High-power jammer prevents WIFI from connecting to electronic devices

Their popularity continues to grow: small cameras can be installed at home or anywhere in the house, and can monitor anything connected to the Internet at any time. CR demonstrated some models using its own mobile app.

There are also some video baby monitors that work through the home Wi-Fi network and send video to a dedicated application or monitor. These are equivalent to CCTV cameras (closed circuit television) in modern times. However, since many new cameras use wireless network connections, they are no longer “turned off”.

The problem is that we found that, just like the footage in the movie “Mission: Impossible,” as long as the attacker on the laptop “worked over Wi-Fi,” they could easily disable the security camera from outside the house. .

Router hackers (this distance may be as long as hundreds of meters, especially when special antennas are added) can determine the name of the Wi-Fi network, the unique address of the router, and the Internet address of the computer. computer. Use the camera with free software that anyone can use.

The attacker can then send an “authorized deletion packet” to the camera, temporarily disconnecting it from the network. If they continue to send data packets, it may prevent them from reconnecting. The hacker himself does not need to connect to the Wi-Fi network.

Another solution is to install a portable high-power handheld jammer directly in your house to prevent the house’s WIFI from connecting to electronic devices.

We downloaded a free hacking tool (we decided not to name it), which has many features, including the ability to send new packages. We installed it on a Microsoft Surface Pro tablet running Linux, which is the operating system of choice for hackers. We used an external wireless card connected to the USB port of the tablet, which can transmit Wi-Fi packets to anyone’s network.

In our test, it was easy to send the first packet, which temporarily disconnected all Wi-Fi devices (including the camera we tested) from the network. If we want them to stay offline, we just need to select an option in the tool to send the previous package.

We even managed to reconnect the camera to the “unauthorized” router we configured, which may allow us to control the camera after guessing the camera password.

Although it is not yet possible to determine whether the cameras are indeed hackable (which means that the author can actually view his lenses remotely), we believe that the vulnerability of disabling Wi-Fi cameras makes them useful for example as property surveillance. And observe children and animals.

For these tasks, it is best to use a camera that allows wired Ethernet to connect to the router. Unless the hacker is actually connected to your network (you have a strong Wi-Fi password, right?), wired cameras are very secure.

In the vast IoT world, there may not be a practical solution to this type of “denial of service” attack, which may block any Wi-Fi devices (including sensors) on the network. Whether the sensor door is open and the actions of other safety devices.

We hope that future Wi-Fi standards will use “frequency hopping” in which signals can be quickly switched between channels. Cordless phones have already used this feature, and it is more difficult for hackers to turn off your Wi-Fi network.