Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Exploiting network surveillance cameras like a Hollywood hacker 6: Demo time

A bunch of cameras having been analyzed for security vulnerabilities, Craig Heffner demonstrates a demo about hacking admin’s video feed and does a brief Q&A. … So the admin will now always see the empty elevator no matter what is actually going on in there. This is actually a lot more fun to see in...

Exploiting network surveillance cameras like a Hollywood hacker 5: Messing around with admin’s video feed

Mr. Heffner demonstrates a proof of concept where live video feed on TRENDnet camera gets replaced with a static image through the use of an old vulnerability. But I wanted to kind of take a step back from that and say, okay, that’s great and all, but what can I do to the camera itself? I’ve got root on...

Exploiting network surveillance cameras like a Hollywood hacker 4: Attack surface analysis of 3S Vision

Moving on to another vendor, Craig Heffner now analyzes the nuances of getting access to video feed and, even more, becoming root on 3S Vision cameras. By far, the most expensive camera I looked at, though, was the N5072 from 3S Vision (see right-hand image). This one has a list price of “Contact...

Exploiting network surveillance cameras like a Hollywood hacker 3: Accessing the admin area on IQinVision

Having discovered vulnerabilities for D-Link and Cisco, which aren’t camera-focused companies, Craig Heffner looks into how IQinVision is doing security-wise. So I said, okay, clearly, D-Link and Cisco are doing it wrong in their defense, though, you know, they’re not really camera companies; they...

Exploiting network surveillance cameras like a Hollywood hacker 2: Cisco’s weaknesses

It’s turn for the business IP cameras by Cisco to undergo Craig Heffner’s examination security-wise, in particular the popular PVC2300 and WVC2300 models. So I said, okay, D-Link is an easy target, as I mentioned – that’s why I picked them. Let’s move on to perhaps a more reputable vendor, like...

Exploiting network surveillance cameras like a Hollywood hacker

Craig Heffner, a Vulnerability Analyst with Tactical Network Solutions, presented at Black Hat to cover common security issues in network surveillance cameras. Hi, I’m Craig Heffner; this talk is, obviously, “Exploiting Surveillance Cameras Like a Hollywood Hacker”. As some of you may or may...

I am a legend 6: Hearthstone card affinities

The closing part of the Burszteins’ presentation is dedicated to modeling and evaluating card affinities in Hearthstone for accurate game outcome prediction. Before you get all your hopes too high and I tell you about how black magic is done, just a word of disclaimer. Because Naxxramas has just been...

I am a legend 5: Predicting the opponent deck

Elie Bursztein now turns it over to his wife Celine to talk about their in-game web application which can help foresee the opponent’s deck in Hearthstone. So, let’s switch gears a little bit. We are going to tell you about how you can predict your opponent’s deck, and I’m going to let Celine tell...

I am a legend 4: Pricing cards with unique effects

Delving further into game analysis, Elie Bursztein provides some results of modeling cards with special effects to see if they are overpriced or undervalued. So, how do you take it to the next level? Well, it’s really difficult, at least without extra data. And this extra data is how people play the game....

I am a legend 3: Looking for undervalued cards in Hearthstone

What Elie Bursztein now looks into is the process of modeling cards by attributes to determine their real values and then compare those to the face values. Okay, so how do we scale that to hundreds of cards? More precisely, we were able to do 130 cards for this research, because modeling each attribute is a...