Agreed, one of the old 'default passwords'.admin 123456789abc
Quite likely - that firmware will probably have the 'Hikvision backdoor' vulnerability, depending on the specific model.
Are they still connected to NVR PoE ports?
Assuming they are -
Install SADP so that you can inventory the cameras and see some of their detail.
SADP Tool - Updates
ipcamtalk.com
Connect the PC to an unused NVR PoE port, and note down from SADP the cameras IP addresses and the associated firmware versions.
The addresses are likely to be in the range 192.168.254.x
Change the PC IP address to be in the same range, for example 192.168.254.100
In the browser, use this URL to hopefully extract a configuration file :
http://<camera_IP_address>/System/configurationFile?auth=YWRtaW46MTEK
replacing the IP address with a selected one from your list.
Maybe do this for each of the firmware versions.
Zip up any extracted configuration files and attach here, I should be able to decrypt and decode them to extract the camera password.
I remind you, everyone can use the password search form from the configuration file received when using the http request: / <Camera IP address> / System / configurationFile? auth = YWRtaW46MTEKThanks! Works great =)
HELLO ALLHave come across a DS-7216HGHI-SH at a client's site, happily recording away, yet no-one knows the password :sigh:
Software version is V3.3.2build 151123 according to iVMS4200
The serial is DS-7216HGHI-SH162015xxxxxxxxxxxxxxxxxWCVU but I'm not clear which bit I remove before pasting the rest into the reset password code generator page. Just take off the initial DS-7216HGHI-SH or is there more to it than that? I tried a power-cycle, checked the start date & time was today according to SADP, but the code generated just gave me a "device rejected" error when I try to sign in at SADP
Thanks for any tips!
Only Hikvision support persons can create the response to those XML password reset request files.can someome assist in reseting some hikvision camera password..
What firmware version is on the camera?i tried your tool but it did not work. and then i tried to export the xml files which i sended to hikvision support. But the codes which they sent to meback did not work too.
what is the firmware version, check with the sudo utilityhello community,
i´m from germany bavaria. Nice to get into this forum.
I have problems with this camera model DS-2CD2332-I
i tried your tool but it did not work. and then i tried to export the xml files which i sended to hikvision support. But the codes which they sent to meback did not work too.
Did someone have the same problems? i think it is the earlier model which has no reset button.
hi thanx for your response. yes i had turned on all cams. but it did not work.Hi there
After you extract the xml file, you need to keep the system on until you receive the response from Hikvision as the new xml file will be time based linked to your original file.
If you turn off the system before you receive the new file, it won't work.
What firmware version are you using?
What firmware version is on the camera?
If it's 5.4.0 or earlier, you will be able to extract the configuration file using the 'Hikvision backdoor vulnerability' which can then be decrytpted and the password extracted.
it is 5.3.0 where can i find "Hikvision backdoor vulnerability"
yes i used it, but what i told before it does not work with this cams. o do i use wrong date oder serial number?Hikvision Password Reset Tool
Generate a reset code to change the pw of any Hikvision device w/ the serial number and date.ipcamtalk.com
With a PC on the same IP address range as the camera, put this URL into the browser, replacing the camera actual IP address as needed.it is 5.3.0 where can i find "Hikvision backdoor vulnerability"
Hey thanx.With a PC on the same IP address range as the camera, put this URL into the browser, replacing the camera actual IP address as needed.
Zip up the resultant exported configuration file, and attach here so it can be decrypted and decoded to extract the admin password.
http://<camera_IP_address>/System/configurationFile?auth=YWRtaW46MTEK