You need to update the post title. Don't just stay away from this camera. Stay away from this manufacturer/vendor entirely.
Yup. It's one thing to have a faulty model or models.. Another thing entirely not to properly support them.
You need to update the post title. Don't just stay away from this camera. Stay away from this manufacturer/vendor entirely.
You're just more wise in the ways of assery, I'd guess.But I'm an ass and I haven't been banned.
If you know the firmware version I could quite likely supply you the telnet root password which would allow you to see the web GUI password in plain text in one of the configuration files.i cant find the password now... nor any instructions on how to reset the firmware settings and restore to default.
Cheers, I had a good look around but did not see any :/ I took apart the whole camera to bits its assembled again now but its easy to tear apart.Usually a small micro switch on the motherboard. HOLD down while powering on for 30 seconds.
I have found 3516A_IMX178_W_6.1.25.3.zip in my download folder from 12/08/2016... so its been a while since I played with it.If you know the firmware version I could quite likely supply you the telnet root password which would allow you to see the web GUI password in plain text in one of the configuration files.
alastair@PC-I5 ~ $ telnet 192.168.254.16
Trying 192.168.254.16...
Connected to 192.168.254.16.
Escape character is '^]'.
(none) login: root
Password:
Welcome to HiLinux.
None of nfsroot found in cmdline.
~ # cat /param/sysenv.cfg | hd | more
00000000 0d 00 9b 9a 00 2c 00 00 61 64 6d 69 6e 00 00 00 |.....,..admin...|
00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000020 00 00 00 00 00 00 00 00 61 64 6d 69 6e 00 00 00 |........admin...|
00000030 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
hehe, tho I am no *NIX expert I can work my way around so that helps, the command tho... very handyWell done!
That was quick.
Just a closing comment - if ever you do update the camera firmware to the 7.x version from Herospeed, they have secured the telnet access in a fairly novel way, so the simple root hash crack, though still necessary, is no longer sufficient.
However - where there is a will, there is a way, and due to a bit of a flaw in how they have implemented the logic, it's pretty easy to bypass the new security completely.
Without even opening the case to sneak a look at the serial console.
So no need to have a copy of their app which works out the individual enable password from certain camera attributes and XORs with an odd string "KCUF".
This applies to the 7.x firmware for others in the large range of cameras from longse / cantonk / besafe etc. that use Herospeed firmware.
So if you do update the firmware - best make a note of the password in use - or come visiting ipcamtalk.com !