So what if the camera is on the internet?

Also available in: Polski Polski

Sekurak [1] [ Polish portal providing substantive information on cyber security.] recently published an article about cameras at one of the railway stations being directly accessible from the internet. Comments such as ‘so what?’ quickly appeared under the post. At first glance, it may indeed seem that this is not a big deal – just an image from one camera.

The problem begins when we look at such data through the prism of today’s analytical capabilities. In the age of AI, image recognition and big data analysis, even a single video source can provide very valuable information: about the movement of people, behaviour patterns, meetings or logistics in a given place.

It is worth comparing this seemingly trivial situation with a recent report by The Telegraph, which stated: ‘Israel hacked Tehran’s traffic cameras to spy on Khamenei […] Israel hacked nearly all of Tehran’s traffic cameras to spy on Ali Khamenei before launching an attack to kill Iran’s supreme leader.’ This shows that camera infrastructure – especially when it covers public spaces – can have significance far beyond simple surveillance.

Even a single camera at a station, with audio enabled or not, can be a very valuable source of information. What is more, it is easy to be misled into thinking that such a device is only a passive sensor. In practice, however, an IP camera is nothing more than a small computer connected to a network.

This means that it often runs on an old, outdated operating system with a vulnerable web interface and many known security vulnerabilities. In such a scenario, the camera can become an entry point into the infrastructure, act as a jump host, enable network reconnaissance, and even lead to privilege escalation through vulnerabilities in the management interface (e.g., XSS or other classic web application errors).

In short, it is not just a camera. It is an element of IT infrastructure operating in a very sensitive location.

Additionally, I am willing to bet that the first thing the “administrator” of this camera did after receiving information that it was accessible from the Internet was to panic and log in from their workstation (with a million other tabs open, cached permissions, and perhaps even an administrative account). He logged into the unfortunate camera to check and “change the password”. If the editors of Sekurak could log into it, so could thousands of others. They might not have been so nice and could have modified its software and introduced malicious modifications to its code. Such devices should be treated as compromised and dangerous. Just as a doctor would treat a patient who came to a visit with bleeding tears and blisters on their skin.

And if we start to consider scenarios in which the compromise of such infrastructure could lead to real, kinetic effects in the physical world… that’s a topic for a separate post.

[1] https://www.linkedin.com/posts/michal-sajdak_kamera-z-jednego-z-polskich-dworc%C3%B3w-by%C5%82a-activity-7431610592974594048-2v82?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAEbrCYBiG9XAnLpx0DqmwqjjuBF1MrYIkE

[2] https://www.telegraph.co.uk/world-news/2026/03/03/israel-hacked-iranian-traffic-cameras-to-spy-on-khamenei/

odkurzacz iLife LINKI

https://github.com/kbickham/iLife_Robotic_Vaccum_v3s_Reverse_Engineer/blob/master/README.md

https://github.com/EliasKotlyar/IlifeX5Disassembly

https://github.com/ksya/ILIFERobot

https://github.com/ksya/ILIFERobot

http://roboforum.ru/forum90/topic16676.html

https://github.com/linvinus/open_ilife

https://github.com/Arduino-IRremote/Arduino-IRremote/issues/354

https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjyqteKnOztAhUrpIsKHQ0fCVEQFjAGegQIFxAC&url=https%3A%2F%2Fdigikogu.taltech.ee%2Fen%2FDownload%2F6e438e93-2137-4a84-8134-2c50250c205b&usg=AOvVaw0DPS3RBY0EiHd_p3Omm-7W

Bring About World Peace… ?

Also available in: Polski Polski

Interesting excerpt from Microchip‘s application note  AN1375 :

48. Bring About World Peace
Admittedly, World Peace is still being worked on. It’s
possible that it is beyond the scope of the CTMU, or it
could be that it hasn’t been given enough time.
Perhaps this issue is one that can be left to the readers.

MS Exchange 2010 and NTFS block size

Also available in: Polski Polski

THIS IS AUTOMATIC TRANSLATION…

Because Im looking for these information quite often…

Description Recommended Value
Storage Track Boundary 64K or Greater (1MB Recommended)
NTFS Allocation Unit/Cluster Size 64KB (Database & Log Partitions)
RAID Stripe Size 256KB or Greater

 

And command for disk format:

Format <DriveLetter>: /q /y /fs:ntfs  /v:<VolumeName> /a:64K

Remote Desktop Session Hijacking

Also available in: Polski Polski

THIS IS AUTOMATIC TRANSLATION…

I do not know how people get so excited … It is obvious that the SYSTEM can get into memory each process so why such WoW, that having the SYSTEM account, you can switch to a different logged-on user?

Can dlatemu, that you can have more privileges (e.g. Domain Admin). However, please note that:

  1. To use the method of switching on the SYSTEM you must be an administrator for the server on which this account is obtained.
  2. M $ and not only say that you should work with the lowest possible privileges so why anyone sane would sign such as the Enterprise permissions on these permissions are not the computer where the Admin’a needs and that can be compromised? Read: https://technet.microsoft.com/en-us/library/cc700835.aspx and quote: “Do not use service administrator accounts for day-to-day administrative tasks, such as account and member server management; Instead, use your regular user account. “” D[..]omain Admins credentials are required to perform the following steps: [..]”

But what what do you mean?

  1. We find the computer on which we have Admin and logged inadvertently Admin domain. We can help you with: query user
  2. change the permissions on the SYSTEM:
    PsExec-s \localhost cmd
  3. lists sessions (we remember our session and the session name of the victim), of course, better to the victim’s session has been inactive;-P
  4. Switching on the victim’s sessions:
    TSCON <numer naszej="" sesji="">/dest:<nazwa sesji="" ofiary=""> </nazwa> </numer>
  5. We look forward to;-)

And for those who prefer movies here’s a YouTube version: