Vibrator Cam

Vibrator Cam




🛑 ALL INFORMATION CLICK HERE 👈🏻👈🏻👈🏻

































Vibrator Cam

For the best user experience please upgrade your browser

Categories


Show all
Android  (70)
Automotive Security  (21)
Aviation Cyber Security  (31)
Blockchain  (3)
Breach Handling  (1)
Careers At PTP  (1)
Cloud Security  (4)
Code Repository  (1)
Consumer Advice  (27)
Cyber Essentials  (1)
Cyber Liability Insurance  (5)
DFIR  (6)
Hardware Hacking  (13)
Heartbleed  (5)
Honeypots  (6)
How Tos  (250)
In the news  (1)
Incident Response  (4)
Internet Of Things  (164)
Macs / Apple  (30)
Maritime Cyber Security  (38)
Opinions  (103)
OT, ICS, IIoT, SCADA  (19)
Passwords  (39)
PCI Advice  (1)
Ransomware  (1)
Red Teaming  (26)
Reverse Engineering  (12)
Security Blog  (699)
Shameless Self Promotion  (8)
Show on homepage  (6)
Social Engineering  (10)
Sustainability  (1)
Virtual Environments  (1)
Vulnerabilities that aren’t  (3)
Vulnerability Advisory  (40)
Vulnerability Disclosure  (10)





See the other cool stuff we've been doing…

Security consulting and testing services
Sometimes, our jaws hit the floor. We see some pretty bad things in IoT security, but this has to take the biscuit. After the WeVibe lawsuit and settlement , we started looking at the security of IoT sex toys again .
Well, that’s the Svakom Siime Eye, a vibrator endoscope. Yes, this thing exists.
It is a pretty normal, slightly awkwardly-shaped vibrator with a camera in the end. It costs $250. But, more relevant than the novelty/enjoyment value of the product and its price, is what it’s running, how we hacked it, and why it’s an interesting case of another IoT device produced without much care or attention.
The Siime Eye normal use-case is in conjunction with an iPhone or Android app. You turn it on, connect to its AP (SSID “Siime Eye”) with the default password (“88888888”), open the app, then ‘insert’ it. The app itself is limited: You can view the live video stream, take pictures or videos and save them to your device. Everything you’d expect from a camera/vibrator, I guess.
The Android app looks a bit like this:
With names like “wingedcamlib” and “skyviper”, it looks a lot like libraries in here were written with drones in mind.
We had a chat with the guys at Sky Viper (who make awesome drone cameras BTW) who were as surprised as us to find their brand name in mobile app code that runs an IoT dildo. They suspect that the early version of the Sky Viper cam control app was partly written by the same guys who wrote the dildo app code.
That’s not everything we can get out of the app though: The “com.SiimeEye” source includes some hard-coded credentials, and a hard-coded IP address and port.
There’s an account called “admin”, with a blank password.
On connecting to the Siime Eye AP with a laptop, we can try the server at 192.168.1.1:80. An authentication box pops up, prompting for a username and password.
It looks a lot like Basic authentication, and the admin:[blank] credentials work.
So, it’s trivial to connect to the AP and auth to the web interface.
Remember, the credentials are hard-coded in the official app, so any user wanting to use the Siime Eye the official way will never change these credentials. If you can get onto the wireless AP, you’ll have instant access to everything on this web application. It allows multiple concurrent connections too, without any fuss at all.
THAT WEB APP SERVES THE VIDEO FROM THE CAMERA! OMG!
Oh, and being a Wi-Fi AP means you can find users too…
This part surprised us the most – using Wi-Fi is logical, given the bandwidth required to stream video, but most IoT devices would be configured to operate as a Wi-Fi client, not an access point. This choice was odd.
Under normal use, the wireless AP name is also static. That means we can query a wardriving site like wigle.net, and find locations where a “Siime Eye” might be. Here’s one seen in Tokyo:
That’s bad enough, but what else could we do? Could we get a root shell and persistence?
The web application is designed for administering a much more general-purpose camera, one attached to a drone, for example. We can do a lot more here than the mobile app allows us to do.
There’s some NFS settings, motion detection settings, and much more. As we often see in embedded device web interfaces, all settings requests get processed by an array of .cgi files. A lot of requests to change settings are sent to /set_params.cgi. All it does is returns JSON data indicating success or failure. Its sibling file, /get_params.cgi, sends back a lot of configuration data in the response if you send it a GET request. This includes parameters like “skype_pwd”, “smtp_pwd”, “ddns_pwd”. From that, we can assume that there’s functionality in the Siime Eye to send emails, change DNS settings, and even add a Skype account.
A typical response from one of the more banal .cgi files looks like this:
It seems like it’s got a permissive Cross-Origin Resource Sharing (CORS) policy, as it sends back the “Access-Control-Allow-Origin” header with a wildcard value. In theory, this would let us, or any browser which has access to this web application, read the contents of any response from the server. The facility to read the response from another website is usually restricted by browsers, and is an integral part of the “Same Origin Policy” (SOP). It’s a restriction which means that malicious websites can’t just arbitrarily read your bank balance.
Ideally, the SOP also means that an arbitrary site can’t see and subsequently siphon off your IP camera video stream. But if a server specifies the “Access-Control-Allow-Origin” header with a wildcard value, anyone from any website can read the response. It makes the SOP useless.
So, I wrote a quick piece of JavaScript using XMLHttpRequest calls to try to siphon data off the device. However, weirdly, the browser kept complaining about us breaking the SOP. That wasn’t what I was expecting; it required some investigation.
After some digging, I found out the problem. It turns out one of the idiosyncrasies of CORS with XHR is that a pre-flight request with the OPTIONS header is sent first, expecting the Access-Control-Allow-Origin header in return. But, the Siime Eye interprets OPTIONS as a RTSP request and we get a standard RTSP response.
So you can’t siphon data off it that way because the browser thinks you’re breaking the SOP; it’s not getting the response it expects. It also seems that the RTSP protocol is running out of port 80 as well.
All the .cgi files, however, do allow you to specify a JSONP callback in every request, which means SOP is still useless. JSONP lets you specify a variable name, import the resulting JSON data as a script, and use it like any other JSON data ( https://en.wikipedia.org/wiki/JSONP ).
So I wrote a small PoC to dump a load of information from the device using JSONP, including a list of local Wi-Fi networks it can see, and the video stream. The video stream is “protected”, in that you have to negotiate a token before you can view it. But using JSONP still means we can siphon it off, with very little hassle. You can see my code here .
But, that can’t be everything that’s wrong with this. Time to start Googling.
There wasn’t anything too damning turning up just from some cursory poking at the web interface. So, after some light googling of some .cgi filenames, I came across the Reecam developer documentation ( http://wiki.reecam.cn/CGI/Params ).
Every .cgi file I came across on the Siime Eye, seemed to be documented on the Reecam site. The hardware MAC address points us towards Shenzhen Reecam Tech Ltd. It’s pretty safe to say the software running on the Siime Eye was developed by them.
I wanted to find the firmware, to get a sense of what was actually happening in the background. At this point I only had port 80 open, with a slightly ropey but relatively robust-looking web interface. I trawled through lots of developer info on their site but, despite a lot of digging, I couldn’t actually find the firmware anywhere.
However, one parameter documented on the site, which I didn’t come across while initially testing the web interface was “telnetd”. Browsing to the following link restarted the Siime Eye:
http://192.168.40.17/set_params.cgi?telnetd=1&save=1&reboot=1
When it came back up, telnet was available. This seems like an easy win. Default Mirai credentials and we’re in, right? Unfortunately it wasn’t so simple.
After hitting it with a wordlist for way too long, I gave up. Nothing seemed to be working, and there were no clues online about what the password might be.
So, I had no firmware, no shell, and only a minor web interface issue. The next step had to be to dismantle it.
The Siime runs off a Ralink RT5350F WiSoC which has a little MIPS processor in it. It’s often used in things like Wi-Fi extenders, and it’s relatively robust. It’s also got Winbond W9825G6JH-6 SDRAM and a Winbond 25Q64FVSIG flash chip, which holds the filesystem.
It also has some handy exposed UART pads, which are easy to clip onto. I connected with a BusPirate, trial and error’d the baud rate to 57600, and got a nice stream of useless debug info. I also got the same impenetrable telnet login prompt, and a pretty restrictive uBoot shell.
No easy-wins here either. I decided it was worth trying to dump the firmware. With some cheap eBay clips, a BusPirate, flashrom, and a Stanley knife (to whittle down the cheap clips so they wouldn’t nudge each other off the chip), I managed to get a read off the Winbond 25Q64FVSIG chip.
The read took about 30mins, and gave a nice solid blob of firmware, which I then binwalk’d out to a proper filesystem.
It was a Linux filesystem, predictably. But there was no /etc/passwd, not /etc/shadow; and only traces of an assumedly unused boot script which attempted to load parameters from (nonexistent) NVRAM. Lots of red herrings and leftover scripts from previous incarnations of the Reecam firmware.
What I needed at this point was some sense of what was happening in the system while it was running. Rather than just indiscriminately grep everything “just in case”, I wanted a more distilled sense of the system; I still needed a shell.
We left the laptop clipped onto the UART, and started probing the web interface again. This time, I noticed small debug messages from the web application being directed to the UART stream. It looked a lot like stderr and stdout might just be echoed out for debugging purposes.
I returned to the NFS settings page. “How else can you set up a Network File Share other than by sending unsanitised parameters directly to the UNIX ‘mount’ command?”, I thought.
A few minutes later, I found a command injection point, with all stdout and stderr output getting sent to the UART stream on my other laptop.
Sending “192.168.1.1; ls -al; echo” and “192.168.1.1; cat /etc/passwd; echo” as the “HOST/IP” parameter in the NFS settings resulted in mount errors, a listing of the root filesystem and the contents of /etc/passwd.
Cracking the descrypt hash didn’t go very well with a wordlist and light brute-forcing. But, as the web application was running as root, I wrote myself into /etc/passwd as another root user and logged in over telnet.
In the end, cracking the hash wasn’t even needed. I checked out the running processes and honed in on some custom system binaries: /bin/reecam and /bin/camera.
Running strings on /bin/camera from the firmware dumped earlier, and grepping for “root” spat out the hardcoded telnet password.
It’s the slightly – but not entirely – secure: reecam4debug.
From here’s it’s plain sailing. We’ve got complete control over every inbuilt function in the Siime Eye, easy access to the video stream, a root shell and persistence on a dildo .
If there’s no reason for a user to access relatively complex functionality of a device, then there’s no reason to expose it. It’s just too easy for an attacker to leverage official, inbuilt functionality and the web application weaknesses.
In this case, overexposure of system services means we could write a rogue application, compel a user to connect our app to the device using the default credentials, and then use the already-inbuilt functionality to perform unsolicited actions on the device. If we could get a user to connect their device to their home Wi-Fi, we (or any website loaded within the user’s home network, in a JavaScript drive-by) could siphon all video data, Wi-Fi passwords, and a list of local networks off it and send it somewhere unsolicited.
Even without all that effort, if we can get anywhere near a Siime Eye and crack into the Wi-Fi AP with a (most likely) weak or default password, we can almost immediately get a root shell and a video stream.
If you’re a user, change the Wi-Fi password to something complex and long. And/or, try to get a response from Svakom – I didn’t have much luck.
24/12/2016 – Svakom Informed about web interface issues. No response.
09/01/2017 – Follow-up email sent to ask for some kind of response. No response.
09/02/2017 – Svakon informed of further code injection issues & intention to write a blog post. No response.
Since there was no response at all after three attempts at contact, the decision was made to publish.
Being introduced to, and getting to know your tester is an often overlooked part of the process. Yes, our work is über technical, but faceless relationships do nobody any good.

UK Office:
Pen Test Partners LLP
Unit 2, Verney Junction Business Park
Buckingham
MK18 2LB
United Kingdom


US Office:
Pen Test Partners Inc.
800 Third Avenue STE 2501
New York
NY 11221
United States



It’s Called the Music and Arts Festival for a Reason


Dylan Efron Takes Us On An Adventure

By continuing to use our site, you agree to our Terms of Service and Privacy Policy . You can learn more about how we use cookies by reviewing our Privacy Policy . Ok
Isolation can be a real bummer. Thankfully, we’re living in a day and age when connecting with cam modeling hotties through adult cam sites is as easy as tapping your phone screen.
But what should you look for when searching for adult cam sites? Should there be many cam models? Should you look for amateur cam girls or premium adult webcam shows?
How about chat room features like cam splitting or virtual reality? Or perhaps you’re looking for live sex cam sites with great private chats?
Well, not to worry, because we’ll show you the best cam sites where you can find the hottest girls who provide free cams to the best adult cam sites featuring premium European cam models and everything in between! Check them all out below!
Jerkmate has 2 main things going for it that make it one of our personal favorites.
First, it’s one of the most popular cam sites that offer something most other cam sites don’t: they host professional porn stars for some cam modeling sessions. #
Whether it’s Avery Black or Lev Ivankov, Jerkmate is one of the best adult cam sites at delivering shows performed by pros .
Second, Jerkmate is a unique cam site that creates personalized preferences for its users in order to match them up with the perfect webcam model.
Right out the gate, they ask you a few simple questions, and then determine your partner based on your answer. It’s fun since you get this semblance of personal connection with your cam girl right from the start.
It’s not surprising that Chaturbate is one of few sex cam sites that has stood the test of time, not to mention that it’s the largest cam site online today.
Webcam modeling sites rarely get as diverse as this, as they have the largest cam girl selection that you’d be hard-pressed to find on most cam sites on the internet today.
Their adult webcams range from pros who know exactly what you want to amateur webcam models who can get you hard in just a few minutes.
Now, regarding pricing, you actually have a couple of options here. Whereas most webcam models on other live cam sites prefer private shows, Chaturbate is almost exclusively made up of sexy public chat rooms .
Most cam models here prefer to work for tips, which is done using Chaturbate tokens, but a few others offer private performances as well.
All in all, Chaturbate is a pretty decent cam site with some nice features that let you narrow down the categories—and the models you want— if you’re opting for a free chat.
If you’re looking for how to be a cam girl , Chaturbate is also a great platform to start with.
LiveJasmin, succinctly speaking, is like the Grey Poupon of adult webcam sites.
In fact, calling their performers “cam girls” is a bit of an understatement, because this is one of the most prestigious cam sites to work for, and their pedigree could definitely beat the most popular porn sites out there.
But what drives this over the edge and makes LiveJasmin absolutely one of the best cam sites out there is the fact that they provide live cam options for female, male, and trans models . 
You’re basically getting a live sex cam site that’s open to more genders compared to its peers.
When it comes to features, though, yes there’s a free chat option. But that’s really not going to get you to the good stuff. The private cam model shows are where it’s at.
LiveJasmin also provides a mobile option, so you could get your jollies on with a private chat or a live sex show wherever you are.
MyFreeCams is one of those adult webcam sites where you can probably find your next favorite cam girl. That’s because this is one place where you’re going to find some of the hottest up-and-comers in the biz. 
Oh, and yeah, this is the right cam site for you if you’re looking for free shows!
That’s because the live sex cams you’re going to find here are tip-based public rooms where anyone can enter. Of course, sending your performers some tokens for their efforts is always a good thing, but that doesn’t mean you’re entirely obligated to do it here.
Yes, MyFreeCams has a paid option, too, but that’s only a feature where you use your money to access archived, past shows from the webcam models. The free cams alone are worth a visit on this live cam site, so the premium options are just a sweet bonus.
The site design on MFC leaves a lot to be desired, however. Many cam sites have updated their look since their respective launches, but MFC looks to still be stuck in the past.
I will say this, though: if you’re on a budget and you’re horny as hell, then MyFreeCams is one of the best cam sites out there.
BongaCams could be misleading. They advertise themselves as one of those free webcam modeling sites, but it’s really more of a “freemium” kind of deal.
Yes, you’re going to end up paying money (via their token system), but at least you’re not going to be gouged per minute. 
BongaCams is one of those webcam sites where models earn their revenues from tips. Each of their sex cam performers has a price list posted in their free chat rooms for various acts you want them to do.
Additionally, they don’t have exclusively female models here, so you have the option to watch couples have sex on webcam rooms; male performers, and even transsexual sex webcam courtesans get their groove on for you. 
They have great diversity, to cut it short.
Most models here don’t do private shows, but you can always ask about it or read their profile, which mostly contains the services they offer.
All in all, you’re going to love BongaCams if you’re not particular about getting private shows or engaging in a private chat with these cam models.
CamSoda is an adult webcam site that features free rooms, but you have to pay if you want their models to do nasty stuff in the middle of their adult cam show.
That’s not a bad thing, though: this chat site has the goods. 
And since thi
Double Penetration Home Porn
Secretary's Secret
Photos Naked Mature Women

Report Page