-
-
Save gabonator/74cdd6ab4f733ff047356198c781f27d to your computer and use it in GitHub Desktop.
Summary of passwords by sperglord8008s, updated November 1. 2020. For login try "root", "default", "defaul" or "root" | |
00000000 | |
059AnkJ | |
4uvdzKqBkj.jg | |
7ujMko0admin | |
7ujMko0vizxv | |
123 | |
1111 | |
1234 | |
1234qwer | |
2601hx | |
12345 | |
54321 | |
123456 | |
666666 | |
888888 | |
1111111 | |
/*6.=_ja | |
anko | |
anni2013 | |
annie2012 | |
avtech97 | |
cat1029 | |
ccadmin | |
cxlinux | |
default | |
dreambox | |
fxjvt1805 | |
hdipc%No | |
hi3518 | |
hichiphx | |
hipc3518 | |
hkipc2016 | |
hslwificam | |
ikwb | |
ipc71a | |
IPCam@sw | |
ivdev | |
juantech | |
jvbzd | |
jvtsmart123 | |
klv123 | |
klv1234 | |
meinsm | |
OxhlwSG8 | |
pass | |
password | |
realtek | |
root | |
hi3518 | |
S2fGqNFs | |
service | |
smcadmin | |
supervisor | |
support | |
system | |
tech | |
tlJwpbo6 | |
ubnt | |
user | |
vhd1206 | |
vizxv | |
xc3511 | |
xmhdipc | |
zlxx. | |
Zte521 |
@Dobie007 I think we are hijacking the comments here. Come to our server, we'll talk about the camera there. https://discord.com/invite/snQwdVhh
can somebody help me with this password retrieved from camera : root:XT5eZpUYaEB4c:0:0::/root:/bin/sh
I have this user but I don't know the password. Could you help me?
root:8dxMkZjXi01sk:0:0::/root:/bin/sh
ipc@hs66
A guy cracked it yesterday in 16 minutes using hashcat on 14 x RTX 4090 ( Yes, you read it right ).
I'm trying to repurpose a PNI camera that seems to be using the Hope chips. I have dumped the eeprom and found references to hi3518 drivers and the following user hash
root:$1$b/rCFZCG$fSXVN88aYy/g3LUhsGNU01
I've also found a _passwd file that had root:ab8nBoH3mb8.g, for which the password was already posted here helpme
(I suppose it's for uboot?)
Can someone help me with the hash above?
I have other routes to try yet, after I put the eeprom back on the board I want to check also the serial console, my aim is to redirect/start a rtsp stream to use the camera with frigate.
Hi, can someone help on this one from an image of a SOOCOO S300 Action cam that is not supported anymore:
root:$1$$qRPK7m23GJusamGpoGLby/:0:0::/root:/bin/sh
il s'agit de la chaîne MD5crypt pour un mot de passe vide avec un sel vide :
crypt.crypt('', '$1$$')
'$1$$qRPK7m23GJusamGpoGLby/'
Thanks! - I didn't realize!
Hi all, please help me to decrypt the password of telnet bvt user
bvt:$1$6LM5P7B4$z6ZaflT5B2h6spyn02CZw0:0:0:bvt:/home:/bin/sh
Tuya/Aldi cam, would like to have the password.
AK3918EN080 V300S (Anyka).
cat shadow:
root:$1$1m7mklzD$Hu1Z3GPZPUhpuiOBql3v7/:0:0:root:/:/bin/sh
Thanks in advance.
Hi all. Can you help me to determine what type of crypto algorithm give hash like this: oEP0ZGfC
and this:
root:8/3DL08/eA4ic:0:0:root:/:/bin/sh
Thank you.
The one i have:
DRAM:Board: IPCAM RTS3903 CPU: 500M :rx5281 prid=0xdc02 64 MiB @ 1066 MHz
SF: Detected GD25Q128C with page size 256 Bytes, erase size 64 KiB, total 16 MiB