Decrypting SSL to Chinese Cloud Servers - Hacking the VStarcam CB73 Security Camera

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 ม.ค. 2025

ความคิดเห็น • 409

  • @mattbrwn
    @mattbrwn  5 หลายเดือนก่อน +624

    UPDATE: my camera account was pwned within 2 hours of the video going live. 😎Well done internetz

    • @fakename2123
      @fakename2123 5 หลายเดือนก่อน +12

      LOL

    • @PyschoHD
      @PyschoHD 5 หลายเดือนก่อน +5

      🤣🤣🤣🤣🤣🤣🤣🤣

    • @sakuchi4914
      @sakuchi4914 5 หลายเดือนก่อน +5

      well that was quick lol

    • @kuyayan
      @kuyayan 5 หลายเดือนก่อน

      Dum Spiro Spero my friend. Soli Deo Gloria indeed. Nice phrase btw!

    • @Darkk6969
      @Darkk6969 5 หลายเดือนก่อน +10

      2 hours? You guys are slackin. 🤣

  • @khx73
    @khx73 6 หลายเดือนก่อน +700

    Helped a friend set up a 6 camera system. He bought 4 reputable cams and two cheapies. We configured all cams to shut off any and all cloud services. All were set with static IP, gateway, NTP server, and NO dns. The four reputable ones generate zero unexpected traffic. The two cheapies? Constant flow of connection attempts to cn owned IPs, as well as dns requests to google DNS IPs (apparently hard coded). Nothing goes anywhere since they're on a segregated VLAN with no outside access... but the firewall packet counters are in the millions.

    • @reabstraction
      @reabstraction 6 หลายเดือนก่อน +65

      Probably spyware selling what you do and recording *that*

    • @zyghom
      @zyghom 6 หลายเดือนก่อน +17

      I did the same, for all my Reolink cameras

    • @khx73
      @khx73 6 หลายเดือนก่อน +15

      @@zyghom Do they stay quiet on the network? My Hikvisions do.

    • @zyghom
      @zyghom 6 หลายเดือนก่อน +24

      @@khx73 they don't stay quiet but firewall does not let any traffic from them outside my LAN ;-)

    • @khx73
      @khx73 6 หลายเดือนก่อน +11

      @@zyghom Dirty little things... haha

  • @is350ace
    @is350ace 6 หลายเดือนก่อน +277

    This is my favorite newly discovered TH-cam channel. I watch every video as soon as they drop. Keep it up Matt!

    • @tente-outro
      @tente-outro 6 หลายเดือนก่อน +1

      just like me

    • @kateshiny6187
      @kateshiny6187 6 หลายเดือนก่อน +1

      🙋🏻‍♀️

    • @paerrin1
      @paerrin1 6 หลายเดือนก่อน +1

      Same here! I get super excited when I see a video drop 😂

    • @zetagaming8322
      @zetagaming8322 6 หลายเดือนก่อน +1

      same 😂

    • @andreuuu68
      @andreuuu68 6 หลายเดือนก่อน

      How cute they think+ 5g (jj=. P😊

  • @the_beefy1986
    @the_beefy1986 6 หลายเดือนก่อน +185

    TLS encryption, in this case, is probably more about obscuring what this device is doing versus protecting the user's data.

    • @TechTusiast
      @TechTusiast 5 หลายเดือนก่อน

      What did you expect from chinese products? For younger people, watch the beginning of "Three body problem" and remember that unlike in Germany after WW2, this regime was never over thrown or made responsible for what it did and still is doing. This message will likely be removed after CCP propaganda machine launches multiple feedbacks to TH-cam demanding it and YTs algorithm removes the message.

  • @arejay988
    @arejay988 6 หลายเดือนก่อน +42

    this is the content we need more of, keep it up matt this is legitimately great stuff

  • @zymurgist8844
    @zymurgist8844 6 หลายเดือนก่อน +96

    This is some really cool content. I would highly recommend a brief intro with some bullets on what you are going to attempt and then as part of the outro, provide a summary of what you discovered. It would really help tie everything together.

    • @is350ace
      @is350ace 6 หลายเดือนก่อน +13

      I like this suggestion too. I feel like he always addresses his thinking process as he goes, but a quick outline up front may be helpful.

    • @j0hnny_R3db34rd
      @j0hnny_R3db34rd 5 หลายเดือนก่อน +1

      I would highly recommend they keep doing their own thing how they want, when they want. I'm here to watch, not exert control over the Internet.

  • @CarneyAsada101
    @CarneyAsada101 6 หลายเดือนก่อน +27

    You are wonderful! A couple of months ago my work was throwing out old IP cams and I asked to have one because I was super interested in hooking it up and digging into everything that’s on it that the user doesn’t get to typically see. The camera is a Vstarcam. How lucky am I that an expert like yourself is doing exactly what I (an absolute amateur) was wanting to do on this brand of ip cam!

  • @Unit-zv6zh
    @Unit-zv6zh 2 หลายเดือนก่อน +1

    Man these videos are great, love how you explain your steps with enough detail to follow along. Great stuff.

  • @kuyayan
    @kuyayan 5 หลายเดือนก่อน +5

    You are a natural teacher as well. I hope you many, many subscribers!

  • @cozzm0AU
    @cozzm0AU 6 หลายเดือนก่อน +31

    I’m not a hacker and have zero Linux knowledge but this stuff and how you present it is fascinating to me regardless. Thanks for taking the time to setup these demonstrations and so clearly explain what is a very deep understanding of these devices.

  • @mjmeans7983
    @mjmeans7983 6 หลายเดือนก่อน +60

    What i'm interested in is when firmware detects that it has no internet connection (because I put it in a network jail), but that triggers routines in the device to escape the jail by automatically connecting to any nearby open WiFi without being told to. Or having firmware that can entering promiscuous mode to watch and analyze other devices for te purpose of masquerading as those devices after it sees it's silent for 30 minutes or so in order to find a way out of its jail.
    I'm concerned with so-called security cameras that provide no actual data security, or worse actively try to evade attempts to make them secure. It's not a matter of whether your cloud data is secure, but when it becomes insecure and whether you will ever know that it has happened.
    Cloud data means it's stored (potentially indefinitely) on someone else's computer and used for whatever purposes they want to use it for. And you have no recourse if they lied to you in the first place, or later abuse that trust whether it be willful or by neglect.

    • @monad_tcp
      @monad_tcp 5 หลายเดือนก่อน +5

      that's why I have to wrap the device in tinfoil, so the WIFI doesn't work

    • @tlxyxl8524
      @tlxyxl8524 5 หลายเดือนก่อน +9

      That’s technically possible. But in practice, I don’t think most companies producing these cheap cameras are doing that. Not only does it significantly increases the software R&D cost, they have little to gain from, since most people using it are not experts in security, and simply sending data from device to their server is enough to “monitor their customer” (if that’s their goal). I bet most of their target customers don’t know how to setup a Firewall on their router.
      What you have described is more like an attack organized by state-backed hackers, who knows their device is likely to be placed in an airgapped environment or some sort. But let’s be honest, any high security facility won’t use WiFi security cameras at all. So a state backed hacker group will likely spend their time on something else that is more effective.

    • @BLKMGK4
      @BLKMGK4 5 หลายเดือนก่อน +3

      Have you identified any devices behaving this way?

    • @robertmccully2792
      @robertmccully2792 5 หลายเดือนก่อน +1

      There is always someone smarter hacking what appears to be secure. However if they’re at the top of the game they’re going after big fish.

    • @mjmeans7983
      @mjmeans7983 5 หลายเดือนก่อน

      @@tlxyxl8524 I disagree. These companies producing cheap cameras are licensing firmware provided by another company. If that other company is a state sponsored front for a surveillance agency, then the licensing cost and terms will be very cheap to the camera producer. Something similar happened with a US agency that 'sold' an advertising library to Kuran app developers in order for the US agency to dragnet track Muslims. This kind of thinking not only can happen it IS happening, and it logically must happen. Only a fully open-source software and hardware (including microcode, ASICs and SBC BSMs) or full reverse engineering can hope to find these things when they are imported devices because there is no legal recourse against a foreign government that engages in this activity. And political recourse against a country doing this to its neighbor is unlikely.

  • @dr.hinneredv932
    @dr.hinneredv932 6 หลายเดือนก่อน +14

    Thank you for letting us know. Having no certificate also means no certificate can expire. :-)

    • @mattbrwn
      @mattbrwn  6 หลายเดือนก่อน +13

      Root CA companies hate this trick!!!

    • @MikkoRantalainen
      @MikkoRantalainen 5 หลายเดือนก่อน +2

      They could use self-signed root CA without any expiry time.

  • @ThisIsJustADrillBit
    @ThisIsJustADrillBit 5 หลายเดือนก่อน +1

    Absolutely incredible channel. You keep the pacing super easy to follow and your topics are always interesting. Very educational and cool at the same time this is one of my favorite channels now ❤

  • @joonasmakinen4807
    @joonasmakinen4807 5 หลายเดือนก่อน +4

    Subcribed! Not only highly educational video, but reveals why it makes strategically sense that AliExpress and similar are so dirty cheap. Could you make more videos exposing products bought from China?

  • @Hoerli
    @Hoerli 6 หลายเดือนก่อน +64

    Point the camera at a Rick Astley video so that a hacker of your keys can see the success directly :D

    • @mikesyr
      @mikesyr 6 หลายเดือนก่อน

      Actually that's a really good and easy way to show proof of hack, point it at something only @mattbrwn knows, and they can jump on the discord with an image for proof. They can provide further proof afterwards....or not... 😂

    • @jitgtij
      @jitgtij 6 หลายเดือนก่อน +1

      that is an awesome idea

    • @nezu_cc
      @nezu_cc 6 หลายเดือนก่อน +3

      Remember the time when 4chan located indoor cameras and raided them. I'm not sure it's that great of an idea...

    • @mikesyr
      @mikesyr 6 หลายเดือนก่อน

      @@nezu_cc Cats out of the bag on that already if he's leaving it online for it to be hacked.

    • @dumbidiot1119
      @dumbidiot1119 หลายเดือนก่อน

      @@nezu_ccwell it was bc the camera was near an open window. I’m sure he can just put the camera in a box or something

  • @rubhern8187
    @rubhern8187 5 หลายเดือนก่อน

    After all these years never knew or have seen all this techniques in action. Very excellent explanation and educational we need more of this stuff. Subscribed and liked thanks matt🎉🎉🎉🎉

  • @Tibbon
    @Tibbon 5 หลายเดือนก่อน

    Your videos are as good as sitting in sessions at DEF CON!

  • @yay-r6j
    @yay-r6j 6 หลายเดือนก่อน +2

    loving the idea of letting peeps from the web fish around on the device and connect with you and others on discord ❤

  • @hockeyrink
    @hockeyrink 6 หลายเดือนก่อน +10

    Wonderful. Exactly answering some of the questions I had about some of my Chinesium security cameras. I really appreciate you going through this with live workflow. Keep up the good work.

    • @turtlefrog369
      @turtlefrog369 5 หลายเดือนก่อน

      western cloud cameras are not very different.

    • @hockeyrink
      @hockeyrink 5 หลายเดือนก่อน +1

      @@turtlefrog369 You're right. Really doesn't matter the country of source.

  • @aniketsrivastava2651
    @aniketsrivastava2651 6 หลายเดือนก่อน +4

    Yooooooo, You just got a new sub. Lovely vid. Love the work! ❤

  • @colcal5275
    @colcal5275 หลายเดือนก่อน

    I can see you love what you do - good energy - I enjoy your technical insight.

  • @uncommonengineer
    @uncommonengineer 5 หลายเดือนก่อน

    That was an awesome run-down and explanation Matt, subscribed!

  • @nickg9215
    @nickg9215 5 หลายเดือนก่อน

    Good video, I can feel you raw passion and excitement about what you're doing coming through. I'll have to check out some of your others.

  • @davidg2861
    @davidg2861 5 หลายเดือนก่อน +20

    For the typical end Luser, anc customer support people (if any), the potential for every device dying when the cloud server's certificate changes to one not in the chain of trust is a potentially significant issue. From the programmer's perspective... They possibly said to their manager, 'to do this properly we need to provide a way to update the trusted certs regularly' the account said oof, more infrastructure? and the CS people said 'what about users who had the device turned off for 2 years, and the manager replied, 'what if we just don't check the certs?' and went home with a bonus for saving the company money.....

    • @monad_tcp
      @monad_tcp 5 หลายเดือนก่อน

      "what if we just don't check the certs?" what if we check the certificates and the stupid users that forgot to use the product, forgot that they even had the product, so you sell them another one !

    • @soneomeelse
      @soneomeelse 4 หลายเดือนก่อน

      OCSP is what they need

    • @TheAlchaemist
      @TheAlchaemist 4 หลายเดือนก่อน

      To be honest, I would not be surprised if this was actually just as intended, by Chinese rules.

  • @kyoteecasey
    @kyoteecasey 5 หลายเดือนก่อน

    Awesome stuff mate. I am learning so much, and gives some scale as to how much I have to learn still. Keep it up!

  • @squelchtone
    @squelchtone 5 หลายเดือนก่อน +6

    How have I never found your channel before? subscribed! This should be a DEFCON talk.

  •  5 หลายเดือนก่อน +1

    Way over my knowledge but found it very interesting to look at. Have for long time been thinking of a way to check what an app like TikTok and other app that should not be trusted, and different hardware, to see if they can be trusted. Wonder if such devices like you cheap camera should be on it's own network isolated from home server and other stuff.
    Looking forward to watch your future videos that educate us all.

  • @joelljung9325
    @joelljung9325 5 หลายเดือนก่อน

    Just discoverd your channel. This is sweet stuff. Great job

  • @slincolne
    @slincolne 6 หลายเดือนก่อน +16

    Looking at some of the details decoded by certmitm it looks like the cloud infrastructure may be setup for multiple manufacturers to use (the reference to OEM look interesting). What are the chances that the work that Matt is doing applies not only to the make/model of camera being analysed, but also other brands and models ?

    • @mattbrwn
      @mattbrwn  6 หลายเดือนก่อน +10

      Wow I didn't catch this! I bet you are right and that there are a bunch of whitelabel brands out there.

    • @t4nk3d402
      @t4nk3d402 5 หลายเดือนก่อน +2

      im sure many companies are using these services. Think about the cost for them to pay for this infrastructure, these companies are pretty obviously selling some kind of data to pay for it. These cameras dont cost that much so they cant keep that kind of operation afloat for free

  • @Turco949
    @Turco949 4 หลายเดือนก่อน

    It seems, most of the current spies out of China are using 0s and 1s. Good stuff, Matt!

  • @iamionscat9035
    @iamionscat9035 5 หลายเดือนก่อน +1

    Jesus! I just stumbled across this video and now I'm subscribed and know that I need to be much MORE more paranoid about stuff that I was previously just suspicious about.

  • @Y3llowMustang
    @Y3llowMustang 6 หลายเดือนก่อน +4

    Would be cool if you could get that binary to run on your Linux machine and view the video feed without using the app

  • @SB-qm5wg
    @SB-qm5wg 6 หลายเดือนก่อน +2

    Very cool. I look forward to part2.

  • @NanoCloud99
    @NanoCloud99 5 หลายเดือนก่อน

    Great morning watch from Sweden, appreciate the video, Matt!

  • @NilsHerzig
    @NilsHerzig 5 หลายเดือนก่อน +3

    Nice video! Btw, find supports filtering for names and even executing other commands on its results
    find . -iname '*pam*' # same as the grep pipe
    find . -exec file {} \; # same as your xargs pipe

  • @bordeux
    @bordeux 5 หลายเดือนก่อน

    finally some channel for me :) high quality content!

  • @micahakervold
    @micahakervold 5 หลายเดือนก่อน +1

    Your content is awesome man,thanks for making it!

  • @nated4wgy
    @nated4wgy 6 หลายเดือนก่อน +7

    Decrypting SSL!? Can’t wait for this one! Keep it up dude. Really enjoying the videos.

  • @LonnonFoster
    @LonnonFoster 4 หลายเดือนก่อน

    Super instructive, and highly illustrative of the (in)security of many IoT devices. I just got into embedded and packet hacking at Def Con 32, and this is a fantastic continuation of what I learned there. Great to see these techniques employed in the wild, and you do a fantastic job of describing what's going on at each step.

  • @kuyayan
    @kuyayan 5 หลายเดือนก่อน

    So thankful to have found you!! Woot Woot!!

  • @MPE-iX
    @MPE-iX 4 หลายเดือนก่อน

    Nice work Matt

  • @JohnnyLeuthard
    @JohnnyLeuthard 6 หลายเดือนก่อน +26

    This is one of the many reasons people need to be more aware of the risks of IOT devices. Especially when it comes to devices from other countries like China. Even thermostats, sensors, etc. It;s all sending data and to think and say things like "I don't care if China sees the temp in my house" is not seeing the bigger picture. As your video points out IoT devices are not very secure. I've even seen some people argue that they disable traffic to China. That "may" help but not all people have that skill and I guarantee you Chiuna has cloud based servers all over not just in China so you really don't know unless you have the skills to analyze traffic, look at all destinations and lookup who actually controls that endpoint and dig up what shell companies may be masking the true owner/country. Good video.

    • @supremeleader5516
      @supremeleader5516 5 หลายเดือนก่อน

      How temperature will benifit china?

    • @t4nk3d402
      @t4nk3d402 5 หลายเดือนก่อน +1

      @@supremeleader5516 that thermostat can run network scans, or whatever recon and send it back to china. Every network device has a mac address which is assigned to a company. They could watch and see how many people have a samsung tv over a tcl for example and then sell that data to marketing companies to try and sell you something. Thats one small example. There is a lot of data going through a network at any time.
      Sometimes you just dont know what you dont know.

    • @mashiniwami
      @mashiniwami 2 หลายเดือนก่อน

      Until non-China stuff is tested you have no way of being certain the same, or more sophisticated, shananigans are going on.

  • @namesurname201
    @namesurname201 6 หลายเดือนก่อน +2

    What awesome content again thanks matt❤❤

  • @BlueByrd69
    @BlueByrd69 5 หลายเดือนก่อน

    Great content, Matt. You earned a new subscriber.

  • @jordanaldrich
    @jordanaldrich 5 หลายเดือนก่อน +1

    Great video. You did a great job explaining all the steps you did.

  • @thinkright
    @thinkright 6 หลายเดือนก่อน +5

    This is great content. Have you tried this on any major brand name cameras like Blink or Ring?

  • @resoldab
    @resoldab 6 หลายเดือนก่อน +8

    I hit the like button 10 seconds into the video as I know I am in for a treat! Great work!

  • @jani140
    @jani140 5 หลายเดือนก่อน +2

    What is the most dangerous threat? A kind of obfuscated but auditable connection or a perfectly secure connection directly to an malicious service?

  • @escherichiacoli7069
    @escherichiacoli7069 5 หลายเดือนก่อน

    respect bro, keep up the great work!

  • @myfxhelper7562
    @myfxhelper7562 5 หลายเดือนก่อน

    Awesome matt!! subscribed!

  • @JustLennyBenny
    @JustLennyBenny 6 หลายเดือนก่อน

    Nice video's Matt, subbed! 👍

  • @the-real-random-person
    @the-real-random-person 5 หลายเดือนก่อน +3

    This channel should go viral, love it.

    • @mattbrwn
      @mattbrwn  5 หลายเดือนก่อน +1

      I, an extremely biased source, agree 😁

  • @JG-vo3mh
    @JG-vo3mh 5 หลายเดือนก่อน

    Great content, definitely subscribing!!

  • @lastnameavailableok
    @lastnameavailableok 5 หลายเดือนก่อน

    fascinating Matt, brilliant

  • @Sircliffe
    @Sircliffe 6 หลายเดือนก่อน

    Great vid! Stay awsome, Jim.

  • @jamesclegg8981
    @jamesclegg8981 5 หลายเดือนก่อน

    I like this video. I'm technical (software experience but not security background) and would love more high level summary and explanation of what all this means. E.g. what are the consequences for users, what does this enable the Chinese to do etc etc

  • @rklauco
    @rklauco 6 หลายเดือนก่อน +1

    Now I have to reuse this tutorial in my lawnmower! I did not even try as I've seen it is ssl traffic, but I've never guessed the tls is not even verified! Thanks!

  • @SteveJones172pilot
    @SteveJones172pilot 5 หลายเดือนก่อน +3

    So.. to make sure I'm understanding - The flaw that allowed you to successfully run the MITM is that the camera didn't validate that the certificate was signed by a trusted root, so it trusted the cert dynamically generated by the utility? If this is the case, but it didn't work, is it common to be able to inject a new trusted root into the filesystem of the device under test, or if it did the root validation, that would be pretty secure?

    • @effsixteenblock50
      @effsixteenblock50 5 หลายเดือนก่อน

      I could be wrong but I think in this particular case, the dynamically generated certs weren't even needed, as the app didn't even bother to validate the server cert.

    • @SteveJones172pilot
      @SteveJones172pilot 5 หลายเดือนก่อน

      @@effsixteenblock50 Oh.. I was figuring that "not validating" the cert meant it just didnt verify it was valid up to a trusted root installed on the camera, but if it really didn't even validate the name of the cert, that's a new level of carelessness on their part! I might have to get one of these things just to play with now!

    • @JamesTK
      @JamesTK 4 หลายเดือนก่อน +1

      @@SteveJones172pilotoften devices do nothing more than verify the common name/san matches an expected value. In those cases a self signed certificate with the same name as the intended site will suffice.

  • @ripplerxeon
    @ripplerxeon 6 หลายเดือนก่อน +1

    Great video, would love to see what they send after getting the auth.

  • @themessenger-zq9lr
    @themessenger-zq9lr 6 หลายเดือนก่อน

    Love these videos! Keep it up!

  • @cg_539
    @cg_539 4 หลายเดือนก่อน

    THANKS This is eye opening. Is there a clearing house for IOT devices that do not have these type of issues? Wired and Wireless?

  • @Matlockization
    @Matlockization 5 หลายเดือนก่อน +2

    Do these cameras have built in chinese backdoors from software or hardware or both ? And have you created a list of security cameras that have been compromised ?

    • @mmuller2402
      @mmuller2402 5 หลายเดือนก่อน

      Yes it has been proven, there are even Website with hacked or unsecured cameras..

    • @Matlockization
      @Matlockization 5 หลายเดือนก่อน

      @@mmuller2402 Very worrying.

    • @joonasmakinen4807
      @joonasmakinen4807 5 หลายเดือนก่อน

      @@mmuller2402How to find that website?

    • @johnsullivan8673
      @johnsullivan8673 5 หลายเดือนก่อน

      @@Matlockization what actually happens is these devices have to use remote servers to generate things like thumbnails and/or previews. The problem is you have to compete on price, not security.

    • @Matlockization
      @Matlockization 5 หลายเดือนก่อน

      @@johnsullivan8673 Well, people are already paying extra for peace of mind since we all know what communist china are up to.

  • @ryangrogan6839
    @ryangrogan6839 5 หลายเดือนก่อน +1

    Yoooo my man usin polybar and i3wm, lets go

  • @dan_in_sd
    @dan_in_sd 5 หลายเดือนก่อน +2

    was the initial HTTP Request packet for that .jpg file just a "semaphore" or "signal" to the chinese server farm that the device was rebooted. and perhaps the "token" was really a way to get a message to those servers? This might have been a method of obscuration used by the manufacture. also, I noted that a HTTP 404 was returned by the server. hmmm

  • @techbits-english
    @techbits-english 5 หลายเดือนก่อน +2

    Hi Matt, Can you do a video on decrypting the wireshark tls packets after certmitm injecting a self signed certificate in the camera connection? I mean, that should be possible now, right? I tried loading the certmitm key file into Wireshark but I just cannot get it to decode the tls trafic.....

    • @mattbrwn
      @mattbrwn  5 หลายเดือนก่อน +2

      That is only possible IF the TLS cipher used does NOT provide perfect forward secrecy.
      en.m.wikipedia.org/wiki/Forward_secrecy
      I agree this nuance would make a good video.

    • @techbits-english
      @techbits-english 5 หลายเดือนก่อน +2

      @@mattbrwn So, how would you proceed if you want to spy on your camera traffic to see all the messages forward and backward with the Chinese server?
      Thanks for the link! Interesting!

    • @mattbrwn
      @mattbrwn  5 หลายเดือนก่อน

      A transparent proxy.
      E.g. certmitm or mitmproxy

    • @mattbrwn
      @mattbrwn  5 หลายเดือนก่อน

      Also sslsplit can create a synthetic pcap file if you really want to view the data in Wireshark.

  • @andrewphi4958
    @andrewphi4958 5 หลายเดือนก่อน +1

    IoT means "Internet of Trouble".
    Also, don't get too comfortable if YOUR cam doesn't generate suspicious traffic. It is just waiting for the right time. ;)

  • @anuroopkeshav2121
    @anuroopkeshav2121 5 หลายเดือนก่อน

    your polybar looks so much similar to my previous style

  • @pierremartel3552
    @pierremartel3552 6 หลายเดือนก่อน +1

    Seriously. With what you are giving me as information and other hints. I am enjoying testing all the wifi device I have. Be it sensibo heat pump controler to my thermostats. And door bell camera. Amazing stuff!!!

  • @matheuscezar6309
    @matheuscezar6309 5 หลายเดือนก่อน

    Hi Matt,
    Thank you for the great content! I have a question: when running a tool like certmitm, is it necessary to make any modifications to my router? How does the traffic get routed through the host?
    Thanks a lot!

  • @AdamVanHine
    @AdamVanHine 5 หลายเดือนก่อน

    Such an awesome video! Thanks!

  • @flywithusMSFS
    @flywithusMSFS 5 หลายเดือนก่อน

    Hello Matt!
    Your content is absolutely fascinating, I love your videos!
    A question, any chance you would once look at an easier project, such as the tiny LCD screens they sell for Pc performance monitor screens. They have an onboard chip and the HW usually can only be used with the provided software.

  • @racemouse5014
    @racemouse5014 5 หลายเดือนก่อน

    Thanks for posting. Super interesting 🙂

  • @JonnyWilson-rg3uv
    @JonnyWilson-rg3uv 5 หลายเดือนก่อน

    Any way you could do a video on the blink mini security camera? Im not at your skill level yet but i have a few of these cameras at home and would like to know how secure they are. Love your videos btw and look forward to seeing more content

  • @cobro2
    @cobro2 24 วันที่ผ่านมา

    I have the YI cameras and i would like to stop them from call home PRC , is that possible i have to use an app from them to be able to connect to the webcams.

  • @JR-sq2of
    @JR-sq2of 5 หลายเดือนก่อน

    Great video Mr Matt. So it's probably not good to buy a CAM from Temu? 😮

  • @markverstappen1365
    @markverstappen1365 6 หลายเดือนก่อน +1

    Could you make a video about your MITM-Router, hardware, making and software?
    Seach for a video and looked on your Github but can't find it.

    • @mattbrwn
      @mattbrwn  6 หลายเดือนก่อน

      its not HW, all software. sorry I'll add github link to video description

    • @markverstappen1365
      @markverstappen1365 6 หลายเดือนก่อน

      Ah that would be perfect. Thanks!!
      On what linux distro do you run your script, or do you just run it in for example Kali?

  • @nazarartykula401
    @nazarartykula401 5 หลายเดือนก่อน

    Do you have any videos on the Aqara security cameras?

  • @AlgoBasket
    @AlgoBasket 5 หลายเดือนก่อน

    Nice Hacking Video, keep it up brother !!

  • @HectorCAILLEBOTTE--VINCE
    @HectorCAILLEBOTTE--VINCE 5 หลายเดือนก่อน

    @mattbrwn how did you learn IoT reverse engineering and where to start ?

  • @zukjeff
    @zukjeff 5 หลายเดือนก่อน

    I also like to look for what other wifi/BT or RF traffic the device ( camera) has been scanning and packaging off the meta data for.

  • @theskelet4r
    @theskelet4r 6 หลายเดือนก่อน

    Another Amazing Video Matt! Are you going to DC 32 this year?

  • @hatman-rc2vc
    @hatman-rc2vc 5 หลายเดือนก่อน +1

    very nIce, good man

  • @paaabl0.
    @paaabl0. 5 หลายเดือนก่อน

    Thanks!! Great video, ionly interesting stuff, no bullshit stories.

  • @mjdejong
    @mjdejong 5 หลายเดือนก่อน

    I am not going through 360 reactions, so excuse me if already asked. But why would you pipe the output of find . to grep instead of using find . -type f -name *pem ?

    • @JamesTK
      @JamesTK 4 หลายเดือนก่อน +1

      I noticed this with the useless use of grep too and tried to find a comment and came across yours. I'm guilty of this sometimes too when I can't remember parameters on something like awk

    • @mjdejong
      @mjdejong 4 หลายเดือนก่อน +1

      @@JamesTK I am probably guilt of useless use of commands in real life as well. However, when it is for a video I expect a better use of commands by the host.
      If someone is not aware of the uselessness of commands, I'd advise against making a video. If someone is aware I'll expect better usage of commands.

  • @notsoweisz1
    @notsoweisz1 5 หลายเดือนก่อน

    I’d love a video on eufy cameras!

  • @uzlonewolf
    @uzlonewolf 5 หลายเดือนก่อน

    The IoT devices I"m familiar with use TLS in PSK mode. It is very lightweight as there are no certificates to verify, and cannot be MITM'd unless you know the PSK.

  • @marcusaurelius3487
    @marcusaurelius3487 4 หลายเดือนก่อน

    A token was sent in clear text, havent watched the whole video but could be used to start a remote unauthorized stream with it, same was done with eufy cameras. The JPG is the thumbnail of the camera seen in the app. And when it comes to mobile applications not properly SSL pinning, this can be fairly easily circumvented with reverse engineering and the usage of software like frida, to override functions and or inject your own logic.

  • @pauloantunes2363
    @pauloantunes2363 6 หลายเดือนก่อน +1

    The Wireshark capture was on a specific port on your desktop or a port on your router/modem? It''s the mitmrouter?

  • @showupshowout
    @showupshowout 5 หลายเดือนก่อน

    How did you connect to the device? UART? etc?

  • @jamesharrison7350
    @jamesharrison7350 4 หลายเดือนก่อน

    You are a clever person. How did you learn your skills?

  • @chompchompnomnom4256
    @chompchompnomnom4256 5 หลายเดือนก่อน

    I've got Zosi CCTV system and as soon as I set up a password on there, I stated getting hacking attempts on my network and even my email, so I just leave it offline and only access it locally. Also what's the point in SSL if it can be decrypted so easily?

  • @kipchickensout
    @kipchickensout 5 หลายเดือนก่อน +1

    I like how they misspelled "signature" as "signatrue" in one of those intercepted requests
    idk why, but now i wonder what "signafalse" looks like

  • @Grunchy005
    @Grunchy005 5 หลายเดือนก่อน

    I have a hodge-podge of network equipment and servers and extremely superficial understanding of how any of it works.
    DIR-862L router running DD-WRT and AdGuard Home, 3x Osprey Informatics IP cameras, 1x Vaddio Conference Shot 10 IP camera, Datto Alto A3V2 NAS running Proxmox which is hosting Ubuntu server which hosts NFS share, Nginx, iSpy Agent, plus a Western Digital DX4000 running Microsoft Server 2008, a Linksys SPA2102 VOIP adapter, and Brother network printer/scanner.
    How susceptible is all this stuff? I'm genuinely curious!

  • @andrewlalis
    @andrewlalis 6 หลายเดือนก่อน +4

    Same shit with owning a VPS. I installed fail2ban and occasionally looked at the ban list, and it was just thousands of Chinese IPs trying to probe any open port.

    • @khx73
      @khx73 6 หลายเดือนก่อน

      @@andrewlalis Did this with my firewall as well.. ru and cn hits in the hundreds of thousands

  • @cbg4567
    @cbg4567 5 หลายเดือนก่อน

    Now I can say Jason Bourne is teaching me hacking

  • @stevehurcombe
    @stevehurcombe 5 หลายเดือนก่อน

    would there be any value in capturing data going to and from the wifi module?

  • @Dutch-Viper
    @Dutch-Viper 6 หลายเดือนก่อน +1

    Nice series! and the adres eye 4 China.............. 🤫

    • @marcd6897
      @marcd6897 6 หลายเดือนก่อน

      Yeah, true, now that you spell it out. Didn’t see it in the first place.

  • @djksfhakhaks
    @djksfhakhaks 5 หลายเดือนก่อน

    Ive learned so much from your videos. I have a basic soldering system setup but I cant do smd stuff let alone desoldering firmware chips. What would be the entry level equipment that you would recomend??

    • @djksfhakhaks
      @djksfhakhaks 5 หลายเดือนก่อน

      My background is Unix in general. Going back to the Solaris 3 days. I get the software side of things but I need advice about the hardware side to get to the software side. I can't afford the crazy expensive setups that we see on the channels. I need something that its OK to fail now and then. Thanks for any advice you can give. It'd be better then me just picking temu crap at random.

  • @nicktheneko
    @nicktheneko 6 หลายเดือนก่อน +2

    @mattbrwn could you try hacking and attacking the EDL on the Oppo Watch OW19W8?? It's an WearOS Smart watch but more on the cheaper end and I've bricked it by installing Asteroid OS and then locking the bootloader which bricked the Smartwatch because for whatever reason whenever you lock the bootloader on that device it basically factory resets it's self but the issue is I deleted the Wear OS Partition meaning i can't Unbrick it as of yet and I've tried fixing it through the EDL but it's encrypted and idk how that works and so far no one knows how to unencript it through software

  • @madskargo8146
    @madskargo8146 5 หลายเดือนก่อน

    I like your videos. Would you try to check the firmware from a Reolink IP-camera? Really big brand is growing up. :)