Chinese CCTV IP Camera Access

I’m not sure this community is the right place to asking about CCTV credentials or no. So here my problem, recently I bought Chinese Wifi Camera CCTV without any brand. Seriously, I have been researching my issues here on the internet but no one seems promising. The CCTV can be accessed by an application on Android called icsee so you can view your CCTV in realtime. But the problem is I can’t every time turning on my Android phone just for looking realtime surveillance. So I need a better way to access the CCTV itself directly. So I think the best options directly access through a browser with their CCTV IP Address.

So I check the IP that registered on my router and get the IP, type on browser and viola I get login.htm. I have tried every combination password and username but I it’s a silly try and error. You know too many combinations out there and how if the password using some unique Chinese language 🙂 I have try

username / password :

  1. admin admin
  2. admin 111111
  3. admin 123456
  4. root 111111
  5. root 123456
  6. and so on.

by the way, my camera model is r80x20-pq. Having searching any documentation and user manual on internet and not found any information about this camera. This is likely my camera on youtube.

So I get this article on the internet that mentioned every Chinese CCTV based on Hisilicon SoC Solution. I have a check on that website and nothing promising.

So I need your advice, I just wanted to access my CCTV over the PC/Laptop (Windows OS). If there were any software that needed to install on Windows I think it’s okay. Let me know your thought.

Threat modeling for visitor access control

I am trying to understand threat modeling but it seems too elasti from restrictive requirements to general requirements.

Now i am trying to understand it with some realistic examples. The first example which comes to my mind is physical access control of an office premise in which visitors have preapproved restrictive access and employees have unrestricted access. Each employee and legitimate visitor is given an id card to prevent this. Any official laptop should not go outside office without permission. Each laptop has an rfid tag to prevent this.

Can somebody help me understand threat model in this example? Or can somebody point me to where similar analysis has been done?

Should OIDC introspection endpoint be used to validate the JWT access token?

My resource server exposes an API that expects JWT access tokens obtained using OpenID Connect.

So far the validation in the resource server side consisted on using the Realm public key to validate the JWT access token signature and check some other parameters suchs as expiration time.

Since the access token is a JWT, I already have information about the user (sub, role claims etc). So I wouldn’t need to invoke the introspection endpoint to get it.

However the introspection endpoint also anwers with the active state of a token. Does it make sense to use it as another step in the JWT access token validation process? Is it really necessary or should I consider it valid just checking the signature and the other claims?

Is the tradeoff of the added latency to invoke just another endpoint to validate worth it?

Is possible to Access to read/write the ipad/ios memory?

There is a method to read the memory of an ipad ? What i mean is not to read about the data stored in the ipad but I’ll need to read what data ( like os , the file system and bootloader ) are inside that allow them to work. I’ve tried to connect to the ipad and read with the console ( app of macos ) but i didn’t find what i want. Especially beside reading, I need to over-write this file ? It’s possible to do that ?

How is Authentication Required different from Access Denied [closed]

I was trying a bug bounty challenge and I was given a vulnerable URL which needs a password to access it.

  • Case 1: When I try to do SQL-Injection in Username and Password, I get a page: access denied “Username not found
  • Case-2: If I keep entering random normal usernames and passwords, I get the “Enter username and Password” dialog box, and after so many trials I get the page which says: WWW-Authentication needed!

How are the two scenarios different?

Is Case 1 different than Case 2 in terms of vulnerabilities?

enter image description here

C++ unable to access PEB LDR InLoadOrderModuleList

I am new to c++ and windows internals. I am trying to print all three PEB_LDR_DATA module lists(InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList).

After I understood that Microsoft shows only InMemoryOrderModuleList in the PEB_LDR_DATA structure and this is a more detailed structure.

I have been able to access InMemoryOrderModuleList and print the module list. Getting the first module in InMemoryOrderModuleList:

// ldrData data type is PPEB_LDR_DATA PLIST_ENTRY inMemoryOrderModuleList = &ldrData->InMemoryOrderModuleList; PLIST_ENTRY currentitem_InMemoryOrderModuleList = inMemoryOrderModuleList->Flink; LDR_DATA_TABLE_ENTRY inMemoryOrderModuleListItem = *(PLDR_DATA_TABLE_ENTRY)currentitem_InMemoryOrderModuleList; 

But when trying to access :

// ldrData data type is PPEB_LDR_DATA PLIST_ENTRY inLoadOrderModuleList = &ldrData->InLoadOrderModuleList; 

I get the error:

class _PEB_LDR_DATA has no member InLoadOrderModuleList 

I know it is not the right way but also tried to access the list like this:

PLIST_ENTRY inLoadOrderModuleList = (PLIST_ENTRY)(ldrData+ 0x0010); 

inLoadOrderModuleList Flink and Blink is null.

How should I access the lists?

How to Export MS SQL DB from Docker-Linux to Access format

I have a MS SQL database which is currently up and running on my Mac within a Docker container that is hosting the Ubuntu Linux version of MS SQL Server. I need to export the database to a format that can be imported into an Access (yes, Access) database.

Alternatively, I would need to export all 300+ tables to CSV, and hopefully would not need to do them one by one. Is there any way to export all tables en masse to CSV? But this is an alternative option. I still prefer the Access-compatible export since our new SIS vendor apparently uses it. Thanks!

Using Refresh Token inside of Access Token without HTTPS

I previously read that Access Token must be sent with every request to the API but Refresh Token must be sent ONLY when the Access Token expires.

I’m trying to use a similar model to the conventional model, where the Access Token is JWT, but the Refresh Token is just a random unique string (stored on server)

so the Access Token JWT claims looks like this:

{    "user_id": "user123456789",    "refresh_token": "A9t2G8eH8j2QW2j9U",    "exp": 154922000 } 

when a client sends a request to my API, the Access Token (JWT) will be sent to the server, if it’s expired, then a new Access Token will be sent to them with a newly-generated refresh_token alongside with the HTTP Response of the requested resource (after doing some validation).

This way:

  1. Client Only needs to securely-save and send one JWT Token instead of two, with their request.

  2. Client doesn’t have to make a second request just to re-fresh their Access Token in case it’s expired. (No 401 HTTP Response).

-Request with valid AccessToken => (Response with the requested resource)

-Request with expired AccessToken => (Response with the requested resource+NewAccessToken)

The problem here is that the Refresh Token (random unique string) is being sent with every request over the wire in plain text, and I can’t want to force my clients to use HTTPS only.

but then again, even in the “conventional model” the Refresh Token will be sent every X period of time, and a packet sniffer will be able to steal it easily if the connection wasn’t over HTTPS

Am I missing something here? Is my model flawed? Or is the conventional OAuth model must be strictly used over HTTPS? Is forcing HTTPS is my last resort?