Zeddy
Getting the hang of it
- Jun 19, 2016
- 92
- 42
This thread was just linked by the Krebs on Security blog.
Dahua, Hikvision IoT Devices Under Siege — Krebs on Security
Dahua, Hikvision IoT Devices Under Siege — Krebs on Security
Of course, security is a huge concern in this day and age. Even before the "hacks" of default-passworded devices became publicized, Dahua cams (and probably Hiks too) had been observed communicating with IPs in China for unclear reasons.
For Hiks, I think the answer is two-fold - disable platform access to stop that vector, and then get yourself a nice firewall. I use pfSense, a free, open-source software firewall that runs on an old computer. My pfSense install is setup to do 3 main things to stop attackers:
1) Blue Iris and all cams are VLAN'ed onto a different subnet that can't talk to any other subnet on my LAN - I have long worried that Blue Iris or Hiks might get hacked, and containing them in this way ensures that an attacker couldn't jump to any other devices on my LAN, just because they got in through a device on the VLAN. Note that other devices on the LAN can talk to the security cam VLAN, so managing Blue Iris (or using Remote Desktop to manage the Blue Iris server) is still easy.
2) On the security cam VLAN, pfSense has rules to completely disallow the Hikvision cams to talk to the internet, except for time.windows.com (to set time). This completely prevents the Hiks from phoning home or from being accessed from the WAN. The Blue Iris server gets full outbound access to the WAN, and the inbound access (for remote Blue Iris viewing) has a different default port and is scheduled to only allow access to Blue Iris from the WAN during work hours. The ability to schedule firewall rules like this is one thing that makes pfSense a cut above your regular consumer-level routers.
3) pfSense can be setup to provide all major forms of VPN, and configuring it properly is a 10 minute job. Any access to Blue Iris (or other systems on the LAN) that is needed outside of work hours can be accomplished just by VPN-ing in and loading Blue Iris.
Considering one can easily spend $200 for a fancy all-in-one wireless A/C router from Netgear or Linksys, I think it's a comparatively great deal to get something like an old i3-3220 computer, paired with a Ubiquiti UAC-AC-Lite wireless access point, a basic, managed gigabit switch, and a second gigabit network card for your pfSense box. All together, these items cost about the same as a $200 router, but can be configured to be way more secure than a consumer router ever could.
Do you see any knocks in the firewall logs from the cameras trying to connect to random IP's?
I use a different method. I have a pfSense appliance rather than installation on an old pc. I have a Hikvision NVR on my lan and I've assigned the cameras a non-routable IP, 192.168.254.x.I use pfSense, a free, open-source software firewall
I use a different method. I have a pfSense appliance rather than installation on an old pc. I have a Hikvision NVR on my lan and I've assigned the cameras a non-routable IP, 192.168.254.x.
My NVR does have a routable IP and is assigned as a gateway to the cameras.
This arrangement allows me use my linux browser to view individual camera's on 192.168.254.x or from the NVR (in a different room).
pfSense log show no activity from my NVR out to the world and since the camera's are non-routable they can't go past the lan. I don't recall what I did to allow NVR to getting time signals, it's right on time and nothing is in the log file. I'll have to look into that again.
I set up a vpn to access when I am away. No port forwarding. Works well on Apple mobile devices.
The vlan seems like a good idea but it would require me to do more research on an already working system that I hope is sufficiently secure. Your comment about being on a different subnet is certainly worth considering a major reconfig of my system.
montecrypto, all, Hikvision has just sent a bulletin to dealers about a "Privilege-Escalating Vulnerability" Is this related to your backdoor report or different?
A bit late now - but you could have done the whole lot at once with the Hikvision Batch Configuration Tool : Hangzhou Hikvision Digital Technology Co. Ltd.I do wish Hikvision Tools had a firmware update feature built into it, rather than having to update from the camera interface.
A bit late now - but you could have done the whole lot at once with the Hikvision Batch Configuration Tool : Hangzhou Hikvision Digital Technology Co. Ltd.
Maybe get it for next time ...
If you don't allow internet access inbound, and you trust your local network, the probability of an exploit is very low.I can't update it and have to live with it.
I don't regret buying from China, but I was able to do the 'MTD hack', convert to EN and update to the 5.4.5 firmware.That's the downside of buying if from China...
A bit late now - but you could have done the whole lot at once with the Hikvision Batch Configuration Tool : Hangzhou Hikvision Digital Technology Co. Ltd.
Maybe get it for next time ...