
{"id":566,"date":"2009-08-04T09:12:36","date_gmt":"2009-08-04T12:12:36","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=566"},"modified":"2009-08-04T09:12:36","modified_gmt":"2009-08-04T12:12:36","slug":"video-poisoning","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/","title":{"rendered":"Video Poisoning"},"content":{"rendered":"<p>Investigadores de <a href=\"http:\/\/www.sipera.com\/viper\">Sipera System Viper Labs<\/a> han demostrado que es posible modificar el streaming de video que env\u00eda una c\u00e1mara y meter otro streaming de video completamente diferente o simplemente una imagen fija, de manera que eso permita, a modo de tapadera, cometer las fechor\u00edas que se deseen. Evidentemente si se sustituye la escena original por una pel\u00edcula, los guardias sabr\u00e1n que algo raro sucede; sin embargo, si el cambio es una foto de la misma habitaci\u00f3n, nada habr\u00e1 que sospechar.<br \/>\n<span id=\"fullpost\"><br \/>\n<span style=\"font-weight: bold;\">\u00bfC\u00f3mo dec\u00eds que se hace esto?<\/span><\/p>\n<p>Para ello, Jason Ostrom, director de Viper Labs, indica que hemos de tener acceso f\u00edsico a la red de c\u00e1maras de seguridad IP del objetivo (o al menos una roseta de red en la que no haya muchas restricciones de <a href=\"http:\/\/en.wikipedia.org\/wiki\/Network_Access_Control\">NAC<\/a>. El grado de efectividad del ataque depende de la configuraci\u00f3n de la red, por supuesto).<\/p>\n<p>Viper Labs mediante dos programas gratuitos, <a href=\"http:\/\/ucsniff.sourceforge.net\/\">UCSniff<\/a> para capturar un streaming de video de un dispositivo IP (previa conversi\u00f3n a formato H.264 y luego a AVI); y <a href=\"http:\/\/videojak.sourceforge.net\/\">VideoJak<\/a> para introducir el nuestro video anterior en un streaming haciendo <a href=\"http:\/\/es.wikipedia.org\/wiki\/ARP_Spoofing\">envenenamiento ARP<\/a>.<\/p>\n<p>Los operadores de seguridad f\u00edsica no se dar\u00e1n cuenta del cambio, aunque los operadores de red, posiblemente s\u00ed que detecten un aumento importante de tr\u00e1fico ARP (necesario para suplantar a la aut\u00e9ntica c\u00e1mara de seguridad). Siempre he defendido que teniendo todas las tecnolog\u00edas integradas bajo un <a href=\"http:\/\/www.securitybydefault.com\/2009\/03\/ip-el-anillo-para-gobernarlos-todos.html\">anillo com\u00fan como es el IP (Internet Protocol)<\/a>, los operadores de seguridad f\u00edsica y l\u00f3gica, no deber\u00edan ser entes separados, sino poder hacer sinergia entre ambos para detectar ataques que afectan a lo f\u00edsico apoy\u00e1ndose en t\u00e1cticas de ataques de red. En dicho post, concluimos que la integraci\u00f3n de los sistemas de monitorizaci\u00f3n IP en la infraestructura de la empresa en vez de utilizar cableado f\u00edsico independiente, dar\u00eda lugar a posibles ataques, pero&#8230; la comodidad e integraci\u00f3n conlleva sus riesgos que hay que asumir.<\/p>\n<p>Si quer\u00e9is ver la noticia original, as\u00ed como un video en el que se muestra un PoC del ataque, pod\u00e9is hacerlo <a href=\"http:\/\/www.wired.com\/threatlevel\/2009\/07\/video-hijack\/\">aqu\u00ed<\/a>.<\/p>\n<p>Fuente: <a href=\"http:\/\/www.securitybydefault.com\/2009\/08\/video-poisoning-ya-es-posible.html\">Security by Default<\/a> y Segu-Info<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Investigadores de Sipera System Viper Labs han demostrado que es posible modificar el streaming de video que env\u00eda una c\u00e1mara y meter otro streaming de video completamente diferente o simplemente una imagen fija, de manera que eso permita, a modo de tapadera, cometer las fechor\u00edas que se deseen. Evidentemente si se sustituye la escena original [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-566","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Video Poisoning<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Video Poisoning\",\"datePublished\":\"2009-08-04T12:12:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/\"},\"wordCount\":375,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Video Poisoning\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2009-08-04T12:12:36+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Video Poisoning","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Video Poisoning","datePublished":"2009-08-04T12:12:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/"},"wordCount":375,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/","url":"https:\/\/www.talsoft-security.com\/site\/video-poisoning\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Video Poisoning","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2009-08-04T12:12:36+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/video-poisoning\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=566"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/566\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}