


You can possibly find the MAC address of the IP camera if you know the device’s brand since the first 6-digits of a MAC address identify the manufacturer ( ).
#IP CAMERA ONLINE HOW TO#
Instead, during the attack the video feedback of the IP camera app was frozen and no notifications were sent when we triggered the sensors with motion and sound.īelow is the code I used for this simple attack (for a more detailed analysis on how to perform a deauthentication attack there is a great article on Hacker Noon):ĭeauthenticating specifically the IP camera (only one client) aireplay-ng -deauth -a -c Įx: aireplay-ng -deauth 1000 -a 11:22:33:44:55:66 -c 00:AA:11:22:33:44 mon0 The camera would on normal occasions detect movement and/or noise and notify the user with an email if something was detected. Having said that, it was possible to disconnect the IP camera from the access point it was connected to ( without having the AP password, as I mentioned earlier, since there wasn’t even the need to connect to the network), making it useless.
#IP CAMERA ONLINE PASSWORD#
The Deauthentication Attack falls under the category of pre-connection attacks, meaning you can disconnect any device from any network before connecting to any of these networks and therefore without the need to know the password for the network. Sequence diagram for a WiFi deauthentication attack
