Jump to content
Security Installer Community

Recommended Posts

I've not looked at Axis DVRs.

IP cameras are not the worst but no better than Hikvision.

 

Sorry, I meant the cams

 

Surprised at that as they seem to offer a lot of seemingly esoteric security / IPsec options.

 

Not that that makes them more secure by default, I know.

 

And I've never used Hik IP so can't compare.

So, I've decided to take my work back underground.... to stop it falling into the wrong hands

 

And just to give you an idea of costs and time - it would probably take about 5 days of work for me to say "This DVR with this given firmware in this configuration is secure enough to be on your network" with any level of confidence.

 

If there all fitted to the same standard and specification, surely this would only need doing once for each model/firmware?

Again I would expect the manufacturer to have had this done externally.

 

I also agree with PJ about 1 and 2 being hard to implement on some networks.

Point 3 should be done as standard for anyone with knowledge of setting up firewalls, however, someone with a network background would understand this in more depth than an alarm monkey.

Sorry, I meant the cams

 

Surprised at that as they seem to offer a lot of seemingly esoteric security / IPsec options.

 

Not that that makes them more secure by default, I know.

 

And I've never used Hik IP so can't compare.

 

Yeah, they have a lot more functionality that should keep them secure, but they suffer from the same kind of issues (all running as root, vulnerable services, services you can't turn off etc) as the cheaper cams.

 

One manufacturer put such strong legal threats out to a researcher that he pulled research and a talk - he won't say who it is though.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

If there all fitted to the same standard and specification, surely this would only need doing once for each model/firmware?

Again I would expect the manufacturer to have had this done externally.

 

I also agree with PJ about 1 and 2 being hard to implement on some networks.

Point 3 should be done as standard for anyone with knowledge of setting up firewalls, however, someone with a network background would understand this in more depth than an alarm monkey.

 

Yes, it would need doing once per model at least.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.



×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.