Last active
April 24, 2024 12:31
-
-
Save gabonator/74cdd6ab4f733ff047356198c781f27d to your computer and use it in GitHub Desktop.
HiSilicon IP camera root passwords
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Summary of passwords by sperglord8008s, updated November 1. 2020. For login try "root", "default", "defaul" or "root" | |
00000000 | |
059AnkJ | |
4uvdzKqBkj.jg | |
7ujMko0admin | |
7ujMko0vizxv | |
123 | |
1111 | |
1234 | |
1234qwer | |
2601hx | |
12345 | |
54321 | |
123456 | |
666666 | |
888888 | |
1111111 | |
/*6.=_ja | |
anko | |
anni2013 | |
annie2012 | |
avtech97 | |
cat1029 | |
ccadmin | |
cxlinux | |
default | |
dreambox | |
fxjvt1805 | |
hdipc%No | |
hi3518 | |
hichiphx | |
hipc3518 | |
hkipc2016 | |
hslwificam | |
ikwb | |
ipc71a | |
IPCam@sw | |
ivdev | |
juantech | |
jvbzd | |
jvtsmart123 | |
klv123 | |
klv1234 | |
meinsm | |
OxhlwSG8 | |
pass | |
password | |
realtek | |
root | |
hi3518 | |
S2fGqNFs | |
service | |
smcadmin | |
supervisor | |
support | |
system | |
tech | |
tlJwpbo6 | |
ubnt | |
user | |
vhd1206 | |
vizxv | |
xc3511 | |
xmhdipc | |
zlxx. | |
Zte521 |
$50 reward for this md5
1FBC497B4AB24B7CA4D6893F59AE8779
possible: MD5, SHA1.Substr(0, 32), MD4, NTLM
can you specify the operating system?
Windows iis
…On Fri, Apr 5, 2024, 3:37 AM Arnaud30 ***@***.***> wrote:
***@***.**** commented on this gist.
------------------------------
possible: MD5, SHA1.Substr(0, 32), MD4, NTLM
can you specify the operating system?
—
Reply to this email directly, view it on GitHub
<https://gist.github.com/gabonator/74cdd6ab4f733ff047356198c781f27d#gistcomment-5013310>
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AFPXRVPTYQRSXNKGGX6O56TY3ZWFLBFKMF2HI4TJMJ2XIZLTSKBKK5TBNR2WLJDUOJ2WLJDOMFWWLO3UNBZGKYLEL5YGC4TUNFRWS4DBNZ2F6YLDORUXM2LUPGBKK5TBNR2WLJDHNFZXJJDOMFWWLK3UNBZGKYLEL52HS4DFVRZXKYTKMVRXIX3UPFYGLK2HNFZXIQ3PNVWWK3TUUZ2G64DJMNZZDAVEOR4XAZNEM5UXG5FFOZQWY5LFVAZTMOBWGQ4DANNHORZGSZ3HMVZKMY3SMVQXIZI>
.
You are receiving this email because you commented on the thread.
Triage notifications on the go with GitHub Mobile for iOS
<https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675>
or Android
<https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub>
.
somebody can help ?
root:$1$2ZmxCqpN$I5CzAUtuJId8WDgkxcC2g/:0:0::/root:/bin/sh
$50 reward for this md5 1FBC497B4AB24B7CA4D6893F59AE8779
now that ive learned how to do this.. mine was Ilove and yours was .Ilove
very funny
Are you sure that's what it is? That's a funky password
…On Thu, Apr 18, 2024, 5:41 AM EEtinkerer ***@***.***> wrote:
***@***.**** commented on this gist.
------------------------------
$50 reward for this md5 1FBC497B4AB24B7CA4D6893F59AE8779
now that ive learned how to do this.. mine was Ilove and yours was .Ilove
very funny
—
Reply to this email directly, view it on GitHub
<https://gist.github.com/gabonator/74cdd6ab4f733ff047356198c781f27d#gistcomment-5028166>
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AFPXRVKZW43W5WMNRQ6FZALY56WNRBFKMF2HI4TJMJ2XIZLTSKBKK5TBNR2WLJDUOJ2WLJDOMFWWLO3UNBZGKYLEL5YGC4TUNFRWS4DBNZ2F6YLDORUXM2LUPGBKK5TBNR2WLJDHNFZXJJDOMFWWLK3UNBZGKYLEL52HS4DFVRZXKYTKMVRXIX3UPFYGLK2HNFZXIQ3PNVWWK3TUUZ2G64DJMNZZDAVEOR4XAZNEM5UXG5FFOZQWY5LFVAZTMOBWGQ4DANNHORZGSZ3HMVZKMY3SMVQXIZI>
.
You are receiving this email because you commented on the thread.
Triage notifications on the go with GitHub Mobile for iOS
<https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675>
or Android
<https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub>
.
somebody knows ?
root:$1$RiBtxRAG$PvXy3AX92u.mvo/UwXlTJ0:19404:0:99999:7:::
user:$1$ri3K4P4s$ne/es0YuNHyn0rti8KJ2a.:19404:0:99999:7:::
Hi !
password for chinese cam
root:$1$2ZmxCqpN$I5CzAUtuJId8WDgkxcC2g/:0:0::/root:/bin/sh
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
firmware dated 01 2024, anyka v200
root:$1$6AHjBnTn$LvoexcPTiWwZP5fLfCGdv1
could you check this one out too?