The Internet of Things is slowly turning into the world’s largest crappy robot, with devices seemingly designed to be insecure, all waiting to be rooted and exploited by anyone with the right know-how. The latest Internet-enabled device to fall is a Motorola Focus 73 outdoor security camera. It’s quite a good camera, save for the software. [Alex Farrant] and [Neil Biggs] found the software was exceptionally terrible and would allow anyone to take control of this camera and install new firmware.
The camera in question is the Motorola Focus 73 outdoor security camera. This camera connects to WiFi, features full pan, tilt, zoom controls, and feeds a live image and movement alerts to a server. Basically, it’s everything you need in a WiFi security camera. Setting up this camera is simple – just press the ‘pair’ button and the camera switches to host mode and sets up an open wireless network. The accompanying Hubble mobile app scans the network for the camera and prompts the user to connect to it. Once the app connects to the camera, the user is asked to select a WiFi connection to the Internet from a list. The app then sends the security key over the open network unencrypted. By this point, just about anyone can see the potential for an exploit here, and since this camera is usually installed outdoors – where anyone can reach it – evidence of idiocy abounds.
Once the camera is on the network, there are a few provisions for firmware upgrades. Usually, firmware upgrades are available by downloading from ‘private’ URLs and sent to the camera with a simple script that passes a URL directly into the shell as root. A few facepalms later, and [Alex] and [Neil] had root access to the camera. The root password was ‘123456’.
While there’s the beginnings of a good Internet of Camera in this product, the design choices for the software are downright stupid. In any event, if you’re looking for a network camera that you own – not a company with a few servers and a custom smartphone app – this would be near the top of the list. It’s a great beginning for some open source camera firmware.
Thanks [Mathieu] for the tip.
Wanting to repair his much-used NES controllers [Michael Moffitt] sourced a replacement for the rubber button pads. They didn’t work all that well but he fixed that by using angle clippers on the part that contacts the PCB traces.
Here’s a neat Claw Game project show-and-tell video. [Thanks David]
We already know that [Bunnie] is building a laptop. Here’s an update on the project.
Hackaday alum [Caleb Kraft] continues his helpful hacking by adding an alternative to clicking an Xbox 360 stick.
[Blackbird] added a camera to the entry door of his house. He didn’t want to forget to shut it off (wasting power) so he built an automatic shutoff.
We’re not really sure what this computational photography project is all about. It takes pictures with the subject illuminated in different colors then combines individual color channels with a MATLAB script.
Finally, [Dave Jones] tears down a Nintendo 64 console on a recent EEVblog episode.
[Zitt] has a security camera which will send him messages any time it detects motion. However annoying this might seem, we’re sure he has his reasons for needing this much immediate feedback. The real problem comes when he goes to view the feed on his iPhone. His solution is to turn the camera’s notifications off, and use his own script to transcode a clip and shoot off an email.
As you can see above, the end result is a concise email that includes the recently captured clip, as well as links to the live feed. He has been storing the clips on an LG N4B2 Network Storage Server (NAS) and since he’s got root access to the Linux system on the device it was an easy starting point for the new system. After he compiled FFmpeg from source (which handles the transcoding) he started work on the script which backs up the recordings and sends the email messages.
One thing he wants to add is a method to clear out the old backup videos. Having encountered a similar issue ourselves we decided to share our one-liner which solves the problem. Find it after the break.
Continue reading “NAS-based transcoding facilitates security cam viewing on iPhone”
[Valentin] used a simple concept to build this auto-reversing rotating platform. The concept is extremely simple, the leads for the motor are attached to a double-pole double-throw switch which allow the polarity to be reversed. Flip the switch in one direction and it spins clockwise. Flip it in the other direction and it spins counter-clockwise.
In this case, he’s harnesses the power of the most useless machine. That often seen hack uses a similar switch, but accomplishes nothing by having the moving parts act as the actuator. This one is useful, taking advantage of a single or double arm to flip the switch and make the platform spin backwards. In the video after the break you can see it’s used to create a scanning security camera. But [Valentin] also shows it at work as a turntable for salable goods. We think’s the gearing is a little brisk for both purposes, but slowing it down is a hack for another day. Continue reading “Rotating platform makes most useless machine concept useful”