Evaluating IP Surveillance Camera Vulnerabilities - 2 PDF
Evaluating IP Surveillance Camera Vulnerabilities - 2 PDF
Research Online
2017
Zhuang Tian
Auckland University of Technology
Recommended Citation
Cusack, B., & Tian, Z. (2017). Evaluating IP surveillance camera vulnerabilities. DOI: https://doi.org/
10.4225/75/5a84efba95b46
DOI: 10.4225/75/5a84efba95b46
Cusack, B., & Tian, Z. (2017). Evaluating IP surveillance camera vulnerabilities. In Valli, C. (Ed.). (2017). The
Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan
University, Perth, Western Australia. (pp.25-32).
This Conference Proceeding is posted at Research Online.
https://ro.ecu.edu.au/ism/202
EVALUATING IP SURVEILANCE CAMERA VULNERABILITIES
Abstract
Hacking of IP surveillance camera systems came to public attention in 2016 when the high bandwidth and resources
were exploited for a massive DDoS attack that affected one third of all US Internet services. A review of previous
studies show that a vast number of IP cameras have been hacked because the default usernames and passwords
have not been changed from the factory defaults. In this research we asked, What are the vulnerabilities of an IP
surveillance camera? The purpose of the study was to provide identification of vulnerabilities and guidance for
the protection of surveillance camera systems. The research shows that the tested surveillance camera had many
vulnerabilities and that there is urgency for distributing alerts and best practice guidelines.
INTRODUCTION
Closed Circuit Television (CCTV) systems have proliferated in businesses and for private use. The surveillance
systems are relatively inexpensive and provide multiple sensors that feed information back to a centralised
processing station and monitoring screens. The application is for monitoring assets and human behaviour for risk
management. The sensors provide different data types that include visual, audio, infrared, and other spectrum data.
Monitoring may proceed by human observation, automation, archival mapping, or a combination of these. Many
systems have software to assist human decision-making, and resource management systems to optimise the cost
of surveillance against the benefits it may deliver. Research has shown that these CCTV surveillance systems have
critical points of failure (Costin, 2016). In addition, Ozkan (2016) shows that over 100,000 wireless Internet
Protocol (IP) cameras in the research sample had little or no information security protection. Others show that
surveillance cameras from 79 vendors are vulnerable to Remote Code Execution (RCE) (Kirk, 2016; Costin, 2016).
The security problem is increased by vendors are selling IP cameras using the “white labelling” business model
with the same firmware developed by the same company across the product range and with unprotected RCE. The
vulnerability allows an attacker to seize control of the camera for manipulation. Manipulation can have several
features, such as, data seizure, mechanical manipulation, anti-forensic data planting, exploitation of the bandwidth
resource, end-user deception, and zombie exploitation (McKee, et al., 2017). A significant weakness is that most
IP cameras only log authenticated requests and have no traces on the camera of user activity or unique
identification. Hence, an attacker can be anonymous while acquiring real-time video streams, archived footage;
email, FTP, other credentials, and access to the system resource controls. The significant vulnerability grants an
attacker invisibility and the ability to host malware; run arbitrary software such as botnets, proxies and scanners;
and create backdoors for future access. Consequently, a CCTV system is generally available to unauthorised
control, and the system itself, can sponsor attacks on other systems (Coole, et al., 2012; Cuputo, 2014; Costin,
2016). In this paper, we test an out-of-the box camera to identify security vulnerabilities.
BACKGROUND
On 21 October 2016, a massive DDoS attack against Dyn, a domain name system (DNS) provider, broke a large
portion of the Internet, causing a significant outage to hundreds of websites and services (CCTV, 2017). Although,
Dyn did not disclose the actual size of the attack, but it has been speculated that the DDoS attack could be much
bigger than the one that hit French Internet service and hosting provider OVH that peaked at 1.1 Terabytes per
second (TBps), which is the largest DDoS attack known to date (Smith, 2013). The attack was caused by a botnet
that consisted of 100,000 devices infected by malware named Mirai. The Mirai malware targeted Internet of Things
(IoT) devices such as IP cameras and digital video recorders (DVR) that have weak default passwords, making
them easy to infect (Wu, et al., 2010; Zanella, 2014; Kirk, 2016). A similar study by Minin (2015) found that a
malicious attacker took control of the cameras remotely and controlled movement, redirected the video feeds, and
worked out the password for the wireless network the device was connected. The owners of the surveillance camera
systems were not aware of the system compromise and the use for a massive attack. A similar study analysed
Motorola’s Focus 73 (Minin, 2015) outdoor security camera. Images and video taken by the camera can be
delivered to a mobile phone application. One attack showed how it is possible to scan for cameras connected to
RESEARCH METHODOLOGY
The aim of this research was to answer the research question: What are the vulnerabilities of an IP surveillance
camera? To answer the question, the research has six phases (Figure 1). These phases include literature review,
system setup, pilot testing, data collection, data analysis and its comparison with results of previous research.
Different research phases employ different research methods. The literature review section, for example, provided
understanding for the work of different authors and their recommendations for future research. This phase
constitutes the qualitative part of the study. The data collection, on the other hand, included a pilot study and
experiment conducted by testing the camera by trying different exploits. The system setup phase set up the
equipment for the field trials. These rational phases constitute the quantitative part of the study. The final phase
compares the results obtained from both parts of the study in a mixed methods approach (Bryman, 2012).
Pilot Test
After setting up the IP surveillance system network, a pilot run was made to configure and test the camera
functionalities as well as network connections amongst all the devices. The user can connect to the IP camera
either through Windows Explorer by entering its IP address in the URL field; or use GeoVision DMMultiView
client software to connect the camera’s DVR by selecting the host IP address and type of device. A User can use
GvIP Device Utility to find the IP camera IP address. GV IP Device Utility is an application software to help the
user to manage IP cameras, update their firmware, identify them by their IP addresses within a local area network
(LAN) or backup and restore their settings (Figure 3).
Figure 3. GeoVision DMMultiview User Authentication and GeoVision DMMultiview Live Capture
The attacking device ran Kali Linux, so we also needed to test whether it can connect to the IP camera in the
pilot study, and to ensure a penetration test is possible using preinstalled tools from the attacking device.
Data Management
The tools Angry IP Scanner, WireShark, ophcrack, Burpsuite and Cain & Abel, were tested in the pilot study for
performance and functionality. Each has their own built-in data processing ability as specified by the distinct
RESEARCH FINDINGS
Angry IP Scanner and Nmap were used to collect information about the target system, such as its IP address, media
access control address (MAC), manufacturer and server information. The Angry IP Scanner is a fast lightweight
cross-platform IP address and port scanner; used to scan IP addresses in any range. It includes information on any
of the ports by simply pinging each IP address to check if it is alive, then optionally resolving its hostname,
determining MAC addresses and the vendor (Figure 4).
REFERENCES
Bojinov, H., Bursztein, E. & Boneh, D. (2009). XCS:Cross channel scripting and its impact on web applications.
The 16 ACM Conference on Computer and Communication Security (pp. 420-431). Chicago, IL, USA.
Bruschi, D., Ornaghi, A. & Rosti, E. (2003). S-ARP: a secure address resolution protocol . The 19th IEEE
Annual Computer Security Applications Conference (pp. 66-74).
Bryman, A. (2012). Social research methods. Oxford: Oxford University Press.
Caputo, A. (2014). Digital video surveillance and Security second edition. London: Elsevier.
CCTV Calculator. (2017). Vulnerability database. Retrieved from CCTV Calculator:
https://www.cctvcalculator.net/en/knowledges/vulnerability-database/
Coole, M., Woodward, A. & Valli, C. (2012). Understanding the vulnerabilities in Wi-Fi and the impact on its
use in CCTV systems. The 5th Australian Security and Intelligence Conference (pp. 36-43). Perth, WA,
Austrailia : Edith Cowan University.
Costin, A. (2016). Security of CCTV and video surveillance systems; Threats, vulnerabilities, attacks, and
mitigations. The 6th International Workshop on Trustworthy Embedded Devices (pp. 45-54). Vienna,
Austria: ACM.
Gotham Digital Science. (2012). Using metasploit to access standalone CCTV video surveillance systems.
Retrieved from Gotham Digital Science: https://blog.gdssecurity.com/labs/2012/5/15/using-metasploit-to-
access-standalone-cctv-video-surveillanc.html
Kirk, J. (2016). Security camera riddled with flaws that let attackers hack your video and your network.
Retrieved from PC World: https://www.pcworld.com/article/3030014/security/study-of-another-ip-
camera-reveals-serious-problems.html
Kyaw, A., Tian, Z. & Cusack, B. (2016). Wi-Pi: a study of WLAN security in Auckland City. International
Journal of Computer Science and Network Security, 16(8) 68-80.
McKee, D., Clement, S., Almutairi, J. & Xu, J. (2017). Massive-scale automation in cyber-physical systems:
Vision & challenges. IEEE 13th International Symposium on Autonomous Decentralized System (pp. 5-
11). Bangkok, Thailand.
Minin, V. (2015, June 10). GeoVision (GeoHttpServer) webcams - Remote file disclosure. Retrieved from
Exploit Database: https://www.exploit-db.com/exploits/37258/
Őzkan, S. (2016). Geovision: Security vulnerabilities. Retrieved from CVE Details:
https://www.cvedetails.com/vulnerability-list/vendor_id-2385/Geovision.html
Smith. (2013). Hacks to turn your wireless IP surveillance cameras against you. Retrieved from CSO Online:
http://www.networkworld.com/article/2224469/microsoft-subnet/hacks-to-turn-your-wireless-ip-
surveillance-cameras-against-you.html