Disable a Wi-Fi Security Camera with Aireplay-ng [Tutorial]

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
you may have seen hackers in TV shows and movies disable a wireless security camera and wonder how practical this actually is today we'll show you how you can stable a wireless security camera that relies on Wi-Fi to communicate on this episode of cyber weapons lab [Music] [Applause] [Music] hackers and penetration testers who are targeting a specific device on a network like an IP camera have a variety of different tools that can use to do so first a tool that kismat is capable of finding the MAC address of all the hosts connected to a network and distinguishing between the different manufacturers so you can avoid targeting something like an Apple TV when you mean to be targeting an IP camera once you find the specific network that the device is on you can use a tool like air gedan to simply take out the entire network which is a little unnecessary and quite noisy and in this case is not the most effective means of doing so instead we can take the MAC address we discover and feed it to a tool like airplay - ng which allows us to simply take out the one device that's attached to the network instead of going after the entire network itself now this is helpful because it's a lot more subtle and in order to get started you'll only need to have Kali Linux on your computer and a wireless network adapter like this tp-link here or anything else that's Kali compatible this is all pretty simple so let's begin today we're gonna be going after this wireless camera that we have access to called Big Brother and it's important that you have access and permission to use the camera that you're looking to try this on because you can't just go around dealing other people's cameras because it's a denial service attack and depending on what the camera is watching it may or may not be a pretty big deal so since this is quite a noisy attack please make sure that you're only doing it against devices that you have permission to so that being said the first thing we're going to do is fill in the command we're going to be using so the command we're going to be using today is airplay ng tax 0 and then another 0 which is going to say to send a continuous stream of D authentication packets and then tack a for the access point we're attacking which will be the MAC address of the access point where the security camera is basically transmitting and finally attack C which is for the client and the MAC address of the camera that we discover finally we will add the network adapter which needs to be in monitor mode so we can actually run this without it being in monitor mode but since we'll have already put it into monitor mode to use kismat it works just the same so this looks like a lot and in order to understand it better you can always type airplay mg TAC TAC help and you can see all the various different filters and stuff you can use with airplay that make it more useful so how do we fill that it well in order to use it obviously we need the two different MAC addresses we need the name of the wireless network adapter which we can find with ifconfig and we can see our wireless network adapter is already in monitor mode but if yours isn't it's very simple to do so you'll just need to type airmon-ng start wlan0 or in this case wlan0 montt now I'm going to type WM 0 Mon 6 and to do that will mean that suddenly our card is in monitor mode but locked to channel 6 now that's important because as I can see in my kismat readout on the left side the channel that were actually the wireless ap that we're looking to attack is on channel 6 so now we'll be able to focus on that channel when we run our command and actually have it attack the right network now how do we fill in all that information well we'll be able to use kismat to find just about all of that by typing kismat taxi and wlan0 mon so once we do that we'll automatically start our network adapter in kismat and we should be able to see all these different networks that are nearby so we can go ahead and scroll down until we see the one we're looking for and as we go through we'll see a printout of all the different clients that are discovered on this particular network until we see one that has a MAC address that is decoded as being from a manufacturer that is likely to be a security camera now that'll be something like Dropcam or nest cam or something like that something clearly recognizable in this case we have china dragon which lets us know it's kind of like a off-brand Chinese security camera that's very common and you'll probably see a lot of devices like this now you can also see we have two things that are clearly identifiable as other network devices like a Roku streaming box and then an arrow sprouter and we can discount discard these because we know that they're not what we're looking for so kismat now gives us actually all the information we need we can see here channel 6 is the channel that it's transmitting on the MAC address is right here for the client we're looking for and the MAC address of the access point is right here as well so we can go ahead and close out of kiss mat and just supply those variables into our final line so we'll go ahead and type airplay ng and then add in the variables we need it from before which is just the MAC address of the access point and the MAC address of the client we wish to kick off the network and as you can see here from Big Brother we have a timecode scrolling here which means we're getting images still and then after adding the network adapter in monitor mode we can press return and we should see immediately a stop to the received packets and know that we can no longer see what's going on on camera and that any nefarious activities or anything going wrong in the area we're supposed to be monitoring are now hidden now this would work against a live operator or even a DVR system that's recording so right now all might seem to be well but in fact if we were to stop the D off attack by pressing ctrl C we might be able to see what was going on once the device is able to realize it can communicate with the network again and oh my god who knows what's happening so now that we've stopped the attack we're able to get a live feed again and as you can see someone is up to no good and this could be true with pretty much anything that is monitoring a specific area and is connected only by Wi-Fi because with a simple direction by kismat you can input the variables - I'll basically knock out any particular device while leaving all the of the devices on the network untouched here we can run the command again and freeze the frame for as long as we want because now we know that we can do anything we want to the area that is basically being monitored by this camera and the DVR system nor a live operator would be able to distinguish that anything was going on other than usual and just like that we were able to target a specific device on a network and actually disconnect it so that it was no longer able to exchange data now when we're targeting a security camera this can be pretty significant and if you operate a security camera yourself you should know that in general if you have an absolutely critical device you shouldn't just leave it up to Wi-Fi Ethernet is a much more secure way of preventing this kind of jamming attack because Wi-Fi is very susceptible to this sort of thing so if you have something that's critical like monitoring a door or something else that you always need to have recording Wi-Fi is not the best way to go that's all we have for this episode of cyber weapons lab make sure to like comment and subscribe and we'll see you next time
Info
Channel: Null Byte
Views: 250,058
Rating: undefined out of 5
Keywords: wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker, hacks, hackers, how to hack, howto, how to, tutorial, guide, cyber weapon, cyber weapons, cyber, kismet, aireplay, airgeddon, airodump, airmon, aircrack, aircrack-ng, kali, kali linux, linux, parrot security, blackarch, wi-fi, wifi, wifi camera, security camera, camera, webcam, dropcam, nestcam, nest cam, wireless cam, wireless camera, wifi cam, security cam, DOS, denial of service, deauthentication, IoT, kody kinzie
Id: kXm8f9fhaxQ
Channel Id: undefined
Length: 8min 23sec (503 seconds)
Published: Tue Jun 26 2018
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.