- The Camera
- Disassembly
- Disassembly Summary
- Wireless Protocol Disassembly
- DoS
- Anonymous Picture Uploading
- Summary
Wireless Protocol Disassembly
When looking at a digital gadget there are two main factors: the hardware and software. In the previous sections I provided a fairly good look at how the hardware is assembled. This section will examine one of the software components—in particular the wireless transfer protocol.
The initial setup of the camera requires that you set up a profile within the Nikon software. This profile includes several pieces of information, such as the wireless access point name and any WEP/WPA key that is required. This information is then sent over to the camera, which uses this data to connect to the host PC over the local wireless network. Once you're ready to transfer a picture, you turn the top knob on the camera to the wireless selection. This loads up a menu of available profiles that you can scroll through until the desired network is found. Hit the OK button and the camera comes online and connects to the network. At this point the menu screen is reloaded with a list of available functions. Once you select one of the options, the wireless transfer starts.
The first packet is sent out from the camera from port 5353 using the MDNS protocol to address 224.0.0.251:5353. Since the host PC is listening on port 5353, it detects this packet and uses it to set up a return connection back to the camera. Once the initial packets are sent, the camera opens up a port (15740), to which the host PC will attempt to connect. The host PC actually creates two sessions to the camera. One is the main session through which the pictures are sent. The other is for an unknown purpose, but I suspect it has something to do with the purpose of the transfer – much like a controller session that is kept separate from the data transfer session.
Once the host PC downloads the pictures, the sessions are closed and the camera disconnects from the network. While this might appear very well thought out, there are a few security issues that were not properly addressed.