Difference between revisions of "IOT Security: Pentesting on IP Cameras"
Jump to navigation
Jump to search
(→Step 1) |
|||
Line 14: | Line 14: | ||
== Description == | == Description == | ||
=== Description === | |||
A penetration test in general consists of several stages: | |||
*<b>Planning</b> | |||
Working with a consumer to absolutely outline and report evaluation objectives, scope, and policies of engagement. | |||
*<b>Gathering Information</b> | |||
Collecting and examing key data approximately the software and its infrastructure. | |||
*<b>Discovering Vulnerabilities</b> | |||
Finding current vulnerabilities, the usage of each guide, and automatic techniques. | |||
*<b>Reporting</b> | |||
Providing a complete file with deep evaluation and suggestions on the way to mitigate the found vulnerabilities. | |||
=== Step 1 === | === Step 1 === |
Revision as of 10:17, 12 June 2022
Summary
This is a documentation on pentesting (information gathering and vulnerability scans) performed on TP-link Kasa Cam Smart Home Camera KC120, Ezviz CS-C1C and Abus PPIC32020.
Requirements
- Operating system: Kali Linux 2022.2
- TP-link Kasa Cam Smart Home Camera KC120
- Ezviz CS-C1C
- Abus PPIC32020
- Kasa Smartphone application (IOS or Android)
- Ezviz Smartphone application (IOS or Android)
- ABUS App2Cam Plus Smartphone application (IOS or Android)
Description
Description
A penetration test in general consists of several stages:
- Planning
Working with a consumer to absolutely outline and report evaluation objectives, scope, and policies of engagement.
- Gathering Information
Collecting and examing key data approximately the software and its infrastructure.
- Discovering Vulnerabilities
Finding current vulnerabilities, the usage of each guide, and automatic techniques.
- Reporting
Providing a complete file with deep evaluation and suggestions on the way to mitigate the found vulnerabilities.
Step 1
Enter these commands in the shell
$sudo nmap -O 192.168.8.103
Step 2
Used Hardware
TP-Link Kasa Smart Home Camera KC120