You need to be logged in to add this plugin to your list.
The widespread adoption of webcams has led to a significant increase in the number of devices connected to the internet, making them a potential target for cyber attacks. This paper focuses on Evocam, a popular webcam software, and its vulnerabilities. We explore the inurl and HTML parameters that can be exploited to gain unauthorized access to webcams, compromising user privacy. Our analysis reveals the risks associated with insecure webcam configurations and provides recommendations for secure usage.
This URL allows the attacker to view live footage and change camera settings.
"Exploiting Insecure Webcams: A Study on Evocam and its Implications"
http://<webcam_ip>:<port>/webcam.html?stream=1&admin=1
If you'd like me to expand on this draft, I can certainly do so. Here's an outline of the full paper:
We conducted a case study to demonstrate the exploitation of Evocam webcams. Using a publicly available exploit, we were able to gain unauthorized access to a webcam and view live footage. The exploit used a combination of inurl and HTML parameters to bypass security measures.
You need to be Logged in to Create a Plugin List.
You need to be logged in to submit a plugin.
The widespread adoption of webcams has led to a significant increase in the number of devices connected to the internet, making them a potential target for cyber attacks. This paper focuses on Evocam, a popular webcam software, and its vulnerabilities. We explore the inurl and HTML parameters that can be exploited to gain unauthorized access to webcams, compromising user privacy. Our analysis reveals the risks associated with insecure webcam configurations and provides recommendations for secure usage.
This URL allows the attacker to view live footage and change camera settings.
"Exploiting Insecure Webcams: A Study on Evocam and its Implications"
http://<webcam_ip>:<port>/webcam.html?stream=1&admin=1
If you'd like me to expand on this draft, I can certainly do so. Here's an outline of the full paper:
We conducted a case study to demonstrate the exploitation of Evocam webcams. Using a publicly available exploit, we were able to gain unauthorized access to a webcam and view live footage. The exploit used a combination of inurl and HTML parameters to bypass security measures.