David Bombal

#554: WHY Your Cheap Chinese IoT Camera Is A Network NIGHTMARE

8 snips
Mar 10, 2026
Matt Brown, cybersecurity researcher and IoT penetration tester who builds educational hardware hacking tools. He demos his Man in the Middle Router for intercepting IoT TLS traffic. He walks through lab setup, transparent TLS interception with mitmproxy, and a live hack of a cheap Chinese camera that exposes credentials and cleartext API data.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Router-Based TLS Termination For IoT Analysis

  • IoT devices often use TLS but create an encrypted end-to-end tunnel that must be terminated to inspect payloads.
  • Matt built Man In The Middle Router to turn a Linux box into a router that can intercept and terminate TLS for analysis.
INSIGHT

Certificate Pinning Blocks Simple MITM Interception

  • SSL pinning is stricter certificate verification where the client trusts a hard-coded server certificate instead of system roots.
  • If a device performs proper pinning you may need firmware or app modifications to intercept TLS.
ADVICE

Install Core Linux Packages Before Running The Script

  • To run Man In The Middle Router, install hostapd, dnsmasq, bridge-utils and net-tools on any standard Linux distro.
  • Matt recommends Ubuntu or Raspberry Pi OS and notes the script runs on bare metal or a VM with USB passthrough.
Get the Snipd Podcast app to discover more snips from this episode
Get the app