Wireshark For Video Surveillance Tutorial

By: Brian Karas, Published on Aug 01, 2016

Want to snoop on the data going between your NVR and your IP camera?  Wireshark is the tool most commonly used to analyze network traffic and see what is really happening on the wire. It is helpful both in troubleshooting and understanding what is happening with IP camera streams.

This report gives an introduction to Wireshark and how to do some basic analysis on captured data to find information useful for camera setup and debugging, including:

  • Analyzing transmissions from IP cameras
  • Finding Unknown static IP addresses of IP cameras
  • Finding the RTSP URL of an IP camera
  • Using the follow option to get more data on an IP camera

**** ** ***** ** the **** ***** ******* your *** *** **** IP ******?  *********** *** **** **** commonly used ** ******* ******* traffic *** *** **** is ****** ********* ** the ****. ** ** helpful **** ** *************** and ************* **** ** happening **** ** ****** streams.

**** ****** ***** ** introduction ** ********* *** how ** ** **** basic ******** ** ******** data ** **** *********** useful *** ****** ***** and *********, *********:

  • ********* ************* **** ** cameras
  • ******* ******* ****** ** addresses ** ** *******
  • ******* *** **** *** of ** ** ******
  • ***** *** ****** ****** to *** **** **** on ** ** ******

[***************]

Getting ******* **** *********

******** ************ *** ******* *** installation, ********* ******** ****** be ****.  ** *** are *** ******** **** network ******* ******* *** using ****** ***** *** will **** ****** **** to ******* ********* ** the **** ******* ** your ***. *** ************ should *** ******* * restart ** ********* *********, but *** ****** ** the ******* ****** ***-**** hours ** ** ****.

Wireshark *****

***** *** * *** of ********** ** *********, for ***** ****** ** concentrate ** ********* ******* and ***** ******* ** look ******* *** ******** data.  *** ********* ***** shows *** ** ***** a ****** *******:

Find ** ******* ****** ** ** * ******

** *** **** **** come ****** * ****** that *** * ****** IP ******* **** *** could *** ****** *** this ******** ***** *** one **** **.  ** is *********** ** ***** down *** ****** *** then ***** ** **** up ******* ***** *** start *** ****** *******.

** **** *** ** use *** "***" ****** and *** ** *** a *** ******* ****** to **** ******* ******** data.


Find *** **** *** ** * ******

** *** **** * recorder ********* ** * camera *** *** **** to **** *** **** URL ***** **** **** tutorial ***** *** *** to **** **** ******* in * ****** *******.  This **** *** "***** matches" ******.


Find *** *** **** ******* ** ** *********** ******

** ******* ***** **** than * ****** ** give ** *** ***** story, ********* *** **** you *** *** ******* related ** *** ***** packet **** **** * few ******.  **** ***** shows *** *** ** use *** "******" ******.


Other ****** *******

********* *** * **** powerful ********* *********, ** evidenced ** *** ******* ******* *************, ****** *** ******** of ***** ***** ***** be **** *** *************** IP ****** ** ****** control *******.

** *** **** *** IP ******* ** * camera *** **** ** see *** *** ******* going ** ** **** that ****** **** *** have ******** *** *** use *** ********* ******:

**.**** = ***.***.*.*

** *** ******* **** is *********** **** * specific ****** *** *** use *** "***" (******) filter:

**.*** == ***.***.**.**

********* *** *** *** a "***" (***********) ****** to *** *** *** traffic ***** **** ** a ******:

**.*** == ***.***.*.***

******* ***** *** ** used ** ******* *******, such ** ** **** UDP ******* **** * specific **:

**.**** = ***.***.*.** && ip.proto == ***

 

Comments (12)

Great post Brian!

Brian

This great article only shows how much info is exposed on our network on regular bases. This info is greatly helpful to the integrator, and equally helpful for an intruder.

While a good integrator may protect the communication from the VMS to the cameras using https, the communication between the VMS and the client is completely exposed in the majority of cases. There are few exceptions to the rule - some VMS solutions that do provide encryption and that will not necessarily require setting of VPNs to protect the data

Mulli Diamant

Brian, Excellent Post...!!

Great and informative article.

Some people think HTTPS might be part the end all for security, but for most it's only the initial communications and authentication, I think a lot of product could well be using Onvif, and I bet you would find the RTSP video stream is not afaik encrypted. So a simple man in the middle just sniffing the video packets could well be on the way to an episode of CSI!

Even companies using own private protocol, are most likely going to use unencrypted video streams. For speed and that, all so important wave their stupid hand in front of the camera and see their update display on browser being 1,000ms faster than company XYZ

The reason most likely is lazy programmers and unskilled non-security experts.

Any manufacturer out there even know this, do they even understand this. Do they care?

At some point end-end encryption will be the normal, and you best be able to deliver this ability or loose out, only takes one company to start this being standard.

Just take a look at iMessage and also now WhatApp this is how you do it properly.

Video content delivery has been around for ages; DRM protection is open source, maybe if Onvif committee needs to look at how quickly the world changes.

One thing I found that you should get an intelligent switch to using Wireshark, so you can setup the unit to allow monitoring on a particular port that is so you can grab all the packets of data, between a stand alone NVR and IPC devices. NVR PC based units naturally installing Wireshark on them is much easier, as mentioned in the article.

5.1.1.4 RTP/RTSP/HTTP/TCP

The data stream shall be sent via HTTP to traverse a firewall. A device shall support media transfer using RTP/RTSP/HTTP/TCP. And if a device supports TLS1.0, the data stream shall be sent or received via HTTPS to traverse a firewall, and a device shall support media transfer using RTP/RTSP/HTTPS/TCP.

ONVIF Streaming Spec v210

One thing I found that you should get an intelligent switch to using Wireshark, so you can setup the unit to allow monitoring on a particular port that is so you can grab all the packets of data, between a stand alone NVR and IPC devices.

This is a good idea. I actually have an old 10/100 Netgear *hub* ( a real hub, not a switch) that I've found to be handy for get a data stream from a camera or access control board. A pre-configured smart switch with a mirror port enabled would do the same thing.

I think a lot of product could well be using Onvif, and I bet you would find the RTSP video stream is not afaik encrypted. So a simple man in the middle just sniffing the video packets could well be on the way to an episode of CSI!

Years ago, at another company, we made a device that was a combination network sniffer and packet decoder. It could interpret SQL and SMB traffic in real time to analyze what users were doing with data. During that time I found an opensource project that could reconstruct files by reading packets off the wire. So, if you transferred a file to or from an SMB server, and I could get access to your network traffic, I could get a copy of the files you accessed by reconstructing them on my snoop machine. The same concept could be applied to unencrypted video streams, an enterprising developer could write something that showed you a mirror of an RTSP stream.

With a passive network tap you could easily create an RTSP stream mirror without even need a switch or mirror port/etc. Couple the passive tap to a Raspberry Pi, and you could create a device that wirelessly streams you a copy of the camera images without any detectable effect on the network.

This is a good idea. I actually have an old 10/100 Netgear *hub* ( a real hub, not a switch) that I've found to be handy for get a data stream from a camera or access control board. A pre-configured smart switch with a mirror port enabled would do the same thing.

A CSMA/CD 100Mbps hub? Lucky you!

Another way is to get in between the NVR and the IPC by routing thru your dual NIC PC.

I used a Netgear GS105E, not owning a time machine to go back and buy up all the hubs of yonder years! I be sure this is also now an old model in the world of IT, where one day means something obsolete or something even more useless.

How about an article with Wireshark and Wi-Fi exploits, see how vulnerable your home or business network is. All be it's a more complicated setup!

With Wi-Fi networks, we put our devices out there for everyone to sniff at.

I be sure this is also now an old model in the world of IT, where one day means something obsolete or something even more useless.

I have a GS724TP from ages ago that's still as useful as the day I bought it.

You know its funny, we have had cameras with 10/100Mbps interfaces for close to a decade now, but since we are not close to exceeding that on a per port basis even now, we don't really need 1 GB switches, not per port anyway. Unlike your typical IT needs.

That's why we're in a time machine...

An IPVM Wireshark certification class based on IP Cameras would be nice to have...

An IPVM Wireshark certification class based on IP Cameras would be nice to have...

And would be a mandatory prerequisite to gaining your IPVM Ethical Camera Hacker certificate.

An IPVM Wireshark certification class based on IP Cameras

FYI, we are adding in a 6th week for the IP networking class starting in January, that will include 2 classes on cybersecurity including more time on Wiresharking.

Read this IPVM report for free.

This article is part of IPVM's 6,367 reports, 855 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Avigilon H4 Intercom Tested on Nov 20, 2019
Avigilon is well-known for video surveillance and access, but how well does the company's intercom work? We purchased and tested Avigilon's H4...
Remote Access (DDNS vs P2P vs VPN) Usage Statistics 2019 on Oct 25, 2019
Remote access can make systems more usable but also more vulnerable. How are integrators delivring remote access in 2019? How many are using...
How To See If Your Camera Uses Huawei Hisilicon Chips on Aug 30, 2019
Rarely do manufacturers disclose what SoCs (System on a Chip) they use, even though it is the core of IoT devices. Interest in this has increased...
IP Camera Cabling Installation Guide on Aug 29, 2018
This guide teaches how to install network cabling for IP cameras, including: Estimating cable run length (with video tutorial) Accounting for...
Video Analytics Integration Guide on Aug 16, 2018
Video analytics is hot again (at least conceptually) but integrating video analytics with VMSes can be challenging. This is especially significant...
IP Network Hardware for Surveillance Guide on May 02, 2018
Video surveillance systems depend on IP networking equipment. In this guide, we explain the key pieces of equipment and features, explaining where...
Network Addressing for Video Surveillance Guide on Mar 14, 2018
The goal of this guide is to explain addressing devices on IP networks, focusing on how IP cameras and recorders are used in those networks. For...
Hacked Hikvision IP Camera Map USA And Europe on Jan 22, 2018
The interactive map below shows a sample of hacked and vulnerable Hikvision IP cameras across the USA and Europe. Hover over a marker to see an...
Hikvision Releases Network Cabling on Aug 04, 2017
Hikvision's expansion continues. From cameras to analytics to thermal to intrusion to access to... network cabling. Hikvision explained: A...
Directory of 40 IP Camera Manufacturer Discovery Tools on Jun 19, 2017
Locating the IP address of a DHCP client or factory defaulted device on a network is often a difficult task.  In another report, we discussed...

Most Recent Industry Reports

Hikvision Illicitly Uses Back To The Future In Marketing on Jul 03, 2020
NBCUniversal told IPVM that Hikvision UK's ongoing coronavirus marketing campaign using NBCUniversal's assets was not allowed. Hikvision mass...
Verkada: "IPVM Should Never Be Your Source of News" on Jul 02, 2020
Verkada was unhappy with IPVM's recent coverage declaring that reading IPVM is 'not a good look' and that 'IPVM should never be your source of...
Vintra Presents FulcrumAI Face Recognition on Jul 02, 2020
Vintra presented its FulcrumAI face recognition and mask detection offering at the May 2020 IPVM Startups show. Inside this report: A...
Uniview Wrist Temperature Reader Tested on Jul 02, 2020
Uniview is promoting measuring wrist temperatures whereas most others are just offering forehead or inner canthus measurements. But how well does...
Dahua USA Admits Thermal Solutions "Qualify As Medical Devices" on Jul 02, 2020
Dahua USA has issued a press release admitting a controversial point in the industry but an obvious one to the US FDA, that the thermal temperature...
Access Control Online Show - July 2020 - With 40+ Manufacturers - Register Now on Jul 01, 2020
IPVM is excited to announce our July 2020 Access Control Show. With 40+ companies presenting across 4 days, this is a unique opportunity to hear...
Hanwha Face Mask Detection Tested on Jul 01, 2020
Face mask detection or, more specifically lack-of-face-mask detection, is an expanding offering in the midst of coronavirus. Hanwha in partnership...
UK Government Says Fever Cameras "Unsuitable" on Jul 01, 2020
The UK government's medical device regulator, MHRA, told IPVM that fever-seeking thermal cameras are "unsuitable for this purpose" and recommends...
Camera Course Summer 2020 on Jun 30, 2020
This is the only independent surveillance camera course, based on in-depth product and technology testing. Lots of manufacturer training...
Worst Over But Integrators Still Dealing With Coronavirus Problems (June Statistics) on Jun 30, 2020
While numbers of integrators very impacted by Coronavirus continue to drop, most are still moderately dealing with the pandemic's problems, June...