The research team worked with a proxy software known as Charles which was used for
the interception of serial numbers after which it was modified while using the serial number
of another camera. The team revealed that it was quite easy to determine these serial numbers
which match their target through the use of APK and API endpoint. For this, they worked with
both OzVision’s tunnel and the Swann’s website API. As a result, they were successful in getting
into the video stream of the camera with the new serial number. This breach means that they
could hear and watch the video streams of each other’s cameras. A team member explained
that at this ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.