Intercept Images from a Security Camera Using Wireshark [Tutorial]

preview_player
Показать описание

How to Use Wireshark to Hijack Pictures from Wi-Fi Cameras

Wireshark is a powerful Wi-Fi sniffing tool for intercepting communications between devices on a network. Today, we'll show you how to intercept images from a security camera on this episode of Cyber Weapons Lab.

Most people watching security cameras rely on the usually insecure HTTP web server that's running on the camera in order to watch the security feed or change settings on the camera. This is commonly HTTP rather than HTTPS, and most people don't really bother to make the distinction or prefer to buy one that's secure because they don't understand the risk that it poses.

Now, on a network that has security, like a WPA network that has passwords, if you just have one person on the network, you're probably going to be okay if you have a pretty strong password and nobody can see the traffic that's going through it.

But the second somebody else gets your password or if it's on an open or shared network, then you can really start to get in trouble because anybody can see these insecure HTTP requests over the network.

What this boils down to is we can actually see what the person is seeing on their screen, so if they're watching the security camera or if they have a dedicated monitor set up to watch it somewhere in their business or home, then we can literally just download the packets as they're transferring from one device to another, and then use Wireshark to export them and look at them on our screen.

Follow Null Byte on:
Рекомендации по теме
Комментарии
Автор

So many stickers on the laptop. Definitely a hacker

redzaizudin
Автор

Everyone should really have a friend like you . Perfect example of the pen is mightier than the sword. I love your channel man. Keep up the amazing work.

KhangLe-fewq
Автор

Make a backup of your videos i heard YouTube is removing hacking content

AmeerHamza-cykm
Автор

you guys are a god send, i have learned so much from watching your channel content, please keep doing what you guys do, much respect

seosamhohaodha
Автор

I'm a Security/AV Integrator and constantly I am asked about Wireless Security and CCTV. It's fun to show people how easy it is to breach the Network.This gives me a chance to sale them a better CCTV System, Security Panel and at times a better Network Router such as a Netgate pfSense Box. Now I can tote around a crummy Wi-Fi Camera and with this Wireshark method to pull up images to really scare the "pro wireless" users. You would be surprised how many people think Wi-Fi is better then a hardline. The scary thing is how many people think they're secured but not even close.

lelandclayton
Автор

Interesting wireshark usage, thanks for the tut. The bit about grabbing a 4 way handshake and then jumping to entering the WPA password into wireshark is leaving out the laborious and computationally expensive process of having to crack the handshake in order to get the password. Without that very important and difficult step (unless you have a nice password cracking rig and some inside info on what the password might be) the rest will not be so easily accomplished. Still, a very nice vid. Thanks Mr. Byte :)

techemically
Автор

Now I can finally figure out whose been stealing my sandwiches from The hub fridge

xdelic
Автор

This is cool. It's even more cool that you can do all of this with only those stickers infront of you!

gg-oylb
Автор

Great tutorial! Also, blurring MAC addresses was a good move, but keep in mind that geolocation can be done with SSIDs as well.

JacobZigenis
Автор

So this is what Dokkaebi and Vigil specialize in, I see...

dkmodder
Автор

Who else didn’t bother to attempt to ddos nullbytes ip knowing he could potentially destroy us at any given moment?

priime
Автор

Funny thing to know: you can hack cams just knowing the model and so the firmware, then use some reverse engineering to the downloaded firmware and you can get root ssh access! :) Try this!

mty
Автор

'insecure security cameras'
you'd think this wouldn't be as much of a thing as it is
but its very, very, very much a thing lol

grahamelliott
Автор

great video! you keep mentioning the handshake required after deauthentication; could you possibly provide a step-by-step outline of that process? everything was clear cut and im quite a novice, except for this required step in the tutorial. thanks a bunch!

opalatrium
Автор

pls make a Spotify playlist of your background music (and music of the same style)

icetray
Автор

‘’From insecure wifi security cameras’’

splintrsec
Автор

Do you have to save the handshake anywhere? Or does Wireshark automatically know you have it?

therrrmite
Автор

Everytime I watched his videos I always thought my playback speed is not normal HAHAHa

riqyenl
Автор

this is way NullByte us one of my favorite channels .... great job

thehound
Автор

Please Make A Video How To Do MITM Attacks

YoutubeShorties