When it boots, I'm getting all the log data coming through the PuTTY Terminal.
That's good, you've got it hooked up correctly.
Now for the fun part.
And here's hoping that your 'Kepler' NVR will respond in the same way as I've seen on others.
The process does depend on the specific bootloader commands still being available on your NVR - Hikvision do have a habit of stripping out the more 'useful' commands as they update the firmware.
First you will need to create a normal
tftp server on your PC.
This one should work OK - create a folder for it and install :
A free tftp and dhcp server for windows, freeware tftp server
tftpd32.jounin.net
You will need to know the IP address of your PC, this will become the IP address of the tftp server that the NVR will connect to.
In the example I'll show below, I'm using 192.168.1.99 as the PC IP address. Replace this with your own.
You will also need to pick a temporary IP address for the NVR to use, one that isn't in use already.
In the example I'll show below, I'm using 192.168.1.214 as the temporary NVR IP address. Replace with your own choice.
Here are the steps that I hope will work to extract the flash partition segment that holds the NVR cameras configuration, the passwords for which are very likely to be the NVR password also.
Start PuTTY.
Keep Control-U pressed until it auto-repeats and power on the NVR.
You should get a screen like this :
Code:
This program will upgrade software.
*******************************************************
* ATTENTION!! PLEASE READ THIS NOTICE CAREFULLY! *
* Don't reset machine,or anything that interrupt it. *
* The upgrade process must finish in 10 minutes! *
* If this program fails,machine might be unusable, *
* and you will need to reflash again. *
* If you find this too risky,power off machine now. *
*******************************************************
Now press [u/U] key to upgrade software:
Type the letter b and press return.
You should get to a prompt like this :
HKVS #
To list the environment variables, for future reference use the printenv command like so :
Code:
HKVS # printenv
bootcmd=tftp 0x80400000 $(bootfile);bootm 0x80400000;
default=cramfsload 0x80400000 uImage;
sec=tftp 0x80400000 uImage_sec;bootm 0x80400000;
verify=n
bootdelay=1
baudrate=115200
mdio_intf=rgmii
ipaddr=192.0.0.64
serverip=192.0.0.128
gatewayip=192.0.0.1
netmask=255.255.255.0
bootfile=uImage
device_type=DS-7604NI-E1/4P/A
identification=0000000100000001000002000000002a00000001000000020005
update_ip=192.0.0.64
phyaddr1=7
bootargs=mem=177M console=ttyS0,115200n8
ethaddr=bc:ad:28:87:7e:c4
stdin=serial
stdout=serial
stderr=serial
ver=U-Boot 2010.06-svn (Aug 15 2015 - 15:18:43)
Environment size: 577/4092 bytes
HKVS #
Start the tftp server.
The commands below will read the flash memory, and transfer the data to the tftp server on the PC.
You can copy / paste each command line in turn to the PuTTY screen.
Just do one at a time.
Code:
setenv ipaddr 192.168.1.214
setenv serverip 192.168.1.99
sf probe 0
sf read 0x80400000 0x00000 0x10000
tftp 0x80400000 mtdblock0 0x10000
sf read 0x80400000 0x10000 0x20000
tftp 0x80400000 mtdblock1_part1 0x20000
sf read 0x80400000 0x30000 0x20000
tftp 0x80400000 mtdblock1_part2 0x20000
sf read 0x80400000 0x50000 0xFB0000
tftp 0x80400000 mtdblock2 0xFB0000
Here is a transcript of what you'd expect to see :
Code:
HKVS # setenv ipaddr 192.168.1.214
HKVS # setenv serverip 192.168.1.99
HKVS #
HKVS # sf probe 0
16384 KiB hi_sfc at 0:0 is now current device[4K erase supported]
HKVS #
HKVS # sf read 0x80400000 0x00000 0x10000
HKVS # tftp 0x80400000 mtdblock0 0x10000
timeout for link [4999]!
MAC: BC-AD-28-87-7E-C4
TFTP to server 192.168.1.99; our IP address is 192.168.1.214
Upload Filename 'mtdblock0'.
Upload from address: 0x80400000, 0.064 MB to be send ...
Uploading: # [ Connected ]
0.064 MB upload ok.
HKVS # sf read 0x80400000 0x10000 0x20000
HKVS # tftp 0x80400000 mtdblock1_part1 0x20000
timeout for link [5000]!
MAC: BC-AD-28-87-7E-C4
TFTP to server 192.168.1.99; our IP address is 192.168.1.214
Upload Filename 'mtdblock1_part1'.
Upload from address: 0x80400000, 0.128 MB to be send ...
Uploading: # [ Connected ]
#
0.128 MB upload ok.
HKVS # sf read 0x80400000 0x30000 0x20000
HKVS # tftp 0x80400000 mtdblock1_part2 0x20000
timeout for link [5000]!
MAC: BC-AD-28-87-7E-C4
TFTP to server 192.168.1.99; our IP address is 192.168.1.214
Upload Filename 'mtdblock1_part2'.
Upload from address: 0x80400000, 0.128 MB to be send ...
Uploading: # [ Connected ]
#
0.128 MB upload ok.
HKVS #
HKVS # sf read 0x80400000 0x50000 0xFB0000
HKVS # tftp 0x80400000 mtdblock2 0xFB0000
timeout for link [5000]!
MAC: BC-AD-28-87-7E-C4
TFTP to server 192.168.1.99; our IP address is 192.168.1.214
Upload Filename 'mtdblock2'.
Upload from address: 0x80400000, 15.704 MB to be send ...
Uploading: # [ Connected ]
################################ [ 2.888 MB]
################################ [ 5.752 MB]
################################ [ 8.616 MB]
################################ [11.480 MB]
################################ [14.344 MB]
###############
15.704 MB upload ok.
HKVS #
Assuming that all works OK, zip up the mtdblock1_part1 and mtdblock1_part2 files and attach here.
I should be able to extract the camera passwords, which hopefully will match the NVR password.
Good luck!