I was recently given 3 rather locked-down network cameras. Each camera was pre-programmed to communicate with a specific website, and only attach to a predefined wireless access point. Naturally, there was no supplied username or password. I thought about how I might get access. Using a man-in-the-middle attack to sniff the password, or trying to […]
Continue reading →