Hubble App For Motorola Mac

The Motorola Wi-Fi Video Baby Monitor Camera (MBP88CONNECT) is a webcam that can be controlled and viewed using the Hubble mobile app and Hubble web app. I found several vulnerabilities in the camera’s web interface, which have been resolved by the distributor through firmware updates. This article describes the vulnerabilities and how I found them.

Using APKPure App to upgrade Hubble for Motorola Monitors, fast, free and save your internet data. The description of Hubble for Motorola Monitors Our newly designed Hubble For Motorola Monitors app makes it easier to stay connected to your baby, home and pets wherever you are. Our newly designed Hubble For Motorola Monitors app makes it easier to stay connected to your baby, home and pets wherever you are. Simply download the app to connect to your camera to instantly.

Setup

The camera can be put in pairing mode using a button on the camera itself. In pairing mode, the mobile app can be used to connect the camera to the Hubble account. In pairing mode the camera works as a open WiFi access point. The phone connects via WiFi and initializes the camera. After that, the camera can connect to the normal WiFi.

Camera on the local network

The Hubble server acts as a service to connect phone and camera, but the video stream is sent directly over the WiFi, not over the internet. This means that the camera can only be viewed when the phone and the camera are connected to the same WiFi network. This gives a little bit of a security advantage, since the camera is not connected directly to the internet.

For this security test, I shared my network connection over the WiFi, making my laptop a WiFi access point. I configured the camera to connect to my laptop access point, so that all traffic goes through my laptop and can be intercepted.

Discovery

After setting up the camera, I run a port scan to discover any services on it:

There seem to be two HTTP interfaces, on port 80 and port 8080.

Scanning HTTP services

There are two tools that I run on any HTTP server:

  • dirsearch
  • nikto

Dirsearch tries to find files on the server. It simply requests a lot of files and lets you know which ones exist. This does not indicate any vulnerability, but may give an entry point to test some undiscovered functionality. Nikto is an automatic scanner that searches for vulnerabilities. I don’t think it’s very good and you can’t trust anything it says, but it’s automated so it can give some clues without any effort on my part.

Dirsearch detects test page

Running dirsearch indicates that there is a test.html page on the camera server. This gives a page that allows to control the camera. Supposedly you could also view the video stream here, but that doesn’t work. But we can move the camera, play sounds, and view the temperature. We can do all this without having authenticated. The mobile phone was paired with the camera and should be able to control it, but this page makes it possible for anyone that can connect to the camera to control it.

Test functionality in production environment

This page is titled BLINKHD Factory Test. From this I assume that it is used to test the camera after manufacturing. However, it shouldn’t be left on the camera when it’s shipped to users. Leaving test code in a production system exposes unnecessary functionality that increases the attack surface.

Missing authentication

This camera has little authentication. Pairing the camera to the phone during setup doesn’t actually create a trusted connection. Anyone that can perform a request to the camera can control its motion, play sounds, or view video.

Cross-site request forgery

Any user on the same network can perform such a request, but also anyone on the internet with a website. If you have a camera at home and browse to a website, that website can cause a request to the camera. This is known as cross-site request forgery: the site on the internet “forges” a request to the camera. For example, putting the following code on a website makes the camera move to the left:

Nikto detects path traversal

Running Nikto gives the following interesting result:

This doesn’t seem like a Cisco system, but it looks like the server may be vulnerable to path traversal in the web server. For example, the following command line retrieves the /etc/passwd file:

Path traversal

Path traversal originates from concatenating user input to obtain a directory. In our case, the webroot is /mnt/skyeye/mlswwwn. This directory contains the files that are available on the webserver, such as test.html.

So if you request /test.html, the server appends /test.html to /mnt/skyeye/mlswwwn and opens the file /mnt/skyeye/mlswwn/test.html.

Now, if you request /./././etc/passwd, the server serves the file /mnt/skyeye/mlswwwn/./././etc/passwd. Since . means “go a directory up”, this resolves to /etc/passwd, which contains a list of users on the system.

Retrieving password hashes

We can also try to request the related /etc/shadow file:

This file contains the password hashes. The shadow file is normally only accessible by the root user, which indicates that the web server runs as root.

Missing privilege separation

The root user is the user with the highest privileges on a Linux system. Running the webserver as root introduces a security risk, since any vulnerability in the web server gives total access to the system. It is generally recommended to run the web server as a normal user that only has the necessary privileges.

Cracking password hashes

Hubble

Now that we have the password hash, we can try to brute-force it: we try many passwords and compare their hash to the root user hash. This can be done automatically with a tool such as hashcat. After a couple of seconds, it outputs that the password is 123456:

This is an insecure password. However, this may not matter much since we haven’t found any place yet where we could login using this password.

Finding files

We now can retrieve any file if we know the filename, but of course we can’t request a directory listing. So we have to guess some paths. We know that the system is running some Unix variant, possibly Linux, since it has the /etc/passwd file. So we can try some common files to learn more about the system.

  • /var/log/messages contains a log line about /mnt/skyeye/wifi/wpa_cli-action.sh.
  • /mnt/skyeye/wifi/wpa_cli-action.sh contains a call to udhcpc with /mnt/skyeye/wifi/default.script as parameter.
  • /mnt/skyeye/wifi/default.script restarts /mnt/skyeye/bin/ota_upgrade.
  • ota_upgrade downloads the firmware image. The firmware image contains all the files.

Analyzing firmware download

The file ota_upgrade is an executable binary (i.e. an .exe file) that downloads and unpacks the firmware. We can see if we can find out how it does that and then download the whole firmware ourselves, so that we can analyze it.

I load the file in Binary Ninja, a disassembler. I am not very good at ARM assembly. I mainly look at function calls and which strings go into that. For example, bl sprintf calls the function sprintf in the C libary. The three strings above it are probably its arguments. It seems to glue two strings together with a slash between them, which results in the url https://ota.hubble.in/ota1/2855_patch/version.txt. A little further down it uses this version to download the file https://ota.hubble.in/ota1/2855_patch/2855-02.10.08.fw.pkg, which is the firmware image.

Unfortunately, there seems to be nothing on that URL. The firmware image is not available. It could be that I made a mistake when analyzing the code, or that the firmware update process is broken or disabled.

There is something we can try: another code path downloads version_dev.txt, which is supposedly the development version of the firmware. That returns version 03.10.17, and that firmware image exists on https://ota.hubble.in/ota1/2855_patch/2855-03.10.17.fw.pkg.

Now we have the development firmware image, and we want to unpack it and view the files in it. First, we need to decrypt it. ota_upgrade calls aes_decrypt to do this, and we can too. We download aes_decrypt using our path traversal vulnerability. This is a binary compiled for ARM processors, so we can’t directly call it. Instead, we use Qemu.

We copy aes_decrypt, qemu-arm-static, and our firmware image into a directory. Then we run aes_decrypt on our file, in a chroot:

It fails. Let’s see what went wrong by adding -strace to the command:

We don’t have a proc filesystem in our chroot, so this fails. We can solve this by putting our firmware image file on this location.

App

We run it again, and now it succeeds. It created a file proc/self/fd/1, which is a tar.gz file with a JFFS2 filesystem image in it, with all the files.

Intercepting HTTPS traffic

So far we have just contacted the camera directly, but we can also try to intercept HTTP traffic to the internet. To do this we set up Burp to act as an invisible proxy and send all HTTP traffic to Burp using a port forward in pf or iptables. Then, when we boot up the camera, we see the traffic it sends to the internet.

This shouldn’t work. We just performed a man-in-the-middle attack on the camera, and that is precisely what HTTPS is supposed to prevent. Hackers intercept SSL traffic all the time, but then they configure the client to explicitly trust the certificate Burp uses. In our case, we can’t tell the camera to trust us. Still, we can view all traffic.

This means that the camera doesn’t actually verify SSL connections. It communicates over HTTPS, but since it doesn’t verify certificates this can be intercepted by anyone with access to the network. The security of HTTPS is effectively disabled.

Furthermore, when you enable motion detection on the camera it sends a camera picture over plaintext HTTP over the internet. This means that camera images can be viewed by anyone with access to the network path. And if we browse to https://ota.hubble.in/, the browser notifies us that the connection is insecure because the certificate has been revoked.

Conclusion

This camera was insecure, particularly because was is missing authentication and had a path traversal vulnerability in the web server. I reported these vulnerabilities to the distributor, who took it seriously and has deployed fixes through firmware updates.

Where can i download microsoft excel for mac. Hubble for Motorola Monitors for PC – Get the last version of Hubble for Motorola Monitors 2019 for Windows 10, 8, 7, Vista & XP PC 32-bit/64-bit and MAC directly from this site for free now.

Get Hubble for Motorola Monitors App for Windows

Download last version of Hubble for Motorola Monitors App for PC Windows from the button link on below.

App NameHubble for Motorola Monitors
Version6.5.2
Update2019-08-09
RequirementWindows 7, Windows 8, Windows 10

How To Install Hubble for Motorola Monitors on Windows 10

This app is made for Android. So, if you wanna install Hubble for Motorola Monitors on PC Windows, first you will need Android Emulator like NOX App or Bluestacks. With this emulator app you will be able to running Hubble for Motorola Monitors into your Windows 7, 8, 10 Laptop. And even install android app on your MAC OSx PC

  1. Go to this Bluestacks download page or NOX App Download Page to get the emulator that compatible with your Operating System.
  2. Click the icon on Desktop to run the Bluestacks Emulator app on Windows.
  3. Login with your Google Play Store account.
  4. Then, open Google Play Store and search for ” Hubble for Motorola Monitors “
  5. Choose one of the app from the search result list. Click the Install button.
  6. Or you can import the Hubble for Motorola Monitors.apk file that you’ve downloaded from the link on above this article with Bluestacks File Explorer. Right-Click then install it.
  7. Now you can play Hubble for Motorola Monitors app for PC.
  8. Enjoy the app!
  9. Installing NOX it’s almost the same with step on above

Install Hubble for Motorola Monitors on MAC PC

This Hubble for Motorola Monitors is a great fit for Mac OS as well. To download it in your Mac Book, first you’ll need to download the .dmg file of BlueStacks Emulator for MAC. After you have finished installing BlueStacks emulator, the process of installation for Mac OS is exactly the same as Windows. Follow the above steps and you will successfully download the Hubble for Motorola Monitors App. on your Mac Book PC.

How to completely uninstall (remove) Hubble for Motorola Monitors?

Because this app is installed on PC with Bluestacks, So just follow these instructions on bellow To uninstall (remove) app:

  • On the BlueStacks window, click on the Blue colored “Home” button as shown in the picture below
  • Once you click on the “Home” button, you will be able to see the option “Installed apps” on the Home screen
  • Hover the mouse near “Installed apps” and it will then show further options “Install apk” and “Delete apps” as shown in the picture below. Left click on “Delete apps” once
  • Once we click that option, the screen option will appeared
  • All the installed apps will have a small Red “X” marked on the top left. Left click once on the small Red “X” associated with the icon of the app you are intending to uninstall or delete
  • Click on Yes to Uninstall/Delete the app
  • Repeat the procedure in case you have more than one app to be uninstalled or deleted from BlueStacks.

Alternatively, you may also left-click and hold the app icon you want to uninstall or delete and then click once on (cross button) next to the app icon to uninstall it.

Hubble for Motorola Monitors for Windows Reviews

Hubble for Motorola Monitors App Preview

Our newly designed Hubble For Motorola Monitors app makes it easier to stay connected to your baby, home and pets wherever you are. Simply download the app to connect to your camera to instantly start monitoring what you may be missing at home. The app can live video stream, or why not set up instant alert notifications incase something happens.
Features:
· Motion and sound detection alerts – Get notified when there’s activity, sent straight to your phone
· Motion triggered image snapshots
· Two-way audio – talk back to get someone’s attention
· Up to 30 days video history when you subscribe to Hubble’s plans
(Subscription service sold separately)

To start monitoring from your phone simply follow these 3 steps:
1.Download the app
2.Follow the set up instructions to connect your camera
3.Start monitoring straight away and simply schedule the alerts you wish to receive

Note – some features require a working internet connection/ WIFI and will vary based on the model of camera you are using

Support
If you experience any issues please email [email protected]
New Sleeping tracker & widget – Quick way to track baby’s sleep
Feeding reminder & widget- Quick way to track baby’s feeding
Enjoy Picture in Picture mode during streaming
SmartZone (Subscription plan needed / during free trial) – Get an alert if baby/toddler gets out of crib/play area on device models MBP1854,Focus86,Focus66
Baby Tracker – Track your baby’s development, feeding, diaper & many more
Baby Sleep Advice – Find most useful baby sleep articles & expert videos
Lullabies and Storybooks

Disclaimer

Hubble for Motorola Monitors is an App that build by their Developer. This website is not directly affiliated with them. All trademarks, registered trademarks, product names and company names or logos mentioned it in here is the property of their respective owners.

Hubble for Motorola Monitors installer file is not hosted on our server. When visitor click “Download” button, installation files will downloading directly from the Official Site.