Awesome! Since I am getting replies i will elaborate further. I thought there might me other electricians that expand into i.t. sound and dmx lighting like I do!
This client has 20 of the same model dvr in different locations.
All locations have static IPs no ddns.
Client owns and manages routers. Wifi is disabled.
Only 1 out of 20 of the client's locations has this problem, they all have the same model dvr, same model router, same isp provider.
The DVRS are made by Dahua, older unit with a 2014 firmware build, no further firmware support available. I know I can buy a new dvr I just want to understand the breach.
The hack is some type of bug that turns the brightness down to 0, changes the lan ip throwing the machine offline, and renames the cameras to hacked1, hacked2, etc. Defaulting the unit easily brings it back up but the problem happens about every 3 weeks again. We can see the hack on the dvr log with an ip from poland.
Router passwords and dvr passwords have been changed, makes no difference.
It has been suggested that the bug exploits the dvr using telnet. I do not know how to disable telnet.
All Dahua DVRs standardly use port 37777 for inbound access. I have just now changed the port number and have to wait on the results. I dont know if this bug would use port 37777 or if it does something on the (free for all) port 80.
Look forward to your comments.
Before I start, what is your role in the organization. If you are the admin --you hold the authority to hand out rights and privileges of users who can make changes or settings. TELNET can only have access if you give it privileges.
If you are able to do that you got it made.
Good to know you are almost like a diversified portfolio owner with asset allocation capability. lol
You are an IT Tech, Sound and DMX Light Technician and of course Electrician. Some people I know do windows too.
No not with squeegee. lol
Perfect financial management comparatively. . . hard to lose in the stock market game. You lose some . . .but you gain some. LOL
And then you say "All locations have static IPS no ddns." Have you run this errant camera using ddns or DynDNS?
An IP camera is like a computer peripheral with a MAC Address (media access control) . . . it is also assigned properties as a member of a network.
According to your narrative "one out of twenty has this problem". The dvr or other recording devices don't have the same properties as the IP Camera. It has no MAC Address.
If all cameras have Static IP Addresses, in your network --their addresses are fixed meaning they are not changed by the router.
Compared to DYNAMIC Address that will change every time you log out and login. When you logout (sign off) the address that was assigned to you will be given to another member of the network.
Because of this constantly changing address --it makes it harder for hacker (although they can still hack you ) but they have to work a bit harder.
Having said that. . . .you can minimize unauthorized entry (if you happen to have an open port) by switching that one vulnerable camera to a DYNAMIC address.
Your DHCP will assign this for you. . . .you have no control over it.
You have to go through the setup sequence of the camera.
At least that's what I do on LINUX.
As an aside:
You don't disable TELNET. As the admin in your organization, you don't give it access to make those changes you mentioned.
In the event of unauthorized entry. . . don't leave any open port.