It all depends on which series of camera.Did any one knows how can I change the model number of hikvision camera?
On the regular Hikvision R0 series, the telnet/SSH shell password for root is the web GUI admin password, except for firmware 5.4.5 where the root password is hard-coded to hiklinux for some odd reason.Tried root/regular admin password, root/12345.
HiIt all depends on which series of camera.
On some, that data is held in the flash memory, on others that data is held in a security chip, but in all cases there is tamper protection.
What do you aim to do?
you mean i can change it with telnet?On the regular Hikvision R0 series, the telnet/SSH shell password for root is the web GUI admin password, except for firmware 5.4.5 where the root password is hard-coded to hiklinux for some odd reason.
It's complicated.but in all cases there is tamper protection.
This is an R0 series camera - DOWNLOAD PORTALDS-2CD2332-I - V5.3.0 build 150513
The DS-2CD2342WD-I is an R6 series camera. I'm not 100% sure if your slightly different model number is in that series - if it is - DOWNLOAD PORTALXC-2342WDI - V5.3.3 build 150630
A good clue used to be the serial number - but I don't think it's as clear now.Is there anyway to determine, for sure, that the camera is truly an English camera?
If this is definitely a CN camera, the EN firmware will not run on it, and will be rejected.Is it possible to get newer english fw version 5.4+ for it?
Thanks alastairstevenson!If this is definitely a CN camera, the EN firmware will not run on it, and will be rejected.
This series of camera has extra protection for the 'hardware info' and does not have the easy ability to change it that exists in the R0 series of cameras.
If you're comfortable with Chinese menus, and the CN language isn't going to alienate any NVR the camera is connected to, you can administer in English all the detailed configuration with the Batch Configuration Tool : Hangzhou Hikvision Digital Technology Co. Ltd.I would be able to use it with google translate?
That's a pretty good clue that it's been messed with by an external entity.( wierd that it also shows iVMS kamera name as HACKED)
No, the Hikvision backdoor does not require knowledge of any passwords, it's a really open backdoor.change of admin pass not helps with resets.
If you're comfortable with Chinese menus, and the CN language isn't going to alienate any NVR the camera is connected to, you can administer in English all the detailed configuration with the Batch Configuration Tool : Hangzhou Hikvision Digital Technology Co. Ltd.
It works pretty well, and avoids the need for Google translate.
That's a pretty good clue that it's been messed with by an external entity.
No, the Hikvision backdoor does not require knowledge of any passwords, it's a really open backdoor.
I would guess that firmware will work - but you will need to be sure you are not going to get any 'language mismatch' errors with whatever you connect it to.Do you think applying IPC_G0_CN_STD_5.4.41_170710 firmware should work (on CN website that fw was listed for 2335 camera) and i can manage it after via Batch Configuration Tool?
I would guess that firmware will work - but you will need to be sure you are not going to get any 'language mismatch' errors with whatever you connect it to.
I have never used iVMS so I don't know if it will work like an NVR and object to the new language.
It sounds like there is a need for a G0/G1 equivalent of the R0 'enhanced mtd hack' that will allow these series of cameras to be fully updated without a brick-risk to protect against security threats.
Yes, having that mtd hack would be nice. This series looks like kind of popular, but now I regret with not getting just normal R0.
If i was able to test that "language mismatch" issue, but if there is no other option apart from loading that "CN FW", i might risk it to try.