Search results

  1. R

    [MCR] Hikvision packer/unpacker for 5.3.x and newer firmware

    (i assume the recent CVE vulnerability will not work on it ) What's the chipset on that camera? i notice it uses uImage . It may let you get root by using a similar method used on the G0 cams.
  2. R

    Camera DS-2CD2346G2-I makes reboot many times per day

    Check the rj45 cable. I have hikvision cams that reboot due to faulty rj45 run. Switch to a known working cable.
  3. R

    Inadvertantly flashed Chinese DS-2CD6424FWD-20 (R6)

    Not really done much with the R series
  4. R

    Inadvertantly flashed Chinese DS-2CD6424FWD-20 (R6)

    DS-2CD6xxx系列升级包.zip contains a g3 and g5 firmware ..And is the cam not a 2019 cam ?
  5. R

    Inadvertantly flashed Chinese DS-2CD6424FWD-20 (R6)

    There are many methods to get a Chinese cam to run as a European/english cam. You would need full shell access or way to repack firmware or hardware flash. Just get any version of Chinese firmware working on the cam. Then take it from there. Don't get too hung up on the version...
  6. R

    Unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware (CVE-2021-36260)

    G3 family busybox Fully loaded https://ipcamtalk.com/threads/exploring-the-hik-g3-family-and-maybe-gain-shell.54648/#post-533655
  7. R

    Exploring the Hik G3 Family and maybe gain shell!

    G3 Busybox fully loaded
  8. R

    Unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware (CVE-2021-36260)

    install fully loaded busybox. or cat > /etc/passwd (add a script to make permanent if its for root)
  9. R

    Unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware (CVE-2021-36260)

    i Pm'd regarding having 2 admins. Also there are security issues in the web gui. You can get it to alter the ipc_db in ways that it should not allow. (i only stressed tested it to see if it would allow root access.) Certain functions and restriction regarding users can be overridden from the...
  10. R

    ds-2cd2047g1 and a Normal looking junction box

    the gland unscrews, you can buy blanker plugs.
  11. R

    [MCR] Hikvision packer/unpacker for 5.3.x and newer firmware

    also has files referencing hisilicon hi3518e chipset. R2 is supported in leechers / other unpacker , but it does not unpack this digicap.dav. The keys/encryption is different.
  12. R

    [MCR] Hikvision packer/unpacker for 5.3.x and newer firmware

    i binwalked it cause i have no style lol Have you reversed it yet too see if you can snag the keys? lol
  13. R

    [MCR] Hikvision packer/unpacker for 5.3.x and newer firmware

    keys are normally in davinci for decryption. You davinci in the .bin looks like a standard elf file (some davinci's are called davinci_bak) Yours is a straight elf file by the looks of it. Usually the keys are in there for decrypting the digicap.dav i ran a quick hex edit on the the davinci...
  14. R

    [MCR] Hikvision packer/unpacker for 5.3.x and newer firmware

    Platform id is 136 unsupported Were did you get the .bin file from ? Have you got root on the cam? if you have root/access to davinci/deamon_fsp then you can pull the keys from it.(there is a davinci in that bin file you posted)
  15. R

    [MCR] Hikvision packer/unpacker for 5.3.x and newer firmware

    That file does not look like ait has a hikvision header....
  16. R

    [MCR] Hikvision packer/unpacker for 5.3.x and newer firmware

    Teaser lol - There is python script unpacker and an updated C source code unpacker (not by leecher) out there. Most cams can now be unpacked. G5 and some E/H series cams cannot yet be unpacked.(no keys)
  17. R

    Hikvision G1 5.5+ firmware Exploring the Cam & attempting unlock

    You can dump it on the cam if you do not have sdcard, but you will need to clear space.
  18. R

    Hikvision G1 5.5+ firmware Exploring the Cam & attempting unlock

    just use a script to copy it across or install from the sd card. think there is an old montecrypto repacked digicap.dav in the forum.
  19. R

    Unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware (CVE-2021-36260)

    There are many ways. you could edit the user file, you can actually have multiple admins in the user file.(there is a database containing web gui users/admin info)
  20. R

    Unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware (CVE-2021-36260)

    Has anyone got the keys or root shell on the E ,H or G5 series cams. Please DM me.
  21. R

    Unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware (CVE-2021-36260)

    Your "P" user is deleted on my cam after a system reboot so does not really matter about having multiple entries in the password file. The cam also seems to handle the duplicate entries ok.
  22. R

    Unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware (CVE-2021-36260)

    Unsure , kept asking me for a password. bypassed the already pawned check.
  23. R

    Unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware (CVE-2021-36260)

    The python script does not let me logon to shell after the first attempt. Had to alter the script to get it to let me login to shell repeatedly. Not played with it much yet lol Well done @bashis
  24. R

    Hikvision G1 5.5+ firmware Exploring the Cam & attempting unlock

    NO author does not want it shared
  25. R

    Exploring the Hik G3 Family and maybe gain shell!

    Shell access can be had and and decryption keys can be accessed . None of the info will be released -
  26. R

    Exploring the Hik G3 Family and maybe gain shell!

    Test cam DS-2CD2346G2-ISU/SL latest firmware u-boot log i have not tried setenv variables "go." works
  27. R

    R7 firmware unpacker/repacker

    You do not need any packer to change the firmware , you only need shell / root on the cam.
Top