HackPathHackPath
CoursesRoadmapPracticePricing
>_
HackPath

Network Privacy — Real-World Investigations

0%
Lessons
Network Surveillance & Privacy
01Detect Hidden Cameras on an Airbnb Network
30 min
02Identify Every Device on Your Network
30 min
03Audit Your Router — The Most Exposed Device You Never Check
30 min

Lesson 01

Detect Hidden Cameras on an Airbnb Network

Your first line of digital defense. In 30 minutes, learn to sweep any Wi-Fi for hidden surveillance devices using the same tools as professional security auditors.

Network Privacy — Real-World Investigations/Detect Hidden Cameras on an Airbnb Network

The Threat in Your Room

You're in an Airbnb, a hotel, or a rental office. You connect to the Wi-Fi. You trust the space. But you shouldn't trust the network.

A hidden camera doesn't need a separate data plan. It just needs the Wi-Fi. Once it's connected, anyone with the password can watch a live feed from anywhere in the world. This isn't movie plot stuff — it's a cheap, common threat.

This lesson gives you the power to see every single device connected to the network and flag the ones that shouldn't be there.

Stay Legal

Only scan networks you have permission to use (your rental, your home). Scanning networks you're not authorized to access is illegal. This is for defensive purposes only.

Step 1 — Find Your Network's Range

First, find your own IP address. This tells you what "neighborhood" of the network you're in.

bash
You type
# macOS
$ipconfig getifaddr en0
# Linux
$ip route show default | awk '{print $3}'
Terminal prints
# macOS → 192.168.86.45
# Linux → 192.168.86.1
# Your subnet is your network range. If your IP is 192.168.86.45,
# your range is 192.168.86.0/24. That's what we'll scan.

The /24 means we're scanning all 256 possible addresses on your local network.

Diagram showing the workflow to spot a hidden camera on a local Wi-Fi: find the subnet range, sweep devices with arp-scan, use MAC vendor hints, then confirm camera-like ports such as RTSP 554 with a targeted nmap scan.

A simple workflow: range → sweep → vendor hint → confirm ports (no touching the device).

Step 2 — The Ultimate Network Sweep

This is the core command. We'll use arp-scan, a tool that's often faster and more reliable for discovering devices on your local subnet than a simple ping sweep. It talks directly to devices at a low level.

bash
You type
# macOS (Homebrew)
$brew install arp-scan
# Ubuntu/Debian
$sudo apt-get install arp-scan
# Run the scan
$sudo arp-scan --localnet
Terminal prints
Interface: en0, type: EN10MB, MAC: 00:1c:42:00:00:08, IPv4: 192.168.86.45
Starting arp-scan 1.9.7 with 256 hosts
192.168.86.1 00:1a:2b:3c:4d:5e NETGEAR, INC.
192.168.86.23 b4:a2:eb:xx:xx:xx HIKVISION DIGITAL TECHNOLOGY
192.168.86.45 00:1c:42:00:00:08 Apple, Inc.
192.168.86.67 c4:27:12:xx:xx:xx Unknown vendor

Look at that output. You see the IP, the MAC address, and — most importantly — the vendor.

That second line? HIKVISION DIGITAL TECHNOLOGY? Hikvision is one of the world's largest manufacturers of IP cameras. If you don't see a Hikvision camera in the room, you have a problem.

Step 3 — The "Is This a Camera?" Checklist

You have a list of devices. Now, how do you spot a camera? Look for these red flags:

Suspicious vendor names:

  • HIKVISION, DAHUA, REOLINK, AMCREST, EZVIZ, ANNKE
  • Espressif Systems (common in cheap, unbranded IoT devices)
  • ShenZhen or Shanghai in the vendor name (often generic IoT)
  • Unknown vendor

Manual MAC address lookup: If arp-scan shows "Unknown vendor", copy the first 6 characters of the MAC (the OUI) and paste them into macvendors.com.

bash
You type
# The OUI is the first 6 hex characters of the MAC
# 192.168.86.67 c4:27:12:xx:xx:xx Unknown vendor
# → Look up "c4:27:12" on macvendors.com
Terminal prints
Shenzhen Bilian Electronic Co., Ltd.
→ Another common IoT/camera manufacturer.

Step 4 — Confirm Your Suspicions

You've found a suspicious device. Now let's see if it's acting like a camera. We'll use nmap to check for the tell-tale sign: the RTSP video streaming port.

bash
You type
$sudo nmap -sV -p 554,80,8080,443 192.168.86.23
Terminal prints
PORT STATE SERVICE VERSION
554/tcp open rtsp
80/tcp open http Boa httpd 0.94.14rc21
8080/tcp open http mini_httpd 1.19

Port 554 means it's running the Real Time Streaming Protocol — how cameras broadcast video.

Boa httpd is a tiny web server found almost exclusively in embedded devices like IP cameras.

Seeing both port 554 open and a camera vendor name is as close to a smoking gun as you can get without touching the device.

What to do if you find one

  1. Document: Take a screenshot of your terminal window. 2. Disconnect: Leave the Wi-Fi network immediately. 3. Report: Contact the platform (Airbnb, Booking.com, etc.) with your evidence. They take this extremely seriously. 4. Do Not Access: Do not try to log in or view the feed. That crosses a legal line.

Summary

You now have the power to:

  • Instantly map every device on any network you join
  • Identify manufacturers from hardware addresses
  • Spot the digital fingerprints of surveillance equipment

This is a critical skill for digital privacy. But finding the device is only the beginning.

In the next lesson, you'll learn to go deeper — moving from just finding devices to profiling them. You'll identify their operating system, every service they're running, and build a complete intelligence report on your network. This is the difference between a simple scan and a professional network audit.

Hands-on challenge

Practice what you learned — run it on your machine.

Do the challenge →

You're on a free lesson

Ready to go further?

Unlock all courses, exercises, real-world scenarios and flashcards — everything to build real skills.

Unlock full access →

No commitment · Cancel anytime

Sign in to track your progress.

Sign in to validate →

2 lessons locked in this course · 800+ students enrolled

$99/year — save 31% vs monthly

Unlock full access →