New CCTV Hack
New CCTV Hack
New CCTV Hack
ABSTRACT
This paper comprises of research done on various aspects of CCTV Hacking. A research was conducted to study
the history of CCTV, the fields in which CCTV is commonly used in e.g. crime prevention etc. This research is
focused more on How to hack a CCTV step by step and how easy it is. Also this paper shows and outlines the
hardware and software needed to hack this technology and the main components being used in this hacking. The
process that takes place in hacking CCTV is explained in this article. The advantage and differences between
public IP and private IP is explained. The models and types of camera often used and preferred has also been
analyzed and diagnosed in this paper.
I. INTRODUCTION
The first ever CCTV Camera was used in 1942 to monitor V-2 rockets. This technology was designed by the
engineer Walter Bruch. In 1949, his technology which was later launched on a commercial level [1]. CCTV
technology has been growing rapidly and has gotten better with time. Now cameras come equipped with high
megapixels, stronger durability, weather resistant, infrared light with nigh vision equipped to it and even radio
for voice transmission. This technology has been a major help for the authorities in crime prevention and
monitoring. Also, CCTV technology has helped the police departments in many cases to identify criminals who
were caught on camera. For instance, in 2014, group of armed robbers were caught on CCTV camera while
putting on their disguise [2]. Massive cyber-attack on Russian bank allows hackers to access 24,000 CCTV and
home video cameras in 30 different countries including the U.S [3]. According to the daily mirror of UK, the
attackers saw as many as 660,000 request being sent every second using a network of more than 24,000 hijacked
devices which also allowed these hackers to gain access office CCTV’s as well as home digital cameras. An
attack of such high scale left the banks losing more than USD31 million in the attack. Cyber-attacks and hacking
has become so widespread that critical attacks happen so frequently. Despite all that, how easy is it to hack
CCTV Cameras? While there is no clear documented evidence to claim the first CCTV hacking done
historically; research has shown recently based on real time incidents that, popular surveillance camera is open
to hackers [4]. While the CCTV cameras in Washington DC were hacked just few days before Donald Trump’s
inauguration which left the 123 out of the 187 cameras crippling in the network due to a cyber-attack and with
other similar attacks globally [5]. It is made to look that having CCTV’s may not be as safe as it used to be once
551 | P a g e
upon a time. With that in mind, this research investigates the question as to “How easy is it to actually hack
intoa CCTV system and if so how to do it?.” With that as the primary objective of the research, the document
provides the results in a step by step approach.
III. IP ADDRESS
We hear the term or expression “IP address” more and more on television, news and movies. That’s right, Your
PC has an IP address, your smartphone has an IP address, even a coke machine will have an IP address. But
what exactly is an IP Address?IP address or in its full form “Internet Protocol Address” is a unique identifying
number assigned to every single device that’s connected to the internet. Just like a car license plate, or your
street address, an IP address is a special, globally unique serial number used for identification [9].
552 | P a g e
Class Starting IP Address Ending IP Address Number of Hosts
A 10.0.0.0 10.255.255.255 16,777,216
B 172.16.0.0 172.31.255.255 1,048,576
C 192.168.0.0 192.168.255.255 65,536
553 | P a g e
Figure.2 IP preferences
Before proceeding to scan the network IP range, be sure to manually key in the ports interested. The ports
scanned were 80,8080,24,443, and 4444.
3.4.2 Fetchers
Figure.3 Fetchers
Make sure to select Ports, Web Detect and HTTP Sender. The above “Fig.3” shown the fetchers for scanning IP.
554 | P a g e
Figure.4 Angry IP Scanner
The above “Fig.4” shown the list of active IP address and following is the list of available active IP addresses
that are available between the selected Target IP. The one with https and web detect are those with active CCTV
connection. The most common username and passwords identified during the research are as follows:
Username: “admin’ Password: “admin’
Username: “” Password: “12345
Username: “admin Password: “12345”
Username: “admin” Password: “9999”
Username: “admin123” Password: “”
Username: “admin” Password: “password”
Username: “user” Password: “123456789”
Username: “user” Password: “user”
Username: “user” Password: “user12345”
555 | P a g e
Figure.6 Output Images
556 | P a g e
VI. CCTV CAMERA AND SPECIFICATIONS
Closed Circuit Television (CCTV) is a system where the circuit in which the video is transmitted is closed and
all the elements (camera, display monitors, recording devices) are directly connected. (Brickhouse Security).
Any camera that is able to broadcast signals can be attached to a CCTV system, whether wired or wireless.
Before the advances to wireless CCTV, every system had used wires to send and receive images from the CCTV
system. A wired CCTV, used a high-quality wire between the camera and the monitor or recording equipment.
Some of the benefits of wired CCTV include exceptional picture quality, high quality cabling type such as Cat5
which allows the camera image to be seen or recorded without any interference and also that the system is
almost impossible to Jam with frequency blockers [10].Whereas on the other hand, Wireless CCTV is used to
send images through analogue signals. The latest technology in wireless CCTC systems include high-speed,
highly-encrypted and a very secure data transfer to get images from the camera to the receiving unit. Some of its
benefits include that their cameras can send images through wi-fi signal, but can also utilize 3G or 4G and even
satellite signals to send data which results in them being used anywhere and even the most remote site or area
can be protected. The latest technology utilizing wireless IP camera CCTV system ensure an exceptionally high
quality picture with less chances of interference from car alarms, baby monitors or microwave ovens. IP camera
systems will also allow for a multitude of cameras on a single system without the fear of any interference.In this
article, we will be featuring two big brands of CCTVs—Panasonic and Geovision, however, there are much
more other brands offering similar models and functions as well. Both of these brands have a wide range of
products that specializes on different purposes. Some of the types/models of CCTV cameras offered by these
brands are explained as follows:
4.1DOME CCTV CAMERA
Dome CCTV cameras are most commonly used for indoor security and surveillance applications. These cameras
get their name after the shape of their housing. These housing are designed to
make the CCTV cameras unobtrusive, i.e. not covert or hidden [11]. The dome
shape of the camera makes it difficult to tell whatdirection these cameras are
facing, thus are ideal for deterring criminals. Some units that allow the CCTV
camera to pan/tilt/zoom and spin quickly within the housing are often referred to as speed domes, which gives
the operator the ability to move the camera.
557 | P a g e
4.3 DISCREET CCTV CAMERA
Discreet CCTVs are cameras in disguise in such a way that they could look like a fan, freshener, smoke alarm or
any other thing that would not seem suspicious in the area [12].
These types of CCTV cameras have the ability to see images in pitch black conditions using
infrared LEDs surrounding its Lens and are ideal in outside conditions where lighting is poor
to zero. They are basically designed for evening lookouts [12]
These types of cameras come in both hardwired and wireless that transmit images over the
internet, often compressing the bandwidth so that it doesn’t overwhelm the web. IP cameras
are much easier to install than analogue cameras because they do not require a separate cable
run or power boost to be able to send images over a longer distance [11].
558 | P a g e
4.4.3 WIRELESS CCTV CAMERA
One thing to keep in mind: Not all wireless cameras are IP-based. Some
wireless cameras use alternative modes of wireless transmission. But, no
matter what the transmission method, the primary benefit of these cameras
is still the same, and that is flexibility in installation. These cameras also
may or may not be connected to the internet. They use signaling devices to
transmit images from camera to viewing area [12].
PTZ (Pan/Tilt/Zoom) cameras give the surveillance in charge operator the ability to
move the camera left or right (pan), up and down (tilt), and zoom the lens closer or
farther. These are all relegated to surveillance situations where there is an on the spot
live guard or surveillance specialist monitoring the images. However, there are cameras
that have automated PTZ functionality where the camera is moving on a times basis.
These cameras are many times used to cover a wide area with only one camera, or to
avoid poor light conditions, such as a setting sun [13].
V. CONCLUSION
Based on the research it can be concluded that CCTV Hacking or Penetration is indeed mind boggling yet
simple to achieve. Hacking has played a major role in the growth of the Information Technology positively and
negatively which has open about many good and bad in the industry.While CCTV is always a good option to
have when it comes down to security. Sometimes even CCTV which is meant to be the source of confidence to
the public eyes may at times fall prey to those who seek vision for negative purposes. This documentation
highlights the fact that it is rather easy to hack into a CCTV system for the simple fact that it wasn’t kept in a
secure environment and the username and passwords were not changed from its default passwords. In a nutshell,
all CCTV providers and major company distributors should come up with a solution to solve the very simple
issue with hand. This can be solved by deploying a simple hotfix whereby it requires every CCTV owners to
update their system username and passwords which would make it hard and tougher for hackers to penetrate the
system. Hacking into a CCTV should be not taken lightly for it might just lead the attacker into something very
valuable. Most crime can be prevented with the likes of having cameras around, but when cameras can now be
559 | P a g e
accessed by those who wish to commit crimes, it makes it a lot easier to plan a blind spot to carry out a
successful criminal activity. Greater awareness should be brought to light to all CCTV distributors and users
about the importance of having strong username and passwords and how easy it is to hack into a CCTV if such
default usernames and passwords are not changed.
VI. ACKNOWLEDGMENT
The authors would like to share gratitude to Mr Umapathy Eaganathan, Lecturer in Computing, Asia Pacific
University, Malaysia also Miss Angel Aron for her constant support and motivation helped us to participate in
this International Conference and also for journal publication.
VII. REFERENCES
[1] PCR-UK's PC & Tech Industry , 2014. The history of CCTV. [Online]
Available at: http://www.pcr-online.biz/news/read/the-history-of-cctv-from-1942-to-present/034658
[Accessed 30 3 2017].
[2] Sunday Express , 2014. Armed robbers caught on CCTV putting on their disguises. [Online]
Available at: http://www.express.co.uk/news/uk/529050/Armed-robbers-CCTV
[Accessed 25 3 2017].
[3] Davies, G., 2016. Cyber attack on Russian banks. [Online]
Available at: http://www.dailymail.co.uk/news/article-3926598/Massive-cyber-attack-Russian-banks-
allows-hackers-access-24-000-CCTV-home-video-cameras-30-different-countries-including-U-S.html
[Accessed 29 3 2017].
[4] Wired, 2012. Popular Surveillance Cameras Open to Hackers, Researcher Says. [Online]
Available at: https://www.wired.com/2012/05/cctv-hack/
[Accessed 26 12 2016].
[5] Holmes, S., 2017. CCTV cameras in Washington DC were hacked just days before Donald Trump's
inauguration. [Online]
Available at: http://www.dailymail.co.uk/news/article-4191080/British-man-woman-arrested-CCTV-
Washington-DC-hacked.html
[Accessed 28 2 2017].
[6] Vincent C. Hu, D. F. F. D. R. K., 2006. Access Control System. Maryland, National Institute of Standards
and Technology , pp. 12-15.
[7] Queensland Government , 2007. Crime Prevention Through Environmental Design (CPTED). [Online]
Available at: https://www.police.qld.gov.au/programs/cscp/safetyPublic/Documents/CPTEDPartA.pdf
[Accessed 30 3 2017].
[8] Hutter, D., 2016. Physical Security and Why It Is Important, Sultan Link : SANS Institute .
[9] Gil, P., 2016. IP Address Explained. [Online]
Available at: https://www.lifewire.com/how-ip-addresses-work-on-the-web-2483446
[10] DCUKADMIN, 2016. CCTV Systems Explained. [Online]
Available at: http://www.dcukltd.co.uk/blog/cctv-systems-explained/
560 | P a g e
[11] Wilson, J., 2015. CCTV Cameras. [Online]
Available at: http://www.sonitrolwesterncanada.com/blog/what-type-of-cctv-camera-should-i-buy
[12] cosmotechph, 2014. 10 Different Types of CCTV Cameras and Their Purposes. [Online]
Available at: https://cosmotechph.wordpress.com/2014/09/08/10-different-types-of-cctv-cameras-and-their-
purposes/
[13] Knott, J., 2011. 12 Common Types of Security Cameras. [Online]
Available at: http://www.cepro.com/article/12_common_types_of_security_cameras
561 | P a g e