Hacking a Tiny Security Camera - VStarcam CB73 Firmware Extraction

Поделиться
HTML-код
  • Опубликовано: 2 дек 2024

Комментарии •

  • @tonik2558
    @tonik2558 4 месяца назад +44

    The amount of high quality content you're putting out is amazing. I love that there's an audience for in-depth cybersecurity stuff

  • @ripleysmith7583
    @ripleysmith7583 4 месяца назад +12

    Love the channel. I was originally electronics technician and my work changed me to an IT guy so this is got the love for all the fun things. Keep up the good work..

  • @danielcgomez
    @danielcgomez 4 месяца назад +51

    I've always been very cautious with all types of IP Cameras ...would be interesting to see what you come up with regarding not only these Chinese cameras ...but also the more 'legit' cameras ...let's see what acronym agencies have their claws into our privacy.

    • @monad_tcp
      @monad_tcp 4 месяца назад +7

      I call them Shodam Cameras.

    • @lifeai1889
      @lifeai1889 4 месяца назад +1

      you can install openipc on the t31 chip, i have this model

    • @minutemadeinc
      @minutemadeinc 4 месяца назад

      ​@@lifeai1889also look at thingino as an openipc alternative

    • @WaffleStaffel
      @WaffleStaffel 4 месяца назад +1

      I'm not the least bit concerned about China. With domestic products, I'm going to assume Moss@d or some Unit 8200 outfit has its grubby mitts all over them.

  • @a97807
    @a97807 4 месяца назад +7

    I think I am literally addicted to your channel.

  • @RoadRunnerMeep
    @RoadRunnerMeep 4 месяца назад +10

    I like the fact that the software actually told you which pin was a bad connection :)

  • @puolukka_hill_0
    @puolukka_hill_0 3 месяца назад +3

    Your videos are fantastic!
    I really love the way you show the whole physical process without delving too much into the theoretical details.
    I already have a grasp on the underlying concepts so just observing your workflow with commentary is wonderful!

  • @kyoteecasey
    @kyoteecasey 4 месяца назад +4

    Great to see your process and tools being used here, you make it look easy! Going to watch the rest of the series over the weekend.

  • @Billy-mu8yu
    @Billy-mu8yu 4 месяца назад +5

    Another great video for sure. My only recurring request would be to make the videos longer. I’d love to see you continue digging into the firmware analysis / exploring the flash contents. I know you’ll make more videos, but it’d be great to be able to watch more of your initial analysis.. keep making the iot hacking videos, we love em!

  • @TheShutterNinja
    @TheShutterNinja 4 месяца назад +6

    Ah, I always enjoy seeing the notice for a new video, it makes the work day go by faster. Thank you for this series.

  • @Tenetri
    @Tenetri 4 месяца назад +3

    I'm hooked on these videos! I've always wanted to reverse engineer Chinese made tech to see what data it sends back to China. I'm really excited to see future videos, keep it up!

  • @rainy-sec
    @rainy-sec 4 месяца назад +3

    Wow, gotta say, im impressed, learn so many new things here, great job!

  • @dingokidneys
    @dingokidneys 4 месяца назад +3

    I'm interested to see how this plays out as you dig deeper into this little device. Good stuff.

  • @AbdelkaderBoudih
    @AbdelkaderBoudih 4 месяца назад +10

    The disable wifi is to save battery, as this can record in the card and trigger with motion

    • @booboo699254
      @booboo699254 4 месяца назад

      It also makes it more difficult to be found (via WIFI signal leakage)

    • @a46475
      @a46475 4 месяца назад +2

      ...or for concealment reasons by not giving away its presence by communicating with another wireless device.

  • @Jeff-ss6qt
    @Jeff-ss6qt 4 месяца назад +4

    I wouldn't discount the libraries too soon. It'd be a good way to hide stuff and have access to absolutely everything passing into them. They are open source, so can be modified to have anything included.

  • @svob97
    @svob97 4 месяца назад +4

    Perfect video man, awesome content, you are explaining your thoughts very well, keep going! Looking forward to the next vid!

  • @drakedorosh9332
    @drakedorosh9332 4 месяца назад +2

    Great choice of subject. I have a few of these surveillance items that are definitely sketchy on some level. Even my fancy bird feeder might just as well been intended to spy on the customer as be used to watch birds. I wish I wasn't just a spectator though. There is so much to learn.

  • @marioruiz5404
    @marioruiz5404 4 месяца назад +2

    Soli Deo Gloria, well said man. Congrats, this hacker garage is awesome.

    • @mattbrwn
      @mattbrwn  4 месяца назад +1

      ✝️👑

  • @ItsAuver
    @ItsAuver 4 месяца назад +2

    Love waking up to a new Matt Brown video notification 😀. I'm looking forward to the binary reverse engineering!

  • @wevecomesofar3825
    @wevecomesofar3825 4 месяца назад +2

    I'm absolutely loving your videos!

  • @MrDennisloi
    @MrDennisloi 4 месяца назад +1

    Awesome, I'm looking forward to the next steps!

  • @xDMG15x
    @xDMG15x 4 месяца назад +4

    Please make a video when you reverse those binaries. The firmware extraction part is cool but it’s not always clear what the goal of extracting it is. I liked the netgear router one because discovering the passwords is a practical reason to want the firmware.

    • @mattbrwn
      @mattbrwn  4 месяца назад +5

      Video drops Wednesday of this

  • @JuanesChiwirosky
    @JuanesChiwirosky 4 месяца назад +2

    God I love reverse engineering videos 🎉🎉🎉

  • @al_lazy3519
    @al_lazy3519 4 месяца назад +2

    I think the wifi switch is to use that as some sort of spy camera and save battery, since it has a micro sd slot.

  • @luciopaiva
    @luciopaiva 4 месяца назад +3

    Very interesting video, thanks!

  • @6LordMortus9
    @6LordMortus9 4 месяца назад +1

    Can't wait to see an update :)

  • @Tish0eX
    @Tish0eX 4 месяца назад +1

    Nice content as always. You can check some cheap Chinese drone cameras also like Eachine E58. They have wifi camera but can be connected only to their proprietary app so if you can read/modify the firmware they can be more versatile.

  • @sw3nlab
    @sw3nlab 4 месяца назад +3

    Неплохо Мэт. Молодец. Теперь осталось собрать свой evil/autoupdatechek под MIPS протестировать в QEMU , запаковать всё обратно и залить обратно в чип 😅

  • @m0rjjj666
    @m0rjjj666 3 месяца назад

    I just discovered your channel. I am a software developer and DIY electroics is my hobby. The quality of your content is just amazing. I have a bunch of IoT devices that are cloud based, but they are still connectced to my local hosted home assistant. Would be could to follow along your journey and to hack my own devices.
    Thank you

  • @raspberrypie1983
    @raspberrypie1983 4 месяца назад +1

    Love to see it, when people do exactly what i would do with this things

  • @danialothman
    @danialothman 4 месяца назад +1

    that is super cool Matt👍

  • @tweebs1
    @tweebs1 4 месяца назад +1

    Really enjoy these. My first EPROM reader/writer used a similar ZIF socket but you needed a UV light to erase the chip. Any recommendations on a decently priced microscope? My eyes are old too...

  • @Dr.Schiwago
    @Dr.Schiwago 4 месяца назад

    Very cool, learning new tricks is very cool. Thanks man!

  • @akillercaterpiller
    @akillercaterpiller 3 месяца назад

    Absolutely fascinating. Thanks for sharing!

  • @isaacclark9825
    @isaacclark9825 4 месяца назад +2

    Is it common for the flash to be unencrypted? Great content!!!

    • @mattbrwn
      @mattbrwn  4 месяца назад +2

      Yes it's usually unencrypted. There are some devices out there that do encryption but it's a hard thing to get right on embedded devices

  • @aot2002
    @aot2002 4 месяца назад +1

    Very interested in seeing more ip cameras hacked and figuring out where they send data

  • @mohammadrazavi9058
    @mohammadrazavi9058 Месяц назад

    I believe having On/Off switch for Wi-Fi is amazing from Wireless security perspective

  • @ripplerxeon
    @ripplerxeon 4 месяца назад +1

    I really Enjoyed it

  • @Veptis
    @Veptis 4 месяца назад +1

    I always wondered how these "hacked IP cam" videos ended up on the web... But if people end up putting them in their bedrooms - I guess that's their bad to some degree?

  • @felixcosty
    @felixcosty 4 месяца назад

    Thanks for the video.
    What I always wanted to know is can the firmware be modded, put back on the device and make it you own, with out all the report back to home?

  • @The_Real_Grand_Nagus
    @The_Real_Grand_Nagus 3 месяца назад

    If you're just looking for what the device is doing on the network and where it's sending data, wireshark may be a better option. You can configure your router so all the packets get sent through your Linux host as a gateway. Also the "autoupdate" binary is probably something that checks for and installs updates to the firmware. I would be suspicious if it does more, but I wouldn't automatically assume so.

  • @EzphoneLinuxleszbian-yb5pr
    @EzphoneLinuxleszbian-yb5pr 3 месяца назад

    i think i got a similar camera from looting, idk how to get it working tho as it doesnt have any markings, this video is super cool showing off how it's builded up

  • @ESEben10
    @ESEben10 4 месяца назад +1

    Great episode!

  • @Trick_in_hat
    @Trick_in_hat 4 месяца назад

    Very interesting content, helps me better understand how it all it's together.

  • @namesurname201
    @namesurname201 4 месяца назад +1

    Thanks ❤

  • @charleshines5700
    @charleshines5700 4 месяца назад +1

    I can imagine someone using a thinner pad where the battery is and using a bigger battery. It wouldn't surprise me if someone did it already really.

  • @peytonk7367
    @peytonk7367 4 месяца назад

    How hot does the hot air gun have to be for it to work? I have a hot air gun I could use but I don't know if it's hot enough.

  • @miked5444
    @miked5444 4 месяца назад

    Wouldn't the address' in autoupgradecheck be primarily for OTA firmware updates?

  • @KSPseiko
    @KSPseiko 4 месяца назад +2

    I don't believe battery I saw on the video has 2000 mAh capacity - as stated by manufacturer

  • @clearheadedness
    @clearheadedness 4 месяца назад

    can this be used to find a away to use those cameras locally without a Chinese server connection?

  • @PetrVr
    @PetrVr 4 месяца назад +1

    Just in a process of reversing different camera that sells where I am for good money. I was hoping that it will have similar chip that yours have T__ of MIPS architecture. Since I was planning to run Thingino firmware on it. Thingino is pretty cool project though. You might be interested in it. Anyway... Mine is running ARM AK3918 SoC, so Thingino firmware is not an option. So I am looking for a way how to stop it from sending data to China and use something like RTSP on LAN only.

    • @309electronics5
      @309electronics5 4 месяца назад

      What does it say on boot if it has a uart port? I had a tuya camera where i disabled the tuya init script and enabled telnet and rtsp

    • @PetrVr
      @PetrVr 4 месяца назад

      @@309electronics5 I Kinda went head on with dumping the firmware first. What you are mentioning should be possible, since there is some sort of config file that lists all services and other options like resolution etc., including RTSP with bool option next to it. I didn't yet have time to analyze device while it's running. Might get to do it later this week. Though I am hoping to have some option for modifying the firmware and either removing all embedded URL's the camera tries to talk to or I might try to just firewall-block all traffic to WAN coming from the camera, though I am not sure how that would work.

    • @bigdfig6083
      @bigdfig6083 3 месяца назад

      That will work exactly as you stated. Camera nic has xyz ipaddy and ALL packets from said ip get dropped at the fw. If you WANT it to send traffic through fw set rule for specific ip at other end though I would suggest allowing certain inbound traffic from explicitly listed addresses

  • @anominaty
    @anominaty 4 месяца назад +1

    Hi can you reverse engineering a jiofi 3
    Convert it into a wifi repeater
    The use of old technology its a good idea

  • @Titanek
    @Titanek 4 месяца назад +1

    Wiggling.. Is that the small-scale version of "percussive maintenance"? :D

    • @mattbrwn
      @mattbrwn  4 месяца назад +1

      very scientific here on this channel :D

  • @vj7910
    @vj7910 3 месяца назад

    Good quality video..Cheers

  • @joelsexton5594
    @joelsexton5594 4 месяца назад

    I've literally seen Hikvision cameras start opening ports on firewalls for inbound traffic with UPNP. I'm interested in what comes of this firmware.

  • @a46475
    @a46475 4 месяца назад

    I notice what appears to be a memory card slot so that could explain WiFi on/off switch.

  • @dzxgame914
    @dzxgame914 4 месяца назад

    Great skills, I feel at home with most of what u doing, amazing, thank you

  • @PlayerOne1999
    @PlayerOne1999 4 месяца назад

    Why the frimware you extracted is in readable form?

  • @samuraidriver4x4
    @samuraidriver4x4 4 месяца назад

    Was expecting it to phone home to Baidu but Alibaba also checks out.😁

  • @Melds
    @Melds 4 месяца назад

    Why do all of these devices go to tencent and alibaba? Are they like the AWS of China or are they involved with all of these hardware platforms?

  • @mynamesgus4295
    @mynamesgus4295 4 месяца назад +1

    amazing video man

  • @VoidFrost
    @VoidFrost 2 месяца назад

    Why dump the firmware to analyze the file system BEFORE attempting to gain a shell? Wouldn't it make more sense to attempt to get a shell first?

  • @junior88fan64
    @junior88fan64 4 месяца назад

    Well done Brainiac

  • @74357175
    @74357175 4 месяца назад

    Any decent IP cameras with open firmware?

  • @Dnsx_plus
    @Dnsx_plus 4 месяца назад

    Why not just monitor network traffic by using some proxy kind of like burpsuite instead of having to reverse the binary or extract the firmware ?

  • @drooplug
    @drooplug 4 месяца назад

    What temperature do you use to desolder?

  • @ShadyNetworker
    @ShadyNetworker Месяц назад

    Wait, so, how in the hell does the "Flash read" actually work?
    Can you instruct those chips to simply send all onboard data or whats going on there?

  • @dexopt
    @dexopt 4 месяца назад

    i just love seeing linux on tiny chips !

    • @309electronics5
      @309electronics5 4 месяца назад

      A large portion of the embedded world runs on Linux. Just shows how important and usefull Linux really is

    • @dexopt
      @dexopt 4 месяца назад

      @@309electronics5 agreed 💯. its an amazing thing really. Even my printer runs on it.

  • @ff0x
    @ff0x 3 месяца назад

    Just came across your channel - good stuff. You definitely deserve this comment and a like to help your algorithm. :)

  • @benneh242
    @benneh242 4 месяца назад

    Hey are you running xgpro under wine? It really won't play well for me that way and I've had to resort to a vm...

    • @markwhidby5148
      @markwhidby5148 4 месяца назад +1

      He said he did on an earlier video - the one for the fake Chromecast device.

  • @Channel-tm8ud
    @Channel-tm8ud 4 месяца назад

    Can't you read the firmware with the chip in place?

  • @hugovangalen
    @hugovangalen 4 месяца назад

    I guess that by leaving the WiFi off, it won't accidentally connect to an open AP and reveal its presence. Or just to save power.

  • @kikihun9726
    @kikihun9726 4 месяца назад

    looks like a simple remote access platform where you can download the clips to your phone without taking a risk to open your router port to the internet side. But that hardcoded ip address will fail overe the years if they go out of business.

  • @309electronics5
    @309electronics5 4 месяца назад +2

    My tuya camera also has this ingenic t31 chip. I have also seen them a lot and it contains a riscV mcu core along side the mips!
    I managed to even disable the tuya app stack and enable telnet and rtsp!

  • @enricocialdini6194
    @enricocialdini6194 3 месяца назад

    what did you put on the chip to detach it?

  • @Misimpa
    @Misimpa 4 месяца назад

    Cool but what about other projects?)

  • @WWFYMN
    @WWFYMN 4 месяца назад

    Hello, could you modify the firmware so that it is easier to get shell, maybe add ssh if it's not enabled or change the password if it has one

    • @mattbrwn
      @mattbrwn  4 месяца назад +6

      Video of getting a shell drops Wednesday 😎

    • @WWFYMN
      @WWFYMN 4 месяца назад

      @@mattbrwn ❤

  • @UndeadAlex
    @UndeadAlex 4 месяца назад

    When in doubt, just wiggle it xD

  • @alpha_pixel_
    @alpha_pixel_ 4 месяца назад

    Try to hack into ezviz cameras. Check if it is compatible for custom firmware.

  • @VantaCanadaBlack
    @VantaCanadaBlack 3 месяца назад

    These can record locally to sd card when you turn wifi off.

  • @monad_tcp
    @monad_tcp 4 месяца назад

    9:46 that ZIF socket is really bad

  • @s80heb
    @s80heb 4 месяца назад

    Can you hack a ledger nano

  • @FreshaThen
    @FreshaThen 4 месяца назад

    I need to know your OS! 😅

  • @xiv3r
    @xiv3r 4 месяца назад

    How to unlock eeprom that has been permanent locked by Protection Lock Bits value 1

  • @masterman1502
    @masterman1502 3 месяца назад

    IPs for Alibaba and Tencent are probably just their cloud services, so probably the camera vendor is hosting stuff there

  • @phuo2185
    @phuo2185 4 месяца назад

    can you pls make a video on synology tC500 camera , pls , pls , pls

  • @rhettpete
    @rhettpete 3 месяца назад

    Nice one

  • @tente-outro
    @tente-outro 4 месяца назад

    let's watch

  • @xenoxaos1
    @xenoxaos1 4 месяца назад +1

    All my cameras are on a vlan that doesn't have any external access...

    • @mattbrwn
      @mattbrwn  4 месяца назад +1

      No egress? Or only no ingress?

    • @al_lazy3519
      @al_lazy3519 4 месяца назад

      I know that might be a bit much, but do you have any material on that? I wanted to do something similar but when going beyond the settings of routers networking gets difficult

    • @xenoxaos1
      @xenoxaos1 4 месяца назад +3

      @@mattbrwn no egress or ingress... Only access to my other vlans. Dns resolves every domain name to a local ip. Also forwarding ntp to a local ntp server. My wifi ap has the ability to assign different ssids to different vlans. One SSID is just typical. One has dhcp with a set dns to pinhole... The third is basically a black hole that can only access IPs on first VLAN

    • @xenoxaos1
      @xenoxaos1 4 месяца назад

      @@al_lazy3519 you can't really do this with a normal router. One got an edgerouter pro 8 and a unifi ac pro access point and a 48 port Cisco PoE managed switch.

    • @PetrVr
      @PetrVr 4 месяца назад

      @@xenoxaos1 That is pretty cool setup. I am in process of replacing all my routers with OpenWRT capable routers, which to my knowledge supports VLANs. Though I havent thought about blocking all the WAN traffic on the VLAN specifically for the IPCams purposes.
      Just by an accident you don't have any blog article showing how you did that? :-)

  • @George-ec7ez
    @George-ec7ez 4 месяца назад +1

    Nice Haircut

    • @aarong9378
      @aarong9378 4 месяца назад

      Don't be a jerk.

    • @George-ec7ez
      @George-ec7ez 4 месяца назад

      @@aarong9378it wasnt meant as an insult, but I guess compliments dont translate well over the internet

  • @КонстантинФаер-и1ц
    @КонстантинФаер-и1ц 4 месяца назад +1

    о, эту базу мы смотрим

  • @yaswanthkumarkoppanathi8074
    @yaswanthkumarkoppanathi8074 4 месяца назад

    Is that arch linux

  • @akshita_9597
    @akshita_9597 4 месяца назад

    Try hacking Ring video doorbell

  • @спасибки-у4к
    @спасибки-у4к 4 месяца назад

    where google chromecast part 2?

  • @lifeai1889
    @lifeai1889 4 месяца назад

    try to install openipc

  • @mirceabereveanu8943
    @mirceabereveanu8943 Месяц назад

    GGs

  • @the_schreiber
    @the_schreiber 4 месяца назад

    the devices in not using TLS so you can easily intersect the traffic with burp and see what exactly is being sent

  • @Diddle546
    @Diddle546 4 месяца назад

    Do something more intense like a pcb active tamper alteration detection

  • @FocusAccount-iv5xe
    @FocusAccount-iv5xe 4 месяца назад

    +

  • @maxdouglas5239
    @maxdouglas5239 4 месяца назад

    First comment 🎉

  • @cmdblock
    @cmdblock 4 месяца назад

    thats average