Their popularity continues to grow: small cameras can be installed in your home or anywhere in your home, and allow you to monitor the Internet connection at any time. CR showed some models using its own mobile applications. There are also some video baby monitors that work in the home Wi-Fi network, sending video to apps or dedicated monitors. They are equivalent to closed-circuit television cameras (closed-circuit television) in modern times. However, since many new cameras use wireless network connections, they are no longer “turned off”.
This is the problem: we found that, just like in the “Mission Impossible” movie, attackers with laptops can easily disable security cameras from outside their homes as long as you can.’ They use Wi-Fi jobs. Hackers within range of the router (the distance can be as long as hundreds of feet, especially if they add a special antenna) will determine your Wi-Fi network name, the unique address of the router, and the Internet address of your computer. For your camera, use free software that everyone can use.
A hacker can send a “Permission Delete Data Packet” to the camera, which will temporarily disconnect it from the network. If they continue to send data packets, they may be prevented from reconnecting. The hacker himself does not have to be on the Wi-Fi network. Another solution is to install a high-power wifi jammer directly in the house to prevent the house WIFI from connecting to any electronic devices.
We downloaded a free hacking tool (we decided not to name it), which has many features, including the ability to send new packets. We installed it on a Microsoft Surface Pro tablet running Linux, the operating system of choice for hackers. We used an external wireless card connected to the USB port of the tablet, which can transmit Wi-Fi packets to anyone’s network. In our test, it was easy to send the first packet, which temporarily disconnected all Wi-Fi devices (including the cameras we tested) from the network. If we want them to stay disconnected, we just need to select an option in the tool to repeat the previous packet.
We even managed to reconnect the camera to the “unauthorized” router we set up, which may allow us to control the camera after guessing the camera password. Although it is not yet possible to determine whether the camera is truly intrusible (which means the perpetrator can actually be viewed from a distance), we believe that the fragility of the Wi-Fi camera power off makes it questionable for any reason. Critical tasks, such as monitoring assets. And supervise children and pets.
For these tasks, it is best to use a camera that provides a wired Ethernet connection to the router. Unless the hacker is actually connected to your network (you have a strong Wi-Fi password, right?), wired cameras are very secure. In the vast world of the Internet of Things, there may not be a practical solution to this type of “Denial of Service” attack. This attack may block any Wi-Fi devices on the network, including motion detectors, whether the sensor door is open, and others safety equipment. We hope that future Wi-Fi standards will use “frequency hopping”, in which the signal can be quickly switched between channels. Cordless phones have used this feature, and it will become more difficult for hackers to block your Wi-Fi network.