If you ever need to hire hackers for your hacking needs, visit CyberTechie.Org. The CyberTechie.org website is the safest and most genuine website on the surface web that lets you hire a hacker for all hacking services which cover everything from email hacking to the website and database hacking.
While hacking isn’t essentially a criminal offence, the term will have a significant negative connotation and you know you can hire hackers on the internet, however most if not all of the hackers for hire within any agency would lurk on the dark web as criminals.
How to hack CCTV camera
Want to learn how to hack CCTV cameras? You are in the right place, but be aware that I’m writing this article to let you know what is possible to do and how you must protect your IP cameras to avoid them to be hacked.
DISCLAIMER: I’m not responsible for any of your acts. You don’t suppose to hack CCTV cameras that don’t belong to you. You’ve been warned.
OK, after this disclaimer, let’s dive in into the information about IP cameras, and how they are hacked by malicious people on the Internet.
Hack CCTV camera
In this article I will explain step-by-step what are the methods used by hackers to get into in the IP cameras and recorders such as DVRs and NVRs.
Your CCTV system is about to hacked
The methods to hack CCTV camera
There are different ways to hack CCTV camera, some of them are easy, others are a little bit more technical and some others are not even hacking.
Let’s take a look at the following methods:
1. Use a website that shows hacked CCTV cameras
This is not really hacking, but it’s the easiest method. You just visit a website that list a lot of hacked CCTV cameras and you just need to watch them.
Those website are created by hackers that get into IP CCTV cameras or DVRs (Digital Video Recorders) and let the information available for you for free.
So, in the end of the day you are not hacking anything but just watching CCTV camera that have been hacked by somebody else.
See below an example of a website that show such hacked CCTV cameras:
The website lists CCTV hacked cameras around the world and organize them by manufacturers, countries, places, cities and time zone.
See below an example of live CCTV cameras installed on malls.
Hacked CCTV cameras
The website administrator claims that this The world’s biggest directory of online surveillance security cameras and that no privacy of individuals will be respected by showing only filtered cameras (whatever this means).
According to a message in the main page, the CCTV camera can be removed from the site when somebody send an email asking for it.
Click here to visit the page and check the hacked cameras
2. Hack CCTV camera using default passwords
That’s also not really a hacking but it works. You just need to find the CCTV camera online and try to use the default password, a lot of devices on the Internet are still using the same original password from the factory.
The idea is to look at the IP camera manual and look for the default password, so you can use it to hack the CCTV camera (or recorder).
How to find the IP camera on the Internet
OK, before you try the default password to hack CCTV camera you need to find them on Internet and there are different ways to do that, let’s check the first method that uses a network IP scanner to find online IP devices.
In this article I will teach you how to use the Angry IP Scanner to scan the Internet and look for IP cameras and recorders (DVRs and NVRs)
STEP 1 – Download the Angry IP Scanner
Click here to download the Angry IP scanner for your Operational System: Windows, Mac or Linux.
See below the Angry IP Scanner website. Make sure you have Java installed and download the correct version for your computer.
Install IP Scanner to hack CCTV camera
STEP 2 – Install the Angry IP Scanner
The installation is very simple, you just need to run the setup file and follow the instructions as shown in the images below: (click to enlarge)
Angry IP Scanner Installation 01
Angry IP Scanner Installation 02
Angry IP Scanner Installation 03
STEP 3 – Configure the Angry IP Scanner ports and fetcher
To be able to find the information we are looking for to hack IP cameras is necessary to configure the Angry IP Scanner ports and fetchers so it can display the right information. See the picture below for the configuration.
Angry IP Scanner Preference
Configure the ports 80, 23, 8080, 8081 and 8082 that are the most one used by people that install the IP cameras and let them available on the Internet.
Angry IP Scanner Port Configuration to hack CCTV camera
Configure the fetchers to display the Web Detect information that will show some device information that is useful to find out who is the manufacturer.
To hack a CCTV camera is really necessary to have such basic information
Go to tools and click on fetchers to open the configuration window
Angry IP Scanner fetchers
Select the Web detect fetcher on the right side and click the arrow to move it to the left side so it can be displayed in the software main page.
Angry IP Scanner Fetchers to hack CCTV camera
STEP 4 – Choose the IP port range to scan
To hack a CCTV camera first is necessary to find one that is available on the Internet, so you need to choose an IP Address range to scan with the Angry IP scanner. See the picture below where a range of IP address was scanned.
The scan can be done for thousand of IP addresses, so it’s quite common to find a lot of IP cameras, DVRs and NVRs that are connected to the Internet.
Did you get the idea? To hack CCTV camera you just need to use a tool to scan the Internet, find an online device and try the default password you can get from the manufacturer manual or from a IP camera default password list.
It’s easier to show an example with this manufacturer, because there a lot of their devices around the world, but the process also works with other brands as long as you can see the Web Detect information and try to use the default admin/password credentials to hack the CCTV camera.
Hack CCTV camera process details
If you want to have extra information about how the CCTV camera hacking works just keep reading, it’s important to understand the process so you can protect yourself against hackers trying to get into your IP security camera.
How CCTV camera hack work diagram
How CCTV camera hacking work diagram (click to enlarge)
The network scanner (Angry IP scanner) is used to retrieve information from the router that is on Internet, Just like shown in the picture below:
How CCTV camera hack work diagram explanation
How to hack CCTV camera diagram (click to enlarge)
Be aware that this process is something natural, the router don’t need to hide the information and will respond what are the services available.
We can compare the process with a regular store, the owner don’t hide where is the location and what services are available, so people can come and use them. The owner just will not have the key store available for the public.
3. Hack CCTV camera
This technique to hack CCTV camera is very similar to the last one, but you don’t need to install a software to scan the network, this process has already been done for you and you just need to try to use the login credentials.
It is a service in a website that shows Internet devices around the world and that includes security IP cameras, DVRs and NVRs.
It’s necessary just to type the brand of an IP camera or the manufacturer name will you show a lot of information, which includes the number of devices around the world, the location, IP and open ports.
4. Hack CCTV camera using exploit tool (software)
So you want to hack CCTV camera but the default username and password was changed by somebody, so you can use a CCTV camera exploit tool.
When an IP device has some security problem, hackers can create exploit tools to automate the hacking process. That happens also with IP cameras.
The camera security flaw
In March 2017 a security flaw was discovered in cameras that allows direct access to device information such as model, serial number, firmware version, and users.
The problem was reported on March 6, 2017, which promptly investigated the problem and admitted the existence of the failure.
Five days later they released a fix for the problem, but cameras that are using the old firmware will still be vulnerable to this security flaw.
How the IP camera exploit works
Just as an example I will talk about a software created to exploit the security vulnerability on cameras which are using old specific firmware.
Camera exploit tool diagram
So, the camera exploit is very easy to use, as show in the diagram above, you just need to run it on a computer or laptop to explorer and hack CCTV camera that is online on the Internet or in your local network.
Obviously, you need the IP camera information to be able to configure the software properly, and I strongly recommend that you use this tool on the cameras you own or have authorization to run security tests.
DISCLAIMER: I’m not responsible for any of your acts. You don’t suppose to hack CCTV camera that doesn’t belong to you. The exploit tool can be used to test your IP cameras and make sure they have the security vulnerability corrected by firmware update. You’ve been warned.
OK, now that you know you don’t suppose to be hacking other people IP cameras, let’s talk about the Hikvision exploit tool. See the picture below.
Camera exploit tool
The exploit can hack CCTV camera by getting the IP camera internal user list and setting a new password for one of them according to your choice.
To use the software just follow the steps below:
1. Type the camera IP and port
2. Click “get user list”
3. Select the user to change the password
4. Type a new password and click the button
Exploit tool to hack CCTV camera
After following these steps, you just need to type the camera IP and port on a Web Browser and login by using the credential you just created.
Cameras that are affected by the security vulnerability
See below the camera models that are affected by this security vulnerability issue. If you have one of them just upgrade the firmware to correct to problem so you don’t have your CCTV camera hacked.
5. Hack CCTV camera using a simple command
How to get the IP camera information
It’s also possible to hack camera by just sending a specific command that gets the camera information or take a screen shot. The same models and firmware version described above are affected by this issue.
How to take a camera screenshot
Just by issuing a similar command it’s possible to take the IP camera screenshot and see what is behind the CCTV camera. It’s a security flaw.
6. Hack CCTV camera by brute force attack
Just imagine the CCTV camera is using a password that is based on a regular word that can be find on a dictionary such as “god, home, secret”, etc
Somebody could get hack the CCTV camera by just trying different all those passwords until find the correct one. That is something that works.
Alright, you are thinking now that this method is too hard and slow since it’s complicated to type any word that is available in a dictionary just to try to find the one that is going to work to login into the CCTV camera, right ?
Well, if you let this task to a software that can test hundreds or thousands passwords per minute you can have a better chance to succeed.
Hack CCTV camera
The software runs and start trying different words it gets from the txt file and keep doing this until there’s a match. If the CCTV camera allows for those fast tries it’s just a question of time to the software find the correct password.
Modern IP CCTV cameras don’t allow this type of brute force attack because they block themselves for some time after too many login attempts.
Final words and conclusion
There are different ways to hack CCTV camera and all of them involves at least some basic skills from the attacker that must be able to understand at least a little bit about Internet and how to use a computer and software.
Beware that any IP device that are connected to the Internet is at risk and there’s no guarantee that it’s 100% and can’t be hacked by someone.
The idea behind this article is to help people to understand how a CCTV camera can be hacked and how to minimize the chances of an attacker.
I used some example just to show what is possible to do and most of the techniques used by hackers can work with different devices.