Weaponized IP Cameras: Vulnerability Scanning and Pen Testing

Weaponized IP Cameras: Vulnerability Scanning and Pen Testing

April 11, 2019, 11:00 AM - 12:00 PM

Sands 201
Language:
English

As of 2015, close to 300 Million IP Cameras have been installed around the world. Many of these cameras have been installed with default user names and passwords and can be accessed from anywhere. For years, the question has been: “How secure is the video that a system produces?” That question is changing; now it is: “Can my security system be used against me?” Most video security cameras are manufactured with an open operating system, or basic kernel, that gives no real consideration to data or cyber security. This session will cover the fundamental considerations that an organization needs to evaluate before placing any IP camera on its network.

Learning Objectives:

1. Review hash and encryption fundamentals.
2. Identify if and how an IP camera can be exploited.
3. Determine the fundamentals of PKI.

Contributors

  • David Brent

    Presenter

    Network Video and Cyber Training Engineer

    Bosch Security and Safety Systems

    David Brent is the Network Video and Cyber Training Engineer at Bosch Security and Safety Systems. David has worked in the security industry for 19...

Documents

Categories

  1. Track
    Video Surveillance

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.