Hi all,
<Long Post>
I have read a number of threads and wow they useful. This is all relating to disassembling the firmware and recompiling it to upload to the camera.
What I am trying to achieve is to get SSH onto my cameras. I have read all the SSH posts and it seems like in the new firmware of the cameras they either removed or disabled in such a way that you cannot enable it with the methods we know and that have been documented here and on other CAM forums.
What camera and firmware and I talking about:
I have also tried the "ClientTool" that you can get to view the settings on the camera. A lot of the settings don't work and I suspect this is due to the newer firmware. The password reset mechanism / backdoor doesn't work either, neither does the py script of the original founder of the backdoor that logged the CVE for it, apparently it was patched 5.5.x upwards.
I disassembled the .dav file to look at what is in that file, I don't see any mention on the simple disassembled file and maybe I haven't looked deep enough into the other files?
The question
Has anyone successfully disassembled the firmware and added a SSH daemon on the cameras then reassembled it and flashed the camera?
Reason I am asking is that this is the only way I can see enabling SSH on these newer cameras with the newer firmware.
I don't see unless all the posts I read were the wrong ones a way to do this so I thought let me ask the forum which are much smarted than me.
<Long Post>
I have read a number of threads and wow they useful. This is all relating to disassembling the firmware and recompiling it to upload to the camera.
What I am trying to achieve is to get SSH onto my cameras. I have read all the SSH posts and it seems like in the new firmware of the cameras they either removed or disabled in such a way that you cannot enable it with the methods we know and that have been documented here and on other CAM forums.
What camera and firmware and I talking about:
- Camera: DS-2CD2T45FWD
- Firmware: V5.5.80 build 180911
I have also tried the "ClientTool" that you can get to view the settings on the camera. A lot of the settings don't work and I suspect this is due to the newer firmware. The password reset mechanism / backdoor doesn't work either, neither does the py script of the original founder of the backdoor that logged the CVE for it, apparently it was patched 5.5.x upwards.
I disassembled the .dav file to look at what is in that file, I don't see any mention on the simple disassembled file and maybe I haven't looked deep enough into the other files?
The question
Has anyone successfully disassembled the firmware and added a SSH daemon on the cameras then reassembled it and flashed the camera?
Reason I am asking is that this is the only way I can see enabling SSH on these newer cameras with the newer firmware.
I don't see unless all the posts I read were the wrong ones a way to do this so I thought let me ask the forum which are much smarted than me.