Reverse-Engineering an IP Camera (2019)

Summary:
The author replaced an old IP camera with a new P2P camera, but found it lacking in control and security. Attempting to reverse engineer it, they discovered its Chinese origins and reliance on manufacturer servers. Using nmap and Wireshark, they identified open ports, server connections, and network traffic, revealing concerns about data transfer. The camera’s firmware update process and video streaming to various servers raised privacy issues. Next, the author plans to access the camera’s Linux system, continuing their study in future posts.

https://dalpix.com/reverse-engineering-ip-camera-part-1

To top