Camera Preset Positioning Commands

Have some questions or having issues with your IP Camera(s), Post them here for the mods and other users to assist you with.
Post Reply
patrolcaptain
Posts: 1
Joined: Sun May 10, 2020 8:22 am

Camera Preset Positioning Commands

Post by patrolcaptain »

If you are trying to send web commands to an IP2M-841 camera, be sure to use your external (internet/WAN) address rather than the internal (intranet) address.

For example, if you want to send a command to position a camera to preset 1, use the following command:

http://"username":"password"@"external address":"port #"/cgi-bin/ptz.cgi?action=start&channel=0&code=GotoPreset&arg1=0&arg2=1&arg3=0&arg4=0

Replace "username" with the username for the camera (default is admin)
Replace "password" with the password you chose to login to the camera
Replace "external address" with the WAN address of your router (not 192.168.1.n addresses)
Replace "port #" with the port number you assigned to the camera
User avatar
Revo2Maxx
Site Admin
Posts: 6731
Joined: Sat Jun 15, 2019 3:05 pm

Re: Camera Preset Positioning Commands

Post by Revo2Maxx »

Hello and welcome to the Forum!

Interesting First post... I am not sure why people would want to do something in a way for others to take the User and Pass..

Personally if I was only to have 1 Camera or even a few cameras I would use P2P and I don't care that if I am at Starbucks using the Wifi there that they would see my Cameras SN they can't get a Password for my camera without watching me type it in.. So don't have to worry about them accessing my camera.. However if I take that that you offered and used it at any Public Internet cafe or wifi hot spot and someone was skimming for info just sending that command to go to a Preset has just given anyone listening my user and password and my IP address yeah for me that isn't cool...

Practical use for your CGI command? I mean if I am not looking at the footage why would I want to send a Blanket command to my Camera to change View from the View I want it to record? So I have my NVR setup to PTZ my camera to Preset1 any time camera 1 or 3 gets motion this makes it so my Camera 2 is looking at the area that I want recorded when 1 and 3 gets motion.. That is because 1 leads to 2 and 3 does the same.. That way if motion is detected and the camera is moved by my Alarm input it has captured what it is needing to capture and want the camera to stay on guard however it lacks this feature like many of my costly PTZ have built in them... For me that is Practical use of a 841.. Sending a CGI command to your camera to remove from the location you left your home or business to keep an eye on something without looking at the area the camera is going isn't smart in my mind.. Amcrest View Pro app I can do anything I need over P2P sadly just can't make a new Preset and save it.. Other then that and a few other things that it can't do that I wish it could I find the camera very well made and is why I have a few more then I should lol..
Be Safe.
HikwQedxw
Posts: 12
Joined: Sun Aug 18, 2019 10:34 pm

Re: Camera Preset Positioning Commands

Post by HikwQedxw »

I avoid P2P at all costs. Any device that uses P2P sends the IP address and available port to a central server. Vast majority of those P2P servers are open to the public. Just query the server with a UUID and the current connection info is returned.

Why P2P? It's fairly simple, doesn't require a great amount of effort or knowledge. The sole purpose is to prevent customers from requiring costly tech support help. Device manufacturers know it can easily be exploited and they have no intention of changing it. Just look at how long it took to get manufacturers to force users to change the default password on a new device. Again that was to simplify the setup process and avoid the cost of customer tech support.

Attackers are constantly scanning those P2P servers for devices and IP addresses to attack. Some are targeting the device that has reported its presence, most are looking for public IP addresses to attack regardless of the active device that reported it. The more P2P devices that are actively reporting your home's public IP address exponentially increases the probability your connection will be constantly scanned and attacked. For me when I turned off P2P on all my devices, then forced my public IP address to change, the number of IP addresses that were port scanning my connection went from 1500+ unique IPs down to an average of less than 20 a day. YES, I eliminated roughly 97% of my port scanning attacks just by turning off P2P.

Here's the true bonus of turning off P2P. After eliminating all the bandwidth that was being wasted by the excessive port scanning my connection rating on speedtest.net went from F to A-. Basically P2P was enabling attackers to deny me from having a reliable internet connection.


Try taking a look at this article illustrating the vulnerability of P2P devices.
https://krebsonsecurity.com/2019/04/p2p ... t-devices/
macjohn
Posts: 3
Joined: Sun Apr 03, 2016 7:51 pm

Re: Camera Preset Positioning Commands

Post by macjohn »

Thank you for this post. I use this for cameras on my home network that I livestream to youtube via obs studio. I had one cam that I needed to switch to a specific preset at a specific time and this gave me the way to finally accomplish that.
Thank you!
User avatar
Revo2Maxx
Site Admin
Posts: 6731
Joined: Sat Jun 15, 2019 3:05 pm

Re: Camera Preset Positioning Commands

Post by Revo2Maxx »

Yes lets post something about P2P on flaws that happened to be closed long time ago. Sorry P2P is something I would not be worried about unless you are running your Device in the normal preset user and password from years past. Today that won't fly and with first log on it will make you change the password. I only have 1 device that I have left with admin admin lol. I don't use it and I leave it that way only because I have to many devices with to many different combo of Passwords.. I forgot what I had it setup for so I reset back to Factory. In truth if someone was to leave their device with the preset admin and password then they deserve to be hacked. Anyone that cares about their security cameras should change the password and use the newer FW that has plugged the holes that might have been out there in 2019 lol. I am sorry but today is 2023 please find me 1 story that can be tested and pass with a Flaw in P2P with Amcrest Device with at least 2017 FW loaded... I have tested all of my devices and spent many hours trying to 1 hack my own known passwords using may different methods of doing so and to this day I have yet found my systems to be flawed with a Zero Day or the ability to hack my Password. While I don't have a mining rig and I am sure there are systems out there that can move though password hashes faster then my system can. Why would anyone want to HACK my camera. Do I have hackable devices? Sure. have I? Sure are they in use Today? NO! and I have orders on when I pass away that the one that are Hackable are E wasted as I would never want to sale a device that I know can be hacked from inside my own network with the idea that someone might use it with access to outside their own network and I just don't want that.. These devices have not had a Update on Since 2015 or in some cases longer then that.. However not one of my Amcrest or Newer Dahua devices have been found to be hackable...
Be Safe.
Post Reply