- The Camera
- Disassembly
- Disassembly Summary
- Wireless Protocol Disassembly
- DoS
- Anonymous Picture Uploading
- Summary
Anonymous Picture Uploading
Assuming an attacker can capture one valid session, there is another type of attack that could leave a victim in a difficult situation. The problem is related to the fact that there is little authentication required by the host PC, to which the pictures are uploaded. To the best of my knowledge, the only form of authentication is a MAC address, which can easily be spoofed by an attacker. The end result is that an attacker can upload a picture of their choosing to the host PC and have that picture automatically pop up on the victim's screen. Imagination is the limit with this attack; however, consider the impact an attacker could have with a virtual mooning!
Both of these attacks have been tested and they work flawlessly. I am examining other possible abuses/attacks, such as the upload of an infected WMF file, JPG image, or EXE file. However, at this point, it appears as if the image format must be in the XIFF format.