


To make this work, we'll need to use Wireshark to sniff Wi-Fi traffic between our target computer and the router. If a target has logged in and is viewing images from the security camera from an insecure web app live, it's relatively simple to intercept the web traffic and decode the intercepted packets into image files.

If this is the case, anyone else who knows the Wi-Fi password can see exactly what the target is watching on the security camera. On security cameras, this problem is made much worse if the camera also hosts an insecure webpage where the owner can watch video play directly from the camera. Don't Miss: Disable Security Cams on Any Wireless Network with Aireplay-Ng.

Even worse, some of these devices are designed to be exposed directly to the internet rather than just the internal network. As a result, it's common to see these devices appear on Nmap searches with insecure ports open. Convenience is often more important, so details like ensuring the administration page for a device is secure may seem like an afterthought to some developers. One thing internet-of-things devices typically have in common is a lack of focus on security. This means anyone with the network password can see traffic to and from the camera, allowing a hacker to intercept security camera footage if anyone is watching the camera's HTTP viewing page. It's common for IoT devices like Wi-Fi security cameras to host a website for controlling or configuring the camera that uses HTTP instead of the more secure HTTPS.
