Hikvision Defaulted Devices Getting Hacked

johnyfalco

n3wb
Joined
Feb 16, 2017
Messages
5
Reaction score
3
Location
Australia
Yes. I have been locked out of two of my HikVision cameras that had not had the default password changed.


Sent from my iPhone using Tapatalk
 

h_2_o

Young grasshopper
Joined
Feb 3, 2016
Messages
45
Reaction score
0
I would say this is not really getting hacked and more some kid is changing the password on someone's cam that is to dumb to change the default passwords. 2 different things IMHO.
 

fenderman

Staff member
Joined
Mar 9, 2014
Messages
36,906
Reaction score
21,282
I would say this is not really getting hacked and more some kid is changing the password on someone's cam that is to dumb to change the default passwords. 2 different things IMHO.
There is more to it...based on the article and the comments, it appears (at least for now) that this password change occurred on devices that only have the 8000 server port open....unless you can change the password via ivms(with only the server port open) they must have been doing something else to gain access to the camera.
 

Camit

Pulling my weight
Joined
Feb 7, 2017
Messages
412
Reaction score
122
Don't hikvision make you change the password when you first setup the camera? Also why would you have port 8000 open.
 

fenderman

Staff member
Joined
Mar 9, 2014
Messages
36,906
Reaction score
21,282
Don't hikvision make you change the password when you first setup the camera? Also why would you have port 8000 open.
read the article, this affects devices running older firmware...
Because hikvision uses port 8000 to communicate with hikvision apps..
 

Trax95008

Getting the hang of it
Joined
Apr 22, 2016
Messages
303
Reaction score
52
i think it was a rhetorical question. like "who in their right mind would have port 8000 open" anyone who knows what they are doing would forward a different "public" port to 8000
 

fenderman

Staff member
Joined
Mar 9, 2014
Messages
36,906
Reaction score
21,282
i think it was a rhetorical question. like "who in their right mind would have port 8000 open" anyone who knows what they are doing would forward a different "public" port to 8000
I don't think so.. Anyone who knows what they're doing won't forward any ports ..
 

nayr

IPCT Contributor
Joined
Jul 16, 2014
Messages
9,329
Reaction score
5,325
Location
Denver, CO
changing port numbers does nothing, its very easy to fingerprint services running on any port and with all the bots out there they can scan every IP on the internet and fingerprint every available service and usually versions too without much effort.

Your getting scanned for attack surfaces pretty much the moment your exposed to the internet.. Obfuscation wont help you at all.
 

hmjgriffon

Known around here
Joined
Mar 30, 2014
Messages
3,386
Reaction score
979
Location
North Florida
In fact there is a program out the that will scan one port on the entire internet in like 5 minutes.

Sent from my Nexus 6P using Tapatalk
 

Securame

Pulling my weight
Joined
Mar 25, 2014
Messages
664
Reaction score
214
Location
Barcelona, Spain
There is more to it...based on the article and the comments, it appears (at least for now) that this password change occurred on devices that only have the 8000 server port open....unless you can change the password via ivms(with only the server port open) they must have been doing something else to gain access to the camera.
You can change the password with only the server port (manually can be done from both iVMS-4200 and even iVMS-4500).

For those using password "12345", well, doh... 3 years and a half ago I found an indian company that had 1612 (!!!!) Hikvision devices online with "12345" password, I even wrote an entry on our company blog about it.
Passwords por defecto en un equipo de CCTV: lo que NO hay que hacer - Securamente - El blog de Securame
 

fenderman

Staff member
Joined
Mar 9, 2014
Messages
36,906
Reaction score
21,282
You can change the password with only the server port (manually can be done from both iVMS-4200 and even iVMS-4500).

For those using password "12345", well, doh... 3 years and a half ago I found an indian company that had 1612 (!!!!) Hikvision devices online with "12345" password, I even wrote an entry on our company blog about it.
Passwords por defecto en un equipo de CCTV: lo que NO hay que hacer - Securamente - El blog de Securame
I no longer have 4500 installed but I don't recall an option to change the password...
 

Securame

Pulling my weight
Joined
Mar 25, 2014
Messages
664
Reaction score
214
Location
Barcelona, Spain
It has not been there forever, but it surely has been there for a while. It even warns you when adding a device if the password is "insecure".

Screenshot_20170304-230633.jpg Screenshot_20170304-230643.jpg
 

skeet25

Young grasshopper
Joined
Dec 5, 2014
Messages
69
Reaction score
2
What is the exposure for those NVRs that were hacked, and subsequently recovered via an admin password change? Any risk of malicious scripts left behind by the hackers?
 

ttumms123

n3wb
Joined
May 22, 2015
Messages
15
Reaction score
0
Apart from ports 80,554 and 8000 there is also port 443 opened on my router. Anyone know what is it for? Seems like this is the where the attack came from.
 
Top