Gaining control of every projector and camera on campus

edna.land

96 points by ednaordinary 3 days ago


miki123211 - 8 hours ago

The PTR record enumeration trick is often fun to try on hotel and other public networks.

The problem here is that many places segment their guest network away from the internal one, but they use the same DNS server for both, so guests can still resolve internal hostnames and perform rev DNS queries.

I usually like to run a traceroute or two (to some arbitrary external IP like 1.1.1.1 or 8.8.8.8) whenever I connect to a new network. As traceroute does rev dns by default, if you see the internal hostname for your default gateway (and possibly other hosts inbetween you and the wider internet), those IPs are likely good starting points for your rev DNS shenanigans.

robviren - 10 hours ago

Ex Vaddio PM here. Like 5 years ago all our firmware defaulted to requiring non-default passwords on setup. We also created a free windows application that can mass upgrade firmware and change auth if defaults were used. We tried!

Saw the Vaddio logo and had to chime in. Gotta stick up for my Minnesota devs.

tybstar - an hour ago

Reminds me of the time in college I realized that the university network's dynamic DNS configuration was wrong and that if I named my Linux laptop with the same hostname of the mail server, I became the mail server when I connected to the network. (I used an ethernet jack in the cafeteria and a random PCMCIA network card I found in the help desk stash so they wouldn't trace the problem back to my school laptop. The IT department already hated me for unrelated reasons.)

giobox - an hour ago

The 554 RTSP restream thing is something I see a lot in badly configured NVR setups. Many NVRs are configured to restream the cameras they watch, the idea being that only the NVR watches the camera's feeds directly to reduce the CPU load on the relatively weak CCTV cameras - the beefy NVR server can restream to many more clients instead of them all talking to the camera individually.

There are so many of these tools that simply re-stream the RTSP CCTV feed with no support for using any sort of authentication though - the expectation is you configure firewall rules appropriately so only the "correct" devices can view the feed on the open port.

embedding-shape - 8 hours ago

> At some point, I hit a threshold where the DNS server could no longer keep up and broke. As I later found out, this caused a ~15 minute campus wide outage for managed computers as no computer could make the DNS lookup in order to mount its network drive. IT politely told me to stop spamming the DNS server after this, so I did.

> How’d IT know it was me? I yapped about it for two weeks!

You know, I think maybe the first part is how they found out about you, rather than that they just happened to follow you on social media :)

Banditoz - 11 hours ago

I am a bit confused on how they were able to access these devices if they stated the network is not allowing routing? I think I may've missed that part in the article.

sirnicolaz - 6 hours ago

> AI usage

> I used ai for a single rust scope issue that google wasn’t giving me clear answers for.

Nowadays, this needs to be highlighted. Congrats

xoa - an hour ago

...where are, at a trivial minimum, the VLANs!?!? Or even outright separate physical architecture, but at the very least even the absolute cheapest prosumer Omada/UniFi/Mikrotik/whatever switches and WAPs made for the last decade+ will give you some simple segmentation for free. I don't understand, apparently they had cameras and other devices in a single flat network space that any rando BYD could cruise around in? Like, sure, absolutely change default passwords, better provisioning, consider what info DNS or other side channels (like certificate transparency if you use a public CA and don't use a wildcard) might reveal, use internal VPNs even for trusted devices to access certain stuff, etc etc. But it still feels like simply isolating security/surveillance and other restricted use devices should sorta be the 101 first layer of the onion and if that wasn't done yeesh.

If this was written 20-25 years ago sure, but in 2026? Wild.

breakingcups - 7 hours ago

Seems a bit too irresponsible and immature for my taste.

63 - 6 hours ago

Even running a port scanner is enough to face disciplinary action at many US colleges. Taking down the network for the entire school for 15 minutes surely deserved more consequences than were doled out here. I'd encourage the author to focus their efforts and talents on something more constructive.

jakedata - 8 hours ago

Causing a 15 minute outage campuswide is not clever at all. A DOS attack was not the goal and it drew unwanted attention. If I was responding to this outage there would have been consequences - not for doing it, but for getting caught. Perhaps a 200 KB/s rate limit on every device associated with the user for escalating timeout periods if the unclever behavior remained attributable.

deadlycow - 2 hours ago

Wow this is funnily evil

Washuu - 4 hours ago

The font size on this site is massive and zooming out causes the font to resize back to the same massive font size.

Why?! ;_;

tyzoid - 8 hours ago

Hey, fancy seeing you up here on HN! Fun article

ethanhawksley - 10 hours ago

very nice article!

kwar13 - 10 hours ago

nice writeup. might be a bit careful though, as far as i know port scanning might be technically not allowed by your campus's it policy... nonetheless great job!

ares623 - 9 hours ago

Did you play the Gandalf smiling video across all projectors?

schmeichel - 3 days ago

Banger