From what device this file?I can't do it with this file, please help, nvr
C:\Tools>python3 ./DahuaConfigBackupDecEnc.py --infile configFileExport.backup --key nvr
[*] Dahua Config Backup Decrypt/Encrypt by bashis <mcw noemail eu> (2021) [*]
Decrypt "configFileExport.backup", key: nvr
[!] MD5 mismatch, decryption failed (correct key?)
can you help me to mod this exported configuration to add easy4ip feature in my IPC-HDBW4631R-S ?From what device this file?
Model, firmware version? (Screenshot, photo)
It's possible that it's possible for your pure chinese ipc, but need time & ...can you help me to mod this exported configuration to add easy4ip feature in my IPC-HDBW4631R-S ?
send me privateIt's possible that it's possible for your pure chinese ipc, but need time & ...
4H00D5DPAAEBC80
@Speed666 From you knowledge, do you think there is a chance to crack dahua's firmware signing mechanism?
All VDP user would love to modify prompts in actual firmwares like we did with the good old Dahua-Firmware-Mod-Kit
If you have real access to SmartPSS so you need export device to xmlwe have a model: DHI-NVR5216-4KS2 , but admin password forgotten.
I now know the configFileExport.backup should be export from the NVR web interface.
but I don't know that before, I only export the config from SmartPSS ,
and then I clear all camera and re-add using a backup password, but I still lost the main admin password, please help.
attached file 20240220_bak.pssdata it is a 7zip file, it was export from SmartPSS v2.003 , but there is a password to this 7z, I try the model number, and SN, all fail.
please change the attached file extension from zip to 7z
please help recover the SmartPSS login password, and the camera admin password.
thank you.
Open this file. Inside setting & hash
View attachment 187148
If you have real access to SmartPSS you don't need this 7zip file. All data AS IS inside the files at data catalog.I can't open this zip file, is it possible share the 7zip password? thank you,
PossibleI also able login the camera console using python, and able to get the admin password hash by command "user -u", do you know a method to crack this hash?
No problem with scriptI tried the Python script however I keep having an issue with the MD5 mismatch.
No problem with script
5H08C24PAZD9866