Is it possible for someone to replace video feed with prerecorded video on an NVR camera system like Lorex?

Are there any known methods of taking a video feed and falsifying it on an ethernet based camera system?

There’s an employee that uses things like kali linux OS and miscellaneous hak5 devices and has previously gained access to the companies network… so I guess they could maybe be considered “a hacker”. The employee reclines in the office all night and probably sleeps, but is never caught. You can’t open the door to the offices without waking them up, and you can’t bust them sleeping because they’re awake by the time you get to their door within the offices.

There’s a Lorex video system with an extra channel, but it would be installed in an area where they would have direct access to the ethernet cord and no supervision. Is it possible for them to fake a video feed so that if I’m viewing the feed I see a fake video loop?

I’ve seen there are ways that people have faked video feed using OSB on ZOOM and wanted to know if there are any known methods that I myself am unaware of that could be used to provide a fake video feed to the NVR. I wouldn’t say we’re dealing with Mr. Robot, but they’re definitely not your average joe.

submitted by /u/anotherdumbschmuck
[link] [comments]

What do hackers use data breaches for?

I was wondering what do people usually do with the data breaches they download from forums like breached. The databases have lots of personal information like names, emails, phone numbers but obviously almost never passwords due to encryption. So I was curious trying to figure out what are they mostly used for.. I doubt it’s just for educational purposes, I bet people want to make money off it.

Are they going after the email lists to do some spamming/phishing? I’m just a curious beginner so that’s the only explanation I could think of

submitted by /u/quietestman
[link] [comments]

Over 30k Internet-Exposed QNAP NAS hosts impacted by CVE-2022-27596 flaw

Censys found 30,000 internet-facing QNAP appliances potentially impacted by a recently disclosed critical code injection flaw. On January 30, Taiwanese vendor QNAP released QTS and QuTS firmware updates to address a critical vulnerability, tracked as CVE-2022-27596 (CVSS v3 score: 9.8), that affects QNAP NAS devices. A remote attacker can exploit the vulnerability to inject malicious code […]

The post Over 30k Internet-Exposed QNAP NAS hosts impacted by CVE-2022-27596 flaw appeared first on Security Affairs.

What is the syntax at the beginning of this command line ?

I usually saw stuff at the beginning of CLI but people usually not explained what it is so Im want to know. I saw this for example : maxwell@villa:[maxwell]$ echo “random stuff” random stuff What I want to ask is what the stuff at the beginning, the st…

Esp82 issues

what are the malicious ways to use esp82 besides esphishing? submitted by /u/Omoica [link] [comments]

locally port forward on windows?

Let me explain: I have an http server that handles requests id like to make available to others to connect to. I set up port forwarding via mullvad, however I can’t forward my http port (443) to mullvad’s forwarded port (55077). How can I locally chang…

Was digging through the rabbit hole of suspicious links & found this guy, any idea what it might do?

https://bbms.physiotherapie-birnbaum.de/creative-xp-glitch.html

Unclear what exactly it achieves, but I can’t seem to sandbox it & I’m not sure if it’s malicious enough to steal any info & or give access right off the jump, or it’s just some ad pusher redirect. I have noticed, however, that this domain in particular has TONS of other links similar to it under the guise of HTML links.

submitted by /u/VelothYT
[link] [comments]