|Summary of passwords by sperglord8008s, updated November 1. 2020. For login try "root", "default", "defaul" or "root"|
Do you have any more info about this camera with root:ivdev?
I Have a HI3516 cam
Device ID: IPCAM
all this passwords are not working.
IPCamera login: root<\r><\n>
i have only serial access. Telnet is disabled
do you have a idea how to enable telnet or get the shadow file?
or is the a way to flash a other firmware?
i only want to disbaled or remove the "Backdoors"
for the 6100e(100万e) v3.08R08.20150129.89 camera:
onvif link http://192.168.20.115:20020/onvif/device_service
Also mmintas, thanks for the firmware link, was able to upgrade my camera from v3.00R04.20141118.89 to v3.00R04.20150129.89
I have a similar camera: TH38J
I've wrote something about the Hikam S6 (based on HI3518E):
time2 MP12 HD Cam:
Anyone can help me? It's HEROSPEED FIRMWARE (herospeed.net)
help-me to decode:
link from the firmware:
I have a Hi3521 device (console output here) that I was able to make a flash dump and hash extraction. U-boot is password protected. Hashcat gave me almost nothing (it decrypted the previous password from passwd- file, but not the current). Maybe someone might have a clue how to break in - I only have serial console, the box doesn't have any usb, ethernet or wifi.
Also been using hashcat and john running for over two days and no log not sure if I am using the wrong sequence with Hashcat been using ?1?d with ?1?1?1?1?1?1
but this hash seems to be more complicated than a simple DES encrypt:
Can anyone help with either the right sequence to use in HashCat or running the has for me?
Yes, it’s des. I’ve been using John the ripper for about a week, no result yet. If anybody has a better solution or a powerful pc, I would be grateful for any help
what device/source is it from? any details?
It’s from topsee (or tpsee) TH38M/M2 IPC firmware upgrade package_V18.104.22.168.
Hello guys, the idea behind this gist was to collect all known passwords for hisilicon based cameras (or other linux based cameras). Feel free to post your hashes here in this discussion, one day I will go through all your comments and collect new login/password pairs. Maybe I will create some spreadsheet on google docs... Or is there any volunteer who would like to take care of this? It seems there are also clever guys with ability to transform the hashes back to passwords, so thank you for contributing... And please dont forget to post also the name/model/manufacturer of your camera with your hashes. Have fun with hacking your cameras!
Thanks, I hadn't gotten that far cracking this one. I ended up just backdooring the cam and adding my own /mnt/flash/tmp/script/preRUN.sh that opened up a telnetd with no login to run on boot.
nice find, thanks for sharing!
It's from a Hi3516C-based IP-camera. China no-name with the JUAN-based software, product number PE-3020-W5. Mine is one of those that sends e-mails with jpegs attached to firstname.lastname@example.org so I thought I'd entertain myself with writing a new firmware. Starting with a basic RTSP-server and see were it goes from there :-)
Try this list with if you cant find your password
Your hash is missing a salt > $1 = md5crypt , It should be format in this way