alastairstevenson
Staff member
I'm sorry, but I don't have a decryption key for that model of configuration file.would you please tell me the Hikbackup user password for attach file?
What device is it taken from?
I'm sorry, but I don't have a decryption key for that model of configuration file.would you please tell me the Hikbackup user password for attach file?
I have looked at the output file from SADP with several editors, Hex editor, Geany and the like, and searched them for the passwords you gave me, to no avail. I have a friend that was able to determine that the password files stored in VMS are stored at the exact same location in memory, every time and so therefore he could go to that location and look at the data, in HEX, and retrieve any password change. Any chance you'd share what you are doing? Even a clue.What version of firmware does SADP show for the camera?
If it's 5.4.4. or earlier, use this URL to extract the configuration file :
http://<camera_IP_address>/System/configurationFile?auth=YWRtaW46MTEK
Then zip it up and attach here, and I'll decrypt and decode it and extract the password for you.
That XML file from SADP is a password reset request file and does not hold any passwords, just a signed request code.I have looked at the output file from SADP with several editors, Hex editor, Geany and the like, and searched them for the passwords you gave me, to no avail.
The configuration files that are exported by the older firmware are reversibly encrypted using a key which can be determined by reverse engineering the firmware, and also subject to a very obvious XOR encode, allowing the password which is stored in plaintext to be exposed.Any chance you'd share what you are doing?