IP cameras have always been part of the Internet of Things (IoT) and are among the most widely used devices in both home and professional environments. Unfortunately, the vulnerabilities of IP cameras have attracted malicious activities. For example, in 2016, a massive attack resulted in thousands of cameras and IoT devices being breached and used to create a botnet. Given this history and the extremely sensitive nature of the data these devices have access to, it is natural to question what security measures are in place today. In this paper, a vulnerability assessment and penetration testing is performed on a specific model of IP camera, the TP-Link Tapo C200. More in detail, our findings show that the IP camera in question suffers from three vulnerabilities such as: denial of service, video eavesdropping and, finally, a new type of attack called "Motion Oracle". Experiments are not limited to the offensive part but also propose countermeasures for the camera in question and for all those that may suffer from the same vulnerabilities. The countermeasure is based on the use of another IoT device, a Raspberry Pi.
翻译:IP摄像头一直是Things(IoT)互联网的一部分,也是在家庭和专业环境中最广泛使用的装置之一。不幸的是,IP摄像头的脆弱性吸引了恶意活动。例如,2016年,大规模袭击导致数千个相机和IoT装置被破坏,并被用来制造一个肉网。鉴于这一历史以及这些装置可以访问的数据极为敏感,自然会质疑今天采取了何种安全措施。在本文中,脆弱性评估和渗透测试是在IP相机的具体模型TP-Link Tapo C200上进行的。更详细地说,我们的调查结果显示,该IP相机有三种脆弱性,例如:拒绝服务、视频窃听和最后一种叫作“奥雷克尔运动”的新类型的攻击。实验并不局限于攻击性部分,而是为所涉相机和所有可能遭受同样弱点的人提出对策。反制措施的基础是使用另一个IoT装置,即一个Raspberry Pi。