❌

Reading view

There are new articles available, click to refresh the page.

Smart Home Hacking, January 13-15

By: OTW

Welcome back, my aspiring cyberwarriors!

Smart homes are increasingly becoming common in our digital world! These smart home devices have become of the key targets of malicious hackers. This is largely due to their very weak security. In 2025, attacks on connected devices rose 400 percent, with average breach costs hitting $5.4 million

In this three-day class, we will explore and analyze the various security weaknesses of these smart home devices and protocols.

Course Outline

  1. Introduction and Overview of Smart Home Devices
  2. Weak Authentication on Smart Home Devices
  3. RFID and the Smart Home Security
  4. Bluetooth and Bluetooth LE vulnerabilities in the home
  5. Wi-Fi vulnerabilities and how they can be leveraged to takeover all the devices in the home
  6. LoRa vulnerabilities
  7. IP Camera vulnerabilities
  8. Zigbee vulnerabilities
  9. Jamming Wireless Technologies in the Smart Home
  10. How attackers can pivot from an IoT devices in the home to takeover your phone or computer
  11. How to Secure Your Smart Home

This course is part of our Subscriber Pro training package

Smart Home Hacking: Getting Started

By: OTW

Welcome back, my aspiring cyberwarriors!

As smart homes become ever more common in our digital world, they have become a favorite target for hackers around the world. We have seen SO many smart home devices compromised and then the hackers use those devices to pivot to other devices connected to the local area network such as phones and laptops.

Smart home devices now include so many devices, such as;

  1. Smart TV’s
  2. Smart Lighting
  3. Smart Garage Door Openers
  4. Smart Security Systems
  5. Smart Cameras
  6. Smart Appliances (Refrigerators, stoves, washers, dryers, etc.)
  7. Smart Picture Frames
  8. Smart Infotainment Systems
  9. and so many more

Each of these smart devices has a small CPU, small amount of RAM, and a Linux operating system, most commonly BusyBox, due to its very small size. These systems are very often shipped with little aforethought regarding security. This makes it relatively easy to hack these devices.

In addition, these devices are often connected to your Wi-Fi, Bluetooth, or Zigbee network. Each of these network types are vulnerable to multiple attack vectors making the entire home and the devices therein vulnerable.

To learn more about Smart Home Hacking, consider attending our Smart Home Hacking training, January 13-15.

Here are the most significant security risks documented in recent research and threat reports:

Common Smart Home Vulnerabilities

  • Weak or Default Credentials
    • Many smart home devices ship with weak, default, or hardcoded passwords, which attackers can easily guess or find online.
    • Credential stuffing and password reuse across multiple devices leads to widespread compromise.
  • Outdated and Unpatched Firmware
    • A high proportion of smart devices run old firmware with known vulnerabilities and rarely receive updates or security patches, leaving them open to exploitation.
    • Supply chain vulnerabilities can introduce malware before devices even reach the consumer (such as Badbox 2.0).
  • Vulnerable Network Services and Open Ports
    • Devices expose unnecessary or insecure services to the local network or internet (e.g., Telnet, UPnP, poorly secured web interfaces), facilitating remote exploitation.
    • Automated scanning for open ports is a dominant attack method, accounting for over 93% of blocked events in recent studies.
  • Poor Encryption and Data Protection
    • Many smart devices transmit sensitive data (e.g., audio, video, sensor readings) without proper encryption, enabling eavesdropping and privacy breaches.
    • Weak or flawed cryptographic implementations allow attackers to decrypt captured traffic or manipulate device functionality.
  • Device Hijacking and Botnets
    • Attackers can take over smart devices, using them as proxies for further attacks (DDoS, ad fraud, credential theft) or as part of large-scale botnets (Mirai, EchoBot, PUMABOT).
    • Compromised devices may serve attacks on other systems without user awarenessβ€”sometimes even posing physical safety risks (e.g., hijacked locks or thermostats).
  • Privacy and Data Exposure
    • Insecure cameras, microphones, and voice assistants can be used for covert surveillance or to steal sensitive data.
    • Exposed cloud APIs and device β€œphone home” features can leak data to third parties or attackers.
  • Weak Access Controls
    • Poor onboarding, lack of two-factor authentication, flawed pairing mechanisms, and weak authorization checks let attackers gain access to devices or sensitive controls.

Real-World Examples (2025)

  • Smart TVs, streaming devices, and IP cameras are currently the most exploited categories, often running on Linux/Android with outdated kernels.
  • Malicious firmware (such as BadBOX) pre-installed on consumer devices has led to huge botnets and residential proxy abuse, sometimes before devices are even plugged in by the end user.
  • Large-scale privacy violations include attackers publicly streaming home camera footage due to default credentials or unpatched vulnerabilities.

Summary Table

Vulnerability TypeExample Consequence
Default/weak credentialsEasy unauthorized access
Outdated firmwareExposure to known exploits
Open network servicesRemote code execution, botnets
Poor encryptionData interception, manipulation
Device hijacking/botnetsDDoS, fraud, lateral movement
Weak access controlsDevice takeover, privacy breaches
Privacy/data exposureSurveillance, data theft

Summary

Smart homes are becoming increasingly popular in industrialized countries particularly among higher income households. These smart homes offer the user convenience while offering an enticing target for hackers. If the attacker can compromise even one device within the home, then all of the devices on the home network are at risk!

To learn more about Smart Home Hacking and Security, consider attending our upcoming Smart Home Hacking training in January 2026.

IoT Penetration Testing: From Hardware to Firmware

As Internet of Things (IoT) devices continue to permeate every aspect of modern life, homes, offices, factories, vehicles, their attack surfaces have become increasingly attractive to adversaries. The challenge with testing IoT systems lies in their complexity: these devices often combine physical interfaces, embedded firmware, network services, web applications, and companion mobile apps into a [...]

The post IoT Penetration Testing: From Hardware to Firmware appeared first on Hacking Tutorials.

Can Hackers β€œSee” Inside Your Home Using Wi-Fi to Track Your Location and Movement?

By: OTW

Welcome back, my aspiring cyberwarriors!

The quick answer is β€œYes!”.

It might seem like science fiction, but now we have the capability to β€œsee” through walls and track the location and movement of targets. This is thanks to new technological developments in both artificial intelligence and SDR. Remember, Wi-Fi is simply sending and receiving radio signals at 2.45Ghz. If an object is in the way of the signal, it bounces, bends and refracts the signal. This perturbing of the signal can be very complex but advances in machine learning (ML) and AI now make it possible to to collect and track those changes in the signal and determine if it’s a human, dog, or an intruder. This is the beginning of something exciting, and quite possibly, malicious.

This is one more reason why we say that SDR (Signals Intelligence) for Hackers is the leading edge of cybersecurity!

The Science Behind Wi-Fi Sensing

How It Works

  • Wi-Fi signals are electromagnetic waves that can pass through common wall materials like drywall, wood, and even concrete (with some signal loss).
  • When these signals encounter objects, especially humans, they reflect, scatter, and diffract.
  • By analyzing how Wi-Fi signals bounce back, it’s possible to detect the presence, movement, and even the shape of people behind walls.

Key Concepts

  • Phase and Amplitude: The changes in phase and amplitude of the Wi-Fi signal carry information about what the signal has encountered.
  • Multipath Propagation: Wi-Fi signals reflect off multiple surfaces, producing a complex pattern that can be decoded to reveal movement and location.
  • DensePose & Neural Networks: Modern systems use AI to map Wi-Fi signal changes to specific points on the human body, reconstructing pose and movement in 3D.

The Hardware

You don’t need military-grade gear. Here’s what’s commonly used:

  • Standard Wi-Fi Routers: Most experiments use commodity routers with multiple antennas.
  • Software-Defined Radios (SDRs): For more control and precision, SDRs like the HackRF or USRP can be used (see our tutorials and trainings on SDR for Hackers)
  • Multiple Antennas: At least two, but three or more improves accuracy and resolution.

The Software

Data Collection

  • Transmit & Receive: One device sends out Wi-Fi signals, another listens for reflections.
  • Channel State Information (CSI): This is the raw data showing how signals have changed after bouncing off objects.

Processing

  • Signal Processing: Algorithms filter out static objects (walls, furniture) and focus on moving targets (people).
  • Neural Networks: AI models such as DensePose map signal changes to body coordinates, reconstructing a β€œpose” for each detected person

Wi-Fi Sensing in Action

Step 1: Set Up Your Equipment

  • Place a Wi-Fi transmitter and receiver on opposite sides of the wall.
  • Ensure both devices can log CSI data. Some routers can be flashed with custom firmware (e.g., OpenWRT) to access this.

Step 2: Collect CSI Data

  • Use tools like Atheros CSI Tool or Intel 5300 CSI Tool to capture the raw signal data.
  • Move around on the far side of the wall to generate reflections.

Step 3: Process the Data

  • Use Python libraries or MATLAB scripts to process the CSI data.
  • Apply filters to remove noise and static reflections.
  • Feed the cleaned data into a pre-trained neural network (like DensePose) to reconstruct human poses

Step 4: Visualize the Results

  • The output can be a 2D or 3D β€œstick figure” or heatmap showing where people are and how they’re moving.
  • Some setups can even distinguish between individuals based on movement patterns.

Limitations and Considerations

  • Wall Material: Thicker or metal-reinforced walls reduce accuracy.
  • Privacy: This technology raises major privacy concernsβ€”anyone with the right tools could potentially β€œsee” through your walls.
  • Legality: Unauthorized use of such technology may violate laws or regulations.

Real-World Applications

  • Security: Detecting intruders or monitoring restricted areas. Companies like TruShield are offering commercial home security systems based upon this technology.
  • Elder Care: Monitoring movement for safety without cameras.
  • Smart Homes: Automating lighting or HVAC based on occupancy.
  • Law Enforcement: Law enforcement agencies can detect and track suspects in their homes
  • Intelligence Agencies: Can Use this technology to track spies or other suspects.

Summary

Wi-Fi sensing is a powerful, rapidly advancing field. With basic hardware (HackRF) and open-source tools, it’s possible to experiment with through-wall detection. This opens a whole new horizon in Wi-Fi Hacking and SDR for Hackers.

For more on this technology, attend our upcoming Wi-Fi Hacking training, July 22-24. If you are interested in building this device, look for our 2026 SDR for Hackers training.

As always, use this knowledge responsibly and be aware of the ethical and legal implications.

The post Can Hackers β€œSee” Inside Your Home Using Wi-Fi to Track Your Location and Movement? first appeared on Hackers Arise.

❌