User Tools

Site Tools


eop:home_electronics:home_security_devices

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
eop:home_electronics:home_security_devices [2021/12/30 19:09] – created io55admineop:home_electronics:home_security_devices [2022/04/22 22:35] (current) io55admin
Line 1: Line 1:
-sec+====== Home Security Devices ====== 
 + 
 +For the realm of devices that serve to enhance the security of one's home. Of course, they are also "Smart home" devices, as otherwise they would not be technological enough to get on this wiki. Most of them seem to run Linux-based OSes on either ARM, RISC, or MIPS architectures. 
 + 
 +===== Alarm.com ADC-v520IR ===== 
 + 
 +==== Operating Systems ==== 
 + 
 +=== Linux === 
 + 
 +>This device ships with an open U-boot installation 
 + 
 +Like many of the exploiteers devices on this list (if not all of them), this camera device already runs Linux. This is simply a method to exploit it’s existing install in a capacity which allows the user some root function. A login console on this device is accessible through UART, which during a period, allows access to the filesystem as root. 
 + 
 +[[https://www.exploitee.rs/index.php/Alarm.com_ADC-v520IR%E2%80%8B%E2%80%8B|https://www.exploitee.rs/index.php/Alarm.com_ADC-v520IR]] 
 + 
 +===== DLink 936L ===== 
 + 
 +==== Operating Systems ==== 
 + 
 +=== Linux === 
 + 
 +>Post auth root via arbitrary command injection 
 + 
 +Yet another exploit that allows execution of root commands on a device which already runs Linux. This method involves a poorly sanitized Wi-Fi configuration form for this Wi-Fi camera. 
 + 
 +[[https://www.exploitee.rs/index.php/DLink_936L]] 
 + 
 + 
 + 
 +===== Samsung SDR-3102N ===== 
 + 
 +==== Operating Systems ==== 
 + 
 +=== Linux === 
 + 
 +>Startup script detects a FAT USB Drive 
 + 
 +With either UART or an exploited USB drive, it is possible to access root on this security DVR system (presumably for monitoring many cameras at once). The USB method is easier, as it only requires creating a file on the drive that is named “diag_1673”, which simply is a suitable script. 
 + 
 +[[https://www.exploitee.rs/index.php/Samsung_SDR-3102N]] 
 + 
 + 
 + 
 +===== Samsung SmartCam (?) ===== 
 + 
 +==== Operating Systems ==== 
 + 
 +=== Linux === 
 + 
 +This little Wi-Fi camera has a modicum of exploits available for it, which for the most part, offer some method of root access to the filesystem and kernel. Users can pick the method that is best suit for their available tools. 
 + 
 +[[https://www.exploitee.rs/index.php/Samsung_SmartCam%E2%80%8B|https://www.exploitee.rs/index.php/Samsung_SmartCam]]
eop/home_electronics/home_security_devices.1640909345.txt.gz · Last modified: by io55admin