Skip to content

Instantly share code, notes, and snippets.

@gabonator
Last active April 24, 2024 12:31
Show Gist options
  • Save gabonator/74cdd6ab4f733ff047356198c781f27d to your computer and use it in GitHub Desktop.
Save gabonator/74cdd6ab4f733ff047356198c781f27d to your computer and use it in GitHub Desktop.
HiSilicon IP camera root passwords
Summary of passwords by sperglord8008s, updated November 1. 2020. For login try "root", "default", "defaul" or "root"
00000000
059AnkJ
4uvdzKqBkj.jg
7ujMko0admin
7ujMko0vizxv
123
1111
1234
1234qwer
2601hx
12345
54321
123456
666666
888888
1111111
/*6.=_ja
anko
anni2013
annie2012
avtech97
cat1029
ccadmin
cxlinux
default
dreambox
fxjvt1805
hdipc%No
hi3518
hichiphx
hipc3518
hkipc2016
hslwificam
ikwb
ipc71a
IPCam@sw
ivdev
juantech
jvbzd
jvtsmart123
klv123
klv1234
meinsm
OxhlwSG8
pass
password
realtek
root
hi3518
S2fGqNFs
service
smcadmin
supervisor
support
system
tech
tlJwpbo6
ubnt
user
vhd1206
vizxv
xc3511
xmhdipc
zlxx.
Zte521
@Arnaud30
Copy link

Arnaud30 commented Feb 5, 2024

Hi guys,
root:$1$rXUUrUvP$nwGw3hD5lodZU10IC57Ey0:10933:0:99999:7:::
Someone help me?

@27c512
Copy link

27c512 commented Feb 6, 2024

Hi guys, root:$1$rXUUrUvP$nwGw3hD5lodZU10IC57Ey0:10933:0:99999:7::: Someone help me?

!@#$qwer

@Arnaud30
Copy link

Arnaud30 commented Feb 7, 2024

you are the best !!! !!!!!! Oh my god ! I don't know how it's possible !!!!!

@Arnaud30
Copy link

Arnaud30 commented Feb 7, 2024

No kidding ! can you explain or is it a well kept secret?

@Arnaud30
Copy link

Arnaud30 commented Feb 7, 2024

another try ?

root:$6$wyzecamv3$8gyTEsAkm1d7wh12Eup5MMcxQwuA1n1FsRtQLUW8dZGo1b1pGRJgtSieTI02VPeFP9f4DodbIt2ePOLzwP0WI0:0:0:99999:7:::

@vertesmark
Copy link

No kidding ! can you explain or is it a well kept secret?

A: It is well documented how linux hash its passwords, just google it: linux password hash algorithm.
How can you "decoce"? You cannot. Hashing is a one-way algorithm.

Q: ...but hey! Look at above, someone did it.
A: We try to find a password, hash it and comepare the result with the original hash.
No other way exist. When you try hundred-thousands passwords/minute, this is called brute-force.

@espetoet
Copy link

espetoet commented Mar 9, 2024

I have this user but I don't know the password. Could you help me?

root:8dxMkZjXi01sk:0:0::/root:/bin/sh

@EEtinkerer
Copy link

EEtinkerer commented Mar 16, 2024

Hi guys, root:$1$rXUUrUvP$nwGw3hD5lodZU10IC57Ey0:10933:0:99999:7::: Someone help me?

!@#$qwer

firmware dated 01 2024, anyka v200
root:$1$6AHjBnTn$LvoexcPTiWwZP5fLfCGdv1

could you check this one out too?

@chrismclellen
Copy link

$50 reward for this md5
1FBC497B4AB24B7CA4D6893F59AE8779

@Arnaud30
Copy link

Arnaud30 commented Apr 5, 2024

possible: MD5, SHA1.Substr(0, 32), MD4, NTLM
can you specify the operating system?

@chrismclellen
Copy link

chrismclellen commented Apr 5, 2024 via email

@Arnaud30
Copy link

Arnaud30 commented Apr 5, 2024

somebody can help ?
root:$1$2ZmxCqpN$I5CzAUtuJId8WDgkxcC2g/:0:0::/root:/bin/sh

@EEtinkerer
Copy link

$50 reward for this md5 1FBC497B4AB24B7CA4D6893F59AE8779

now that ive learned how to do this.. mine was Ilove and yours was .Ilove
very funny

@chrismclellen
Copy link

chrismclellen commented Apr 18, 2024 via email

@Arnaud30
Copy link

somebody knows ?
root:$1$RiBtxRAG$PvXy3AX92u.mvo/UwXlTJ0:19404:0:99999:7:::
user:$1$ri3K4P4s$ne/es0YuNHyn0rti8KJ2a.:19404:0:99999:7:::

@Arnaud30
Copy link

Hi !
password for chinese cam
root:$1$2ZmxCqpN$I5CzAUtuJId8WDgkxcC2g/:0:0::/root:/bin/sh

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment