitlers WW2 enigma devices tought the world that you can never be sure if your BROADCASTING your communications to anyone in listening range, despite technology advancements.. Its like trying to keep a conversation private between two people with mega-phones a block apart.
The only acceptable place for a WiFi security device is a portable monitoring device such as your phones/tablets, since your security will not be compromised if those loose connectivity.
Lets go over our wireless security options:
WEP = Cracked quite quickly with enough captured packets; and IP Cams generate a constant stream of them.
WPA = Easily brute forced, if WPS is enabled its basically wide open... Can be hijacked with ease, I can run an access point with same Name/ID and your devices will gladly connect and tell me the password to your network.
WPA-TLS = Only one left standing hasn't been broken; you cant hijack or man in the middle it because of certificate authentication.. needlessly complex for individual users and few WiFi devices even support this.
Did you know anyone can send a deauth packet to knock your cameras off the wireless network? despite encryption? Within 30mins I could make a small hand held device that knocks everything off there wifi networks with parts I have laying about.. check this out: danmcinerney.org
What good is your security camera when anyone could just make a universal remote to "turn it off" when they approach to steal some shit?
same can be said for wireless security sensors, I have a 5w handheld walkie talkie that can broadcast on the same frequencies most GE wireless sensors work on.. If I broadcast noise with that transmitter I am basically jamming out all the little 100mW security sensors for a mile or so.. not to mention my 50w HAM radio that if used nefariously could jam out all wireless sensors to the horizon.
the largest attack vector for your network is going to be YOU, downloading something and infecting your computers on the network and allowing hackers past your firewall.
Like I said; what your imagining is never gonna happen.. whats really going to happen is your going to click on a link and get ransomware that encrypts all this data and then charges you a lot of money to decrypt it again.. because clearly anything on your network can just wreak havoc too your files and your the biggest security issue on the network.
Unless your targeted by a government agency that scenario's not going to happen; because the'll be planting evidence to toss you in Gitmo.. if they want to do this; your not gonna stop em w/a lil network security.
If they break into your wifi they can sit in the safety of their car, or bedroom if its a neighbor and not be standing on top of a latter with a laptop in there hand running a bunch of hacking tools trying to compromise your data [using an ethernet cable].. if you ever find your self in this situation with an idiot james bond, just shoot the motherfucker.
Please stop misleading. There is no known hack for WPA2 on an updated router. It's also important to think a bit when coming to these silly conclusions about what car thieves might be doing.As I already said it could just be a Perp looking for excuses to give local Law Enforcement.
But Wi-Fi WPA3 is on the way because WPA2 alone is no longer enough (just like WPA1 & WEP are nowadays considered security jokes but back in the day they were thought of as perfectly secure - looking back a ludicrous conceit) and Plain Vanilla style RADIUS is getting rickety - it has been a long week so instead of me having to explain it all here is an article that just covers the tip of the WPA2/3 iceberg What Is WPA3, and When Will I Get It On My Wi-Fi?
AFAIK RADIUS uses MD5 encryption for one of its initial handshakes - MD5 is known to be insecure - there is an extension to use with RADIUS to mitigate the MD5 problem - try Diameter (protocol) - Wikipedia OR Kerberos (protocol) - Wikipedia it is all a question of picking a style of security vulnerability you can work around.
RF Radio Frequency attack on cameras with Radio Jamming Device (Army Surplus device from a jeep or other vehicle to jam roadside IED's) - do the cameras have metal bodies that have been effectively earthed or are the cameras plastic bodied - the RF would happily travel down that UTP LAN cable and could affect the NVR - that would depend on a thousand variables BUT jamming IED's works and that also depends on thousands of variables.