Might be worth a look -->
Im having a bit of trouble from a neighbor so I installed a cctv camera
It seems to be working ok Using CMS265 for PC and CamHipro on phone
Changed password in CamHipro and thought all was good until neighbor complained and said their privacy was being compromised and that they had photos (or video not sure) from the camera to prove it'
I have the cameras connected by cable only, there house is about 25mtrs away is it possible they are connecting to the RTSP stream somehow ?
I just want to monitor my fence line, Cameras connected by a UID ssrt-384756-domfr (not real) wired only no wireless.
Any help would be great, or maby I can PM someone with the real details to see if they can login
Thanks Thomo
Look Here -> |
Might be worth a look -->
RedXT (10-05-21)
Sounds like you are not on the best of terms with neighbour so just ignore their protestations.
Just remember there are probably hundreds/thousands of cctv cameras installed around every city by the various authorities - our privacy is definitely being compromised but are unable to do anything about it.
If Australia is a democracy why, then, is voting compulsory?
"What has changed between the arrival of the First Fleet and today?"
"Wearing leg irons is now not required."
If the camera isn't looking directly into their property, eg: up high looking into their yard or pointed directly at their windows, etc, they have no claim against you.
RedXT (10-05-21)
Great viewing and well explained (although a bit over my head) . My camera starts with the SSAA has the Hichip firmware V19.1.11.16.3-20200713 which should be ok if thats 2020 or later.
I might try setting up a second router without internet access for the cameras, would that be effective ?. I dont need to view it remotely.
thanks Thomo
let him go to the cops with the evidence, he will then be done for
hacking a private network
when you set it up, was there an option to password protect the wifi? - just wondering if the wifi is open and even though you are not using it - it has activated somehow and they just sniffed the open wireless network and connected to it that way??
f
有段者
do you really believe that it has been hacked or is there a bit of bullshit being poked at you with half baked assumptions enough to convince you get more details or tell them to fvckoff
When I set it up it asks to connect to my wifi which i did, then after it was working I changed over to cable, I changed the password in the camera.
I had a couple of problem and reset the camera a few times and its possible the camera was running for a day or more with the default password ADMIN and ADMIN before I changed it.
I have since reset the camera connected to cable only and changed the password.
cheers thomo
It doesn't matter whether the camera is connect via cable only, if it's on the same subnet as your WiFi access point then it's accessible across your LAN, they only need to guess the password (or be lucky enough to try when the default passwords were active).
RedXT (11-05-21)
My partner ran into the woman next door on sunday and brought up the privacy thing and what she described about the camera positioning makes me believe that they had access to the live feed at some time.
I have since redirected it as MTV outlined, and as fandtm666 suggested "let eh go to the cops"
Thanks Thomo
Quick update, the camera uses HiCampro to view on the WWW so I blocked the camera IP on the router and tested it NO MORE CONNECTION.
Also changed router, wireless and camera passwords.
one last thing anyone that has a P2P CCTV camera should view wotnots link (#2) above on the subject its very interesting
cheers thomo
Last edited by RedXT; 11-05-21 at 10:15 AM.
Also on a side note if you are using wireless the first thing i do is give my
SSID a name i remember then disable its broadcast in the router.
no one will even know because it does not show when doing a scan
unless you specify its name.
Regardless of how they got access to your camera, the fact that they did, and the sour relationship suggests that there's a good chance that they'll have a go at getting onto your personal computers. There are a few things that you can do to harden your wireless network to help prevent this, such as:
- Disable WAN (internet) and wireless access to configuration pages for things like routers, printers, etc.
- Make passwords and passphrases on everything complex (alphanumeric, special characters, long, etc) and don't use default passwords for anything.
- Use MAC address filtering (only allow devices you know to access your network) - If you can, use the guest network to allow visitors temporary access to your internet connection. Disable it when not in use.
- Don't use default TCP/UDP ports when allowing WAN access to devices. Also, use something like to ensure your router isn't responding to unsolicited communications.
- Use a WPA2 passphrase on your wireless LAN.
- Update firmware on devices that offer security fixes (eg. router).
- Disable or limit the number of DHCP leases available on your LAN.
Bookmarks