alastairstevenson
Staff member
Check that the open ports are the ones you expect by doing a full port scan with the ShieldsUp! service : GRC | ShieldsUP! — Internet Vulnerability ProfilingAny guidance is much appreciated.
Check that the open ports are the ones you expect by doing a full port scan with the ShieldsUp! service : GRC | ShieldsUP! — Internet Vulnerability ProfilingAny guidance is much appreciated.
All stealthed? That's good.No ports are listed and the router doesn't respond to UPNP probes.
Port forwarding is only done to the Blue Iris server
Yes, that was clear.Need to access the camera from off site, hence the port forwarding.
he likely only clicked on the upnp test...the other tests are easy to miss below it..it also apprears that the all service port scan only looks at the first 1052 ports...Yes, that was clear.
But I was just curious why the Blue Iris forwarded port did not show up on the ShieldsUp! full port scan.
It suggests the scan was incomplete.
Yes, I think you are right.he likely only clicked on the upnp test.
Maybe that wasn't clear enough. I need to find the bold and font size buttons.doing a full port scan
Well, that's a good step forward.OK, after making adjustment yesterday, it made it through the night without resetting. Hopefully this has taken care of the problem.
There are default NAT/UPnP settings in the camera that will configure open ports in the router, given that the router allows this. It presumably won't now, but I suspect that to clear those that are persisting you need to reboot the router.I found that UPnP was turned on in my router. I've now turned it off and checked my PC on ShieldsUp! as recommended above. I've found that 4 of my ports are open but no idea if a) this is normal and b) how to stealth them if it's not.
Check also the default gateway and subnet mask matches the range of the IP address you've set.I go to log in on the web interface I get "Network Abnormal" on one camera
Do you have the camera connected to an NVR? That will have the original password configured?"The account is locked, please try again 20 minutes later" on the other (a DS-2CD2132-I) ... And yes I've waited 20 minutes
There are default NAT/UPnP settings in the camera that will configure open ports in the router, given that the router allows this. It presumably won't now, but I suspect that to clear those that are persisting you need to reboot the router.
Check also the default gateway and subnet mask matches the range of the IP address you've set.
Do you have the camera connected to an NVR? That will have the original password configured?
It is possible that the password has been changed to something you don't know - the backdoor exploit can be used to do anything, and does not require any of the original passwords to do this.
Once you have them all back to normal, you could consider doing the 'enhanced mtd hack' (assuming these are China market cameras) so that the firmware can be updated to a backdoor-fixed version.
Yes, that's correct.Is that the procedure outlined in this thread: