Gadget Victims

Hot

Post Top Ad

Post Top Ad

Tranya Rimor True Wireless Earbuds

2/10/2020 12:23:00 PM 0

Tranya sells a range of wireless earbuds and the Rimor is one of their latest and best model.

They've been kind enough to send me a pair of these and here's the outcome.



Read More

Cracking open the iPazzPort KP-62 remote

1/22/2020 11:52:00 AM 0

The iPazzPort KP-62 is an RF remote I bought some time ago thinking it could be better than the H1 or even the unmatched TZ-P3.


I never considered publishing a review for it because of its inherent show-killer feature: the useless and continuous beeping when using the keyboard side.

There's a simple DIY solution to it.


Read More

Is your IP Camera (still) vulnerable to XSS?

1/21/2020 11:03:00 AM 0
XSS or Cross Site Scripting is a common vulnerability in software allowing attacker to inject code via the user interface.
Often, an input field just intended to collect a server address or user name will also accept entries of a different nature that will be interpreted by the system.

Low-cost IP Cameras, but also more professional ones, have been exposed to XSS for many years, a good reminder that such network devices should not be directly exposed to the Internet!
Hopefully that vulnerability is now well known and many manufacturers eventually "patched" their devices or reduced the attack surface by removing telnet and ftp altogether.

If your IP camera has a HTTP-based user interface, here's a working example of command injection (for learning purpose). This works great on old generation Veskys and Digoo BB-M2 (the pictures below comes from that model), and does not with the Wanscam models I tested.

First check if the admin interface of your camera as an FTP server settings page like this:



Then instead of FTP Server address, copy this command:
put $(killall telnetd)
That first command killed the running telnet daemon.
The second will now launch the Busybox shell without a user/pass prompt. In the username field, copy this: 
$(telnetd -l /bin/sh)

Click the Set up button to save the entries, and click the "Test" button to send them.
The actual FTP server test will report "Test  ...  Failed" which doesn't matter at all because the commands have been executed.

After that, use any telnet emulator, like Putty, and connect to the camera on port 23

As the owner of the camera, this trick allows you to gain full control on your camera.
"hslwificam"

Source: https://nm-projects.de/2017/01/hacking-ip-camera-digoo-bb-m2-part-3-getting-root-access/

More reading:
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2010/february/busybox-command-injection/
Read More

Digoo DG-K2: I've seen this face before...

11/11/2019 09:21:00 PM 0
The Digoo DG-K2 is another camera compatible with Smart Life.

This one has a particularly nice design, which also reminds me a bit of a certain character from South Park , but maybe it's just me...






Read More

Get the Xiaomi Mi Note 10 Global Version for less than 500$ with these coupons

11/07/2019 10:26:00 AM


Get the Mi Note 10 for 499.99$ (instead of 609.99$) at Gearbest with the following coupons:

GBMINOTE10
GBMINOTE10FB
GBMINOTE10EM



Read More

Tuya/Smartlife IP Camera: Howellcam YT08

10/30/2019 01:11:00 PM 0
Following the rather good experience with the outdoor IP Camera HowellCam QJ05, I went on to try another smart camera, an indoor model this time: the YT08




Read More