SlideShare a Scribd company logo
1 of 24
Surveillance Using Spare Stuff
Matt Scheurer
(@c3rkah)
Slides: http://www.slideshare.net/cerkah
About me...
Disclaimer
The informational material presented is for
educational purposes only. The presenter is not
responsible for its use or misuse. No
warranties or guarantees implied or otherwise
are in effect. Use of these tools, techniques and
technologies are at your own risk!
Seek qualified legal advice...
● Consult an attorney
familiar with the laws
and ordinances in
your area before
conducting any
surveillance activity.
The journey begins…
● How it all got started
– Driven to find a use for my old smart phones
– Decided that IP cameras sounded like a fun project
– Low cost / low barrier to entry
Why conduct surveillance?
● Protect physical assets from threats
– Dumpster diving
– Theft
– Vandalism and destruction
● Protect physical barriers or perimeters from threats
– Lock picking
– Social engineering (infiltration)
– Trespassing
Components of an effective
surveillance system
● Centralized management
● Monitoring and detection
● Collecting video and/or audio
● Alerting
● Minimizing false alarms
● Archiving and retrieval
Spare or low cost equipment
Spare stuff item: Old smart phone
● Why old smart phones make
good IP cameras
– Pocket size computer
– Decent quality built-in
cameras
– Built in microphone
– Built in WiFi support
– Easy to power
– Often support extra storage
– Inconspicuous (can be hidden
in plain sight)
Spare stuff item: Old Router
● Many support open
source firmware such
as DD-WRT, Tomato,
etc.
● Lend themselves well
to network
segmentation.
Spare stuff item: Old Computer
● An old computer (or
VM) may be re-
purposed to run Linux
with ZoneMinder.
● May need beefier
system for monitoring
a large number of
cameras with
ZoneMinder.
Spare stuff item: Reflector Lamp
● Optionally used with
an IR light bulb to
flood a wide area with
IR light for night
vision cameras
● Caution: IR bulbs are
commonly sold as
heat lamps and often
run extremely hot!
Spare stuff items: Old tablets or IP
cameras
●
Typically more expensive options
– Occasionally listed at sales prices from deal or auction sites
●
Dedicated IP cams with built-in motion control and IR are a big plus
●
Integration efforts
– Combine any number of devices into an effective surveillance system
Night Vision Notes:
● All cameras are capable of night vision, but IR light alone will
not give a camera “night vision”
● Camera's may be disassembled to remove the IR filter to
capture or record images in darkness with IR
– Typically a darker red, blue, or purple colored film
● Caution: Removing an IR filter causes cameras to wash out
images with normal or bright lighting
– Workaround: Consider using two separate cameras in the same
area, one for normal lighting and one for darkness
Using smart phones as IP Cams
● Many free and low-cost apps are available in the
main app stores enabling your old smart phone to
function as a network IP camera
– Many of these apps support a wide variety of browsers or
various streaming protocols
– These provide a number of ways to monitor a small
number of IP cameras
● Free and low-cost apps are available which provide
simultaneous IP camera monitoring for multiple
cameras
Centralized management
● Highly recommend “ZoneMinder”
http://www.zoneminder.com/
ZoneMinder is a free video camera security application suite,
designed for low cost DIY video security including
commercial or home CCTV, theft prevention and child or
family member monitoring including nanny cam applications.
It supports capture, analysis, recording, and monitoring of
video data coming from cameras attached to a Linux system.
Motion detection, emailed alerts and remote viewing are also
supported.
What about audio?
● Unfortunately ZoneMinder does not yet support
audio recording, which is reportedly a feature
on their development road map.
● VLC player works well for most audio streams
– VLC player can output audio streams to WAV
format
● Advanced Preferences > Output modules > File
● Resulting WAV files can then be encoded to a
compressed audio format manually or through scripting
ZoneMinder Camera Functions
● None: Turns off all camera activity
● Monitor: Live streaming only mode
● Modect: For motion detected still snapshots
● Record: Live video recording mode
● Mocord: Motion detection triggered recording
● Nodect: External controlled triggers and actions
NOTE: These settings only impact the camera in
ZoneMinder
Configuring Alerting
● ZoneMinder Console > Options > Email
● Consider setting “Email Address” to a distribution group,
including relavent cell phone carriers text message
domains for added text alerting
The power of defined hot zones
● One of the keys to using
ZoneMinder successfully is
the concept of zones. Zones
are areas within an image
that you can define for the
purposes of motion
detection, or even ignoring
motion.
● Helps minimize false alarms
Archiving and retrieval
● Backup the following directories:
– /usr/share/zoneminder/events
– /usr/share/zoneminder/images
● Another option would be to synchronize those
folders with off-site cloud based storage
Good Practices
● Never put an IP camera directly on the internet
– Lest your own security cameras be used against you...
– Use VPN for remote camera monitoring
● Follow good network security practices
– Segment your IP cameras from the rest of your network
with appropriate access controls in place
● Change all default logins to use strong passwords
● Set unique SNMP strings from other systems and
network devices
Patches and Updates
● Keep all camera
firmware, phone
firmware, software,
and the ZoneMinder
host OS up-to-date
– ZoneMinder may
seem like an
appliance, but it runs
on top of a live system
Thank You's and Shout Outs!

More Related Content

What's hot

CCTV camera by_osama_noori
CCTV camera by_osama_nooriCCTV camera by_osama_noori
CCTV camera by_osama_nooriOsama Noori
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
01 ip cctv suervilence overview
01 ip cctv suervilence overview01 ip cctv suervilence overview
01 ip cctv suervilence overviewNader Elmansi
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
What components make up a cctv system
What components make up a cctv systemWhat components make up a cctv system
What components make up a cctv systemAaronTAYLOR05
 
Shri pps
Shri ppsShri pps
Shri ppslshri
 
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Corporate Services
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
Cctv price list in bangalore 9035 806667
Cctv price list in bangalore  9035 806667Cctv price list in bangalore  9035 806667
Cctv price list in bangalore 9035 806667CCTV Bangalore
 
Video Door Phone
Video Door PhoneVideo Door Phone
Video Door PhoneBioEnable
 

What's hot (20)

CCTV camera by_osama_noori
CCTV camera by_osama_nooriCCTV camera by_osama_noori
CCTV camera by_osama_noori
 
CCTV
CCTVCCTV
CCTV
 
3.2 IP CCTV lenses
3.2 IP CCTV lenses3.2 IP CCTV lenses
3.2 IP CCTV lenses
 
PRINSIPLES OF CCTV
PRINSIPLES OF CCTVPRINSIPLES OF CCTV
PRINSIPLES OF CCTV
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
01 ip cctv suervilence overview
01 ip cctv suervilence overview01 ip cctv suervilence overview
01 ip cctv suervilence overview
 
Security camera
Security cameraSecurity camera
Security camera
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
Cctv presentation
Cctv presentationCctv presentation
Cctv presentation
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
What components make up a cctv system
What components make up a cctv systemWhat components make up a cctv system
What components make up a cctv system
 
Shri pps
Shri ppsShri pps
Shri pps
 
CCTV Basic
CCTV BasicCCTV Basic
CCTV Basic
 
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
CCTV Camera- A Hand Book
CCTV Camera- A Hand BookCCTV Camera- A Hand Book
CCTV Camera- A Hand Book
 
Cctv price list in bangalore 9035 806667
Cctv price list in bangalore  9035 806667Cctv price list in bangalore  9035 806667
Cctv price list in bangalore 9035 806667
 
Video Door Phone
Video Door PhoneVideo Door Phone
Video Door Phone
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 

Similar to DerbyCon: Surveillance Using Spare Stuff

Video Surveillance
Video SurveillanceVideo Surveillance
Video SurveillanceMihika Shah
 
CCTV & Security Products
CCTV & Security ProductsCCTV & Security Products
CCTV & Security ProductsGabriel Vasquez
 
CCTV and Security Products
CCTV and Security ProductsCCTV and Security Products
CCTV and Security ProductsGabriel Vasquez
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
A User's Guide to Conbrov Dv089 Tiny PIR Security Camera user manual
A User's Guide to Conbrov Dv089 Tiny PIR Security Camera user manualA User's Guide to Conbrov Dv089 Tiny PIR Security Camera user manual
A User's Guide to Conbrov Dv089 Tiny PIR Security Camera user manual志锋 严
 
Assignment sheet cctv
Assignment sheet cctvAssignment sheet cctv
Assignment sheet cctvAnuragSagar8
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
Is A Security Camera System Worth Your Money: Why Do You Need It?
Is A Security Camera System Worth Your Money: Why Do You Need It?Is A Security Camera System Worth Your Money: Why Do You Need It?
Is A Security Camera System Worth Your Money: Why Do You Need It?Megan Stalter
 
Video Surveillance Report
Video Surveillance ReportVideo Surveillance Report
Video Surveillance ReportMihika Shah
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentationmaitretester
 

Similar to DerbyCon: Surveillance Using Spare Stuff (20)

SECURITY SYSTEM.pptx
SECURITY SYSTEM.pptxSECURITY SYSTEM.pptx
SECURITY SYSTEM.pptx
 
Video Surveillance
Video SurveillanceVideo Surveillance
Video Surveillance
 
Sdl cctv sms v_ 4.0
Sdl cctv sms v_ 4.0Sdl cctv sms v_ 4.0
Sdl cctv sms v_ 4.0
 
Security Products
Security ProductsSecurity Products
Security Products
 
CCTV & Security Products
CCTV & Security ProductsCCTV & Security Products
CCTV & Security Products
 
CCTV and Security Products
CCTV and Security ProductsCCTV and Security Products
CCTV and Security Products
 
Security system
Security systemSecurity system
Security system
 
Cctv report
Cctv reportCctv report
Cctv report
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
A User's Guide to Conbrov Dv089 Tiny PIR Security Camera user manual
A User's Guide to Conbrov Dv089 Tiny PIR Security Camera user manualA User's Guide to Conbrov Dv089 Tiny PIR Security Camera user manual
A User's Guide to Conbrov Dv089 Tiny PIR Security Camera user manual
 
CCTV.pptx
CCTV.pptxCCTV.pptx
CCTV.pptx
 
Assignment sheet cctv
Assignment sheet cctvAssignment sheet cctv
Assignment sheet cctv
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
Advantages of cctv camera
Advantages of cctv cameraAdvantages of cctv camera
Advantages of cctv camera
 
Surveon Video Analysis Solution
Surveon Video Analysis SolutionSurveon Video Analysis Solution
Surveon Video Analysis Solution
 
Is A Security Camera System Worth Your Money: Why Do You Need It?
Is A Security Camera System Worth Your Money: Why Do You Need It?Is A Security Camera System Worth Your Money: Why Do You Need It?
Is A Security Camera System Worth Your Money: Why Do You Need It?
 
Video Surveillance Report
Video Surveillance ReportVideo Surveillance Report
Video Surveillance Report
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentation
 
Body worn camera
Body worn cameraBody worn camera
Body worn camera
 

More from CiNPA Security SIG

CONHESI 2021 - Exploiting Web APIs
CONHESI 2021 - Exploiting Web APIsCONHESI 2021 - Exploiting Web APIs
CONHESI 2021 - Exploiting Web APIsCiNPA Security SIG
 
BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!CiNPA Security SIG
 
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIsPwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIsCiNPA Security SIG
 
CiNPA Security SIG - Exploiting the Tiredful API
CiNPA Security SIG - Exploiting the Tiredful APICiNPA Security SIG - Exploiting the Tiredful API
CiNPA Security SIG - Exploiting the Tiredful APICiNPA Security SIG
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksCiNPA Security SIG
 
OISF - Continuous Skills Improvement for Everyone
OISF - Continuous Skills Improvement for EveryoneOISF - Continuous Skills Improvement for Everyone
OISF - Continuous Skills Improvement for EveryoneCiNPA Security SIG
 
Central Ohio InfoSec Summit: Why Script Kiddies Succeed
Central Ohio InfoSec Summit: Why Script Kiddies SucceedCentral Ohio InfoSec Summit: Why Script Kiddies Succeed
Central Ohio InfoSec Summit: Why Script Kiddies SucceedCiNPA Security SIG
 
OISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec PrimerOISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec PrimerCiNPA Security SIG
 
Butler Tech - Working in IT and InfoSec
Butler Tech - Working in IT and InfoSecButler Tech - Working in IT and InfoSec
Butler Tech - Working in IT and InfoSecCiNPA Security SIG
 
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...CiNPA Security SIG
 
CiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical SecurityCiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical SecurityCiNPA Security SIG
 
CiNPA / CiNPA Security SIG History
CiNPA / CiNPA Security SIG HistoryCiNPA / CiNPA Security SIG History
CiNPA / CiNPA Security SIG HistoryCiNPA Security SIG
 
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!CiNPA Security SIG
 
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?CiNPA Security SIG
 
BSides Cleveland: Active Defense - Helping threat actors hack themselves!
BSides Cleveland: Active Defense - Helping threat actors hack themselves!BSides Cleveland: Active Defense - Helping threat actors hack themselves!
BSides Cleveland: Active Defense - Helping threat actors hack themselves!CiNPA Security SIG
 
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?CiNPA Security SIG
 

More from CiNPA Security SIG (20)

CONHESI 2021 - Exploiting Web APIs
CONHESI 2021 - Exploiting Web APIsCONHESI 2021 - Exploiting Web APIs
CONHESI 2021 - Exploiting Web APIs
 
SecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIsSecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIs
 
BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!
 
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIsPwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
 
CiNPA Security SIG - Exploiting the Tiredful API
CiNPA Security SIG - Exploiting the Tiredful APICiNPA Security SIG - Exploiting the Tiredful API
CiNPA Security SIG - Exploiting the Tiredful API
 
CCC - Lend me your IR's
CCC - Lend me your IR'sCCC - Lend me your IR's
CCC - Lend me your IR's
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal Tricks
 
ISC2: AppSec & OWASP Primer
ISC2: AppSec & OWASP PrimerISC2: AppSec & OWASP Primer
ISC2: AppSec & OWASP Primer
 
OISF - Continuous Skills Improvement for Everyone
OISF - Continuous Skills Improvement for EveryoneOISF - Continuous Skills Improvement for Everyone
OISF - Continuous Skills Improvement for Everyone
 
Central Ohio InfoSec Summit: Why Script Kiddies Succeed
Central Ohio InfoSec Summit: Why Script Kiddies SucceedCentral Ohio InfoSec Summit: Why Script Kiddies Succeed
Central Ohio InfoSec Summit: Why Script Kiddies Succeed
 
AppSec & OWASP Top 10 Primer
AppSec & OWASP Top 10 PrimerAppSec & OWASP Top 10 Primer
AppSec & OWASP Top 10 Primer
 
OISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec PrimerOISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec Primer
 
Butler Tech - Working in IT and InfoSec
Butler Tech - Working in IT and InfoSecButler Tech - Working in IT and InfoSec
Butler Tech - Working in IT and InfoSec
 
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
 
CiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical SecurityCiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical Security
 
CiNPA / CiNPA Security SIG History
CiNPA / CiNPA Security SIG HistoryCiNPA / CiNPA Security SIG History
CiNPA / CiNPA Security SIG History
 
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
 
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
 
BSides Cleveland: Active Defense - Helping threat actors hack themselves!
BSides Cleveland: Active Defense - Helping threat actors hack themselves!BSides Cleveland: Active Defense - Helping threat actors hack themselves!
BSides Cleveland: Active Defense - Helping threat actors hack themselves!
 
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

DerbyCon: Surveillance Using Spare Stuff

  • 1. Surveillance Using Spare Stuff Matt Scheurer (@c3rkah) Slides: http://www.slideshare.net/cerkah
  • 3. Disclaimer The informational material presented is for educational purposes only. The presenter is not responsible for its use or misuse. No warranties or guarantees implied or otherwise are in effect. Use of these tools, techniques and technologies are at your own risk!
  • 4. Seek qualified legal advice... ● Consult an attorney familiar with the laws and ordinances in your area before conducting any surveillance activity.
  • 5. The journey begins… ● How it all got started – Driven to find a use for my old smart phones – Decided that IP cameras sounded like a fun project – Low cost / low barrier to entry
  • 6. Why conduct surveillance? ● Protect physical assets from threats – Dumpster diving – Theft – Vandalism and destruction ● Protect physical barriers or perimeters from threats – Lock picking – Social engineering (infiltration) – Trespassing
  • 7. Components of an effective surveillance system ● Centralized management ● Monitoring and detection ● Collecting video and/or audio ● Alerting ● Minimizing false alarms ● Archiving and retrieval
  • 8. Spare or low cost equipment
  • 9. Spare stuff item: Old smart phone ● Why old smart phones make good IP cameras – Pocket size computer – Decent quality built-in cameras – Built in microphone – Built in WiFi support – Easy to power – Often support extra storage – Inconspicuous (can be hidden in plain sight)
  • 10. Spare stuff item: Old Router ● Many support open source firmware such as DD-WRT, Tomato, etc. ● Lend themselves well to network segmentation.
  • 11. Spare stuff item: Old Computer ● An old computer (or VM) may be re- purposed to run Linux with ZoneMinder. ● May need beefier system for monitoring a large number of cameras with ZoneMinder.
  • 12. Spare stuff item: Reflector Lamp ● Optionally used with an IR light bulb to flood a wide area with IR light for night vision cameras ● Caution: IR bulbs are commonly sold as heat lamps and often run extremely hot!
  • 13. Spare stuff items: Old tablets or IP cameras ● Typically more expensive options – Occasionally listed at sales prices from deal or auction sites ● Dedicated IP cams with built-in motion control and IR are a big plus ● Integration efforts – Combine any number of devices into an effective surveillance system
  • 14. Night Vision Notes: ● All cameras are capable of night vision, but IR light alone will not give a camera “night vision” ● Camera's may be disassembled to remove the IR filter to capture or record images in darkness with IR – Typically a darker red, blue, or purple colored film ● Caution: Removing an IR filter causes cameras to wash out images with normal or bright lighting – Workaround: Consider using two separate cameras in the same area, one for normal lighting and one for darkness
  • 15. Using smart phones as IP Cams ● Many free and low-cost apps are available in the main app stores enabling your old smart phone to function as a network IP camera – Many of these apps support a wide variety of browsers or various streaming protocols – These provide a number of ways to monitor a small number of IP cameras ● Free and low-cost apps are available which provide simultaneous IP camera monitoring for multiple cameras
  • 16. Centralized management ● Highly recommend “ZoneMinder” http://www.zoneminder.com/ ZoneMinder is a free video camera security application suite, designed for low cost DIY video security including commercial or home CCTV, theft prevention and child or family member monitoring including nanny cam applications. It supports capture, analysis, recording, and monitoring of video data coming from cameras attached to a Linux system. Motion detection, emailed alerts and remote viewing are also supported.
  • 17. What about audio? ● Unfortunately ZoneMinder does not yet support audio recording, which is reportedly a feature on their development road map. ● VLC player works well for most audio streams – VLC player can output audio streams to WAV format ● Advanced Preferences > Output modules > File ● Resulting WAV files can then be encoded to a compressed audio format manually or through scripting
  • 18. ZoneMinder Camera Functions ● None: Turns off all camera activity ● Monitor: Live streaming only mode ● Modect: For motion detected still snapshots ● Record: Live video recording mode ● Mocord: Motion detection triggered recording ● Nodect: External controlled triggers and actions NOTE: These settings only impact the camera in ZoneMinder
  • 19. Configuring Alerting ● ZoneMinder Console > Options > Email ● Consider setting “Email Address” to a distribution group, including relavent cell phone carriers text message domains for added text alerting
  • 20. The power of defined hot zones ● One of the keys to using ZoneMinder successfully is the concept of zones. Zones are areas within an image that you can define for the purposes of motion detection, or even ignoring motion. ● Helps minimize false alarms
  • 21. Archiving and retrieval ● Backup the following directories: – /usr/share/zoneminder/events – /usr/share/zoneminder/images ● Another option would be to synchronize those folders with off-site cloud based storage
  • 22. Good Practices ● Never put an IP camera directly on the internet – Lest your own security cameras be used against you... – Use VPN for remote camera monitoring ● Follow good network security practices – Segment your IP cameras from the rest of your network with appropriate access controls in place ● Change all default logins to use strong passwords ● Set unique SNMP strings from other systems and network devices
  • 23. Patches and Updates ● Keep all camera firmware, phone firmware, software, and the ZoneMinder host OS up-to-date – ZoneMinder may seem like an appliance, but it runs on top of a live system
  • 24. Thank You's and Shout Outs!