-
-
Save gabonator/74cdd6ab4f733ff047356198c781f27d to your computer and use it in GitHub Desktop.
Summary of passwords by sperglord8008s, updated November 1. 2020. For login try "root", "default", "defaul" or "root" | |
00000000 | |
059AnkJ | |
4uvdzKqBkj.jg | |
7ujMko0admin | |
7ujMko0vizxv | |
123 | |
1111 | |
1234 | |
1234qwer | |
2601hx | |
12345 | |
54321 | |
123456 | |
666666 | |
888888 | |
1111111 | |
/*6.=_ja | |
anko | |
anni2013 | |
annie2012 | |
avtech97 | |
cat1029 | |
ccadmin | |
cxlinux | |
default | |
dreambox | |
fxjvt1805 | |
hdipc%No | |
hi3518 | |
hichiphx | |
hipc3518 | |
hkipc2016 | |
hslwificam | |
ikwb | |
ipc71a | |
IPCam@sw | |
ivdev | |
juantech | |
jvbzd | |
jvtsmart123 | |
klv123 | |
klv1234 | |
meinsm | |
OxhlwSG8 | |
pass | |
password | |
realtek | |
root | |
hi3518 | |
S2fGqNFs | |
service | |
smcadmin | |
supervisor | |
support | |
system | |
tech | |
tlJwpbo6 | |
ubnt | |
user | |
vhd1206 | |
vizxv | |
xc3511 | |
xmhdipc | |
zlxx. | |
Zte521 |
possible: MD5, SHA1.Substr(0, 32), MD4, NTLM can you specify the operating system?
Its MD5
Hey guys, kinda new here! how do you get HASH from camera.
i used zenmap to get that it uses Linux 3.2 - 4.14
i used putty to connect, but i cant go trought Log:pass. cause none of the passwods correct.
but all this info is nothing for me.
i need to default reset camera, and this camera has no button =( and nobody remembers password to web interface.
Look on the pcb for a reset button
…
On Wed, May 15, 2024, 6:04 AM Osirismix @.> wrote: @.* commented on this gist. ------------------------------ Hey guys, kinda new here! how do you get HASH from camera. i used zenmap to get that it uses Linux 3.2 - 4.14 i used putty to connect, but i cant go trought Log:pass. cause none of the passwods correct. but all this info is nothing for me. i need to default reset camera, and this camera has no button =( and nobody remembers password to web interface. — Reply to this email directly, view it on GitHub https://gist.github.com/gabonator/74cdd6ab4f733ff047356198c781f27d#gistcomment-5057955 or unsubscribe https://github.com/notifications/unsubscribe-auth/AFPXRVIW7XY5L5UVWPOYLELZCNFLRBFKMF2HI4TJMJ2XIZLTSKBKK5TBNR2WLJDUOJ2WLJDOMFWWLO3UNBZGKYLEL5YGC4TUNFRWS4DBNZ2F6YLDORUXM2LUPGBKK5TBNR2WLJDHNFZXJJDOMFWWLK3UNBZGKYLEL52HS4DFVRZXKYTKMVRXIX3UPFYGLK2HNFZXIQ3PNVWWK3TUUZ2G64DJMNZZDAVEOR4XAZNEM5UXG5FFOZQWY5LFVAZTMOBWGQ4DANNHORZGSZ3HMVZKMY3SMVQXIZI . You are receiving this email because you commented on the thread. Triage notifications on the go with GitHub Mobile for iOS https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675 or Android https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub .
There is no button on pcb. I can make photos tommorow, mb you can tell what can i do
@chrismclellen
So this is inesun model INS-HD54F-5.0MP+POE
@[Osirismix]
Hi
Are you using PUTTY on the UART interface or via network and IP address?
You can access the entire system (firmware dump) with the UART
We see the 4 pins on the PCB
If you can connect to it and use putty via the COM port, simply locate the flash chipset and make a shunt on pins 5 and 6 just after boot
you will have access to the UBoot prompt and from there you can extract the firmware, decompile it and extract the root hash
You can even remove the root password and reset the firmware.
Afterwards, you will be able to access as you want with putty via the network
@Arnaud30
hi. First time hear about UART thing. Now i will know =D
i connect by ip address. thx for info. now i will searth someone who can help
It's actually quite simple, I advise you to try it.
You just need a module like this
https://aliexpress.com/item/1005001545513477.html
Otherwise, try to obtain the firmware binary, we can modify it to skip the password
@Arnaud30 so i orderd this device, it will be around 10 of june :D
How to obtain firmware binary?
Alright.
In the meantime, you need to identify the flash memory circuit.
I think the component is on the other side of the pcb
Take it apart and post a photo
Install 3 wires on the UART port of your card (I put a male connector on the PCB, to be able to connect more easily when I need it.)
If you're not used to tinkering like this, you'll see, it's easy, exciting and it will take you to another level ;-)
@Arnaud30 hey. Found the way to reset the password by IPWizardIII. So i figure it out and the camera goes to it's owner =D But i'm realy curious about tinkering and everything else so i think i'll do it with another camera, cause i have several of them with same defect, they just start restarting and it can go for hours? and i just want to know what's happening with them. and i hope you can help me with it. if there is some DM not to flood here we can go there thumb up
Neye3C camera: laohuqian
JVT camera: fxsdk+(camera password),fxjvt1805. Need open telnet port first(open telnet port firmware)
hankvision(blue GUI PTZ camera): HI2105CHIP
Xiongmai device:
root xmhdipc
root klv123
root xc3511
root 123456
root jvbzd
root hi3518
topsee(u-boot password): hdipc%No
RT-IPC: cat1029
I've got a Tuya TCP Smart cam here for which i would like to have the password:
shadow says:
root:$1$dVhFuDGx$YrOKRgTcjTCqEK75.z277/:15874:0:99999:7:::
It shows "Lobster" and
Linux version 3.10.27 (canjian@ubuntu) (gcc version 4.8.5 20150209 (prerelease) (Realtek RSDK-4.8.5p1 Build 2521) ) #1 PREEMPT Fri Dec 7 15:51:19 CST 2018
somebody knows ?user:$1$ri3K4P4s$ne/es0YuNHyn0rti8KJ2a.:19404:0:99999:7:::
user:user123456
Hi. Need help with smart cam:
root:$1$1m7mklzD$Hu1Z3GPZPUhpuiOBql3v7/:0:0:root:/:/bin/sh
How are you recovering u-boot passwords? I have the ROM dump but don't know what to look for. I assume it's a hash stored somewhere?
@RenaKunisaki, it depends on the u-boot. older uboot can have in plain text as it is just a sequence of keys. newer one will have it hashed and scattered. Often times, you can skip the password altogether shorting pins on the flash chip during boot.
Here is a video series showing what to do to get the hash out - but it didn't help me further than what you can read above.
https://www.youtube.com/watch?v=LgurdIN1KW0
Editing the inittab file worked, but then i still haven't figured out what to do to get rid of the cloud..
It's as if i've got the hood of my car open but have no clue what all the stuff in there is..
What camera is that? What SoC? We develop thingino - an open firmware for Ingenic cameras.
The one i have:
DRAM:Board: IPCAM RTS3903 CPU: 500M :rx5281 prid=0xdc02 64 MiB @ 1066 MHz
SF: Detected GD25Q128C with page size 256 Bytes, erase size 64 KiB, total 16 MiB
@Dobie007 I think we are hijacking the comments here. Come to our server, we'll talk about the camera there. https://discord.com/invite/snQwdVhh
Hi !
password for chinese cam
root:$1$2ZmxCqpN$I5CzAUtuJId8WDgkxcC2g/:0:0::/root:/bin/sh