1 (edytowany przez solargrim 2017-10-27 16:49:26)

Temat: Hakowanie mojej chinskiej kamery

Chce dostac sie do 'srodka' mojej kamerki z banggood. Generalnie zastanawia mnie bardzo ilosc otwartch portow tym bardziej ze korzystam tylko z 8899 (onvif lite) reszta raczej odrzuca polaczenia ew czeka na polecenie i rozlacza.
Telnet zwraca v380 login - niestety hasla nie znam.

Ale zeby to zrobic i dostac sie do uboota musze znalezc tutaj rx, tx i zasilanie. Ktos moze ma sprawne oko i pomoze?

http://eterror.pl/public/img/v380/IMAG0728.jpg

http://eterror.pl/public/img/v380/IMAG0729.jpg

Zdjecia w duzej rozdzielczosci sa dostepne tutaj: http://eterror.pl/public/img/v380/hires/

2

Odp: Hakowanie mojej chinskiej kamery

Na ostatnim zdjęciu masz dużo punktów kontrolnych i na samej krawędzi też są. Sprawdź, może to któreś z nich. Ew bezpośrednio pod soc się podepnij.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

3 (edytowany przez solargrim 2017-10-27 21:52:42)

Odp: Hakowanie mojej chinskiej kamery

SPodaje dane ze scalakow:
Model kamery prawdopodobnie Dagro X833 v1.2

Scalak: chmc S7201 / uln2803f
cpu: ANYKA Ak3918* / s1a03f17
siecowka: realtek 8188

ale nie moge nigdzie znalezc rozkadu pinow, co datasheet to pusto na ten temat http://www.ti.com/lit/ds/symlink/uln2803a.pdf
tutaj jest do 'a' a ja potrzebuje do 'f' ale nie widze tam zadnego oznaczenia pinow

4

Odp: Hakowanie mojej chinskiej kamery

Pomierz napięcia na widocznych pinach (powinno być 3,3 v) i może uda Ci się znaleźć. podłącz się gdzieś gdzie masz masę i szukaj na razie TX'a, konsola prawdopodobnie powinna być ustawiona standardowo 115200. Przynajmniej ja tak szukałem. Oczywiście z każdym punktem musisz wyłączyć i włączyć kamerę. No ale to to pewnie wiesz wink. Życzę sukcesu.


Pozdrawiam

5

Odp: Hakowanie mojej chinskiej kamery

Podepnę się ponieważ też walczę z chińczykiem, chcę wydobyć hasło root'a na telnet, do konsoli się dostałem i do roota poprzez zmianę env init=/bin/sh, teoretycznie i praktycznie zmieniłem hasło lecz po restarcie kamery hasło wraca. Wygląda jakby chpasswd w locie zmieniał hasło na standardowe. Czy macie na to jakieś rozwiązanie. Próbowałem przez init.d dopisać skrypt zmiany hasła skrypt wykonuje się za wcześnie i nic z tego.

Kamera jest na Hi3516c IMX122 128MB/16MB, po prostu dobija mnie to, że kamera łączy się do jakiś serwerów w Chinach i jeszcze nie wiadomo gdzie.

Może macie na to jakiś patent.
Dzięki

6

Odp: Hakowanie mojej chinskiej kamery

mexpert napisał/a:

Podepnę się ponieważ też walczę z chińczykiem, chcę wydobyć hasło root'a na telnet, do konsoli się dostałem i do roota poprzez zmianę env init=/bin/sh, teoretycznie i praktycznie zmieniłem hasło lecz po restarcie kamery hasło wraca. Wygląda jakby chpasswd w locie zmieniał hasło na standardowe. Czy macie na to jakieś rozwiązanie. Próbowałem przez init.d dopisać skrypt zmiany hasła skrypt wykonuje się za wcześnie i nic z tego.

Kamera jest na Hi3516c IMX122 128MB/16MB, po prostu dobija mnie to, że kamera łączy się do jakiś serwerów w Chinach i jeszcze nie wiadomo gdzie.

Może macie na to jakiś patent.
Dzięki

Zrzuć zawartość wszystkich partycji mtd, przerzuć na komputer, rozpakuj i szukaj... lub bezpośrednio na urządzeniu.
Sprawdź też czy masz tam w ogóle zapisywalny system plików, może tylko ram dysk, a ustawienia siedzą gdzieś w osobnej partycji?

7 (edytowany przez mexpert 2017-11-07 17:22:10)

Odp: Hakowanie mojej chinskiej kamery

Utworzyłem folder w /etc i po restarcie jest, tak więc na mtdblock1 mogę zapisywać, mimo to passwd jest nadpisywane po ponownym uruchomieniu . Nie mogę tylko podmontować mtdblock0. Poza tym partycje /dev wygląda trochę inaczej niż openwrt

Już się poprawiam, nie wklejam całego zrzutu montowania bo jest długi, tylko wydaje mi się, że mtd0 to boot loader ale nie jestem do końca pewien.

mount -t jffs2 /dev/mtdblock0 /tmp

jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x00000000: 0x0418 instead
jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x00000004: 0xf014 instead
jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x00000008: 0xf014 instead
jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x0000000c: 0xf014 instead
jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x00000010: 0xf014 instead
jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x00000014: 0xf014 instead
jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x00000018: 0xf014 instead
jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x0000001c: 0xf014 instead
jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x00000020: 0x1340 instead
jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x00000024: 0x13a0 instead
Further such events for this erase block will not be printed
.........
jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x002f0020: 0x13bd instead
jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x002f0024: 0xf6e4 instead
Further such events for this erase block will not be printed
Old JFFS2 bitmask found at 0x002f3ae0
You cannot use older JFFS2 filesystems with newer kernels
Cowardly refusing to erase blocks on filesystem with no valid JFFS2 nodes
empty_blocks 0, bad_blocks 0, c->nr_blocks 48
mount: mounting mtdblock0 on /tmp failed: Input/output error

# ls -1 /dev

1-1
alarm
console
cpu_dma_latency
full
fuse
kmsg
loop0
loop1
loop2
loop3
loop4
loop5
loop6
loop7
mem
mice
mmcblk0
mmcblk0p1
mtd0
mtd0ro
mtd1
mtd1ro
mtd2
mtd2ro
mtdblock0
mtdblock1
mtdblock2
network_latency
network_throughput
nr_blocks
null
psaux
ptmx
pts
ram0
ram1
ram10
ram11
ram12
ram13
ram14
ram15
ram2
ram3
ram4
ram5
ram6
ram7
ram8
ram9
random
tty
tty0
tty1
tty10
tty11
tty12
tty13
tty14
tty15
tty16
tty17
tty18
tty19
tty2
tty20
tty21
tty22
tty23
tty24
tty25
tty26
tty27
tty28
tty29
tty3
tty30
tty31
tty32
tty33
tty34
tty35
tty36
tty37
tty38
tty39
tty4
tty40
tty41
tty42
tty43
tty44
tty45
tty46
tty47
tty48
tty49
tty5
tty50
tty51
tty52
tty53
tty54
tty55
tty56
tty57
tty58
tty59
tty6
tty60
tty61
tty62
tty63
tty7
tty8
tty9
ttyAMA0
ttyAMA1
ttyS000
uinput
urandom
usbdev1.1
usbdev1.4
usbdev2.1
usbmon0
usbmon1
usbmon2
vcs
vcs1
vcsa
vcsa1
zero

8

Odp: Hakowanie mojej chinskiej kamery

Jak będziesz wklejać na ślepo wynik losowych poleceń, w dodatku bez korzystania ze BBCode, to ja się bawić z Tobą nie będę. Zrób to porządnie.

9

Odp: Hakowanie mojej chinskiej kamery

Już się poprawiłem wink

10

Odp: Hakowanie mojej chinskiej kamery

Próbowałem skopiować mtd2 i otrzymuję taki komunikat

dd if=/dev/mtdblock2 of=/tmp/mtdblock2.bin
dd: can't open '/dev/mtdblock2': No such device or address

11 (edytowany przez mexpert 2017-11-07 17:25:35)

Odp: Hakowanie mojej chinskiej kamery

Nie mam firmware konkretnie do tej kamery ale wynalazłem w sieci obraz który wygląda tak, romfs-x.cramfs wygląda jak mój mtd1 pobrany z kamery. A poniżej znajduje się struktura firmware.

General_HZXM_IPC_HI3516C_53H20L_V4.02.R11.20140417_ALL.bin

custom-x.cramfs
logo-x.cramfs
romfs-x.cramfs
u-boot-all.bin
user-x.cramfs
web-x.cramfs

Kamera tak jakby uruchamiała się z uImage, który zawarty jest w romfs-x.cramfs w boot. Nawet uruchomiłem ją z tego uImage ale to nic mi nie dało. Być może to właśnie uImage jest uruchamiany z innej partycji. Tftp z uboot'a właśnie oczekuje na ten obraz.

Kamera generalnie jest ciekawa, ponieważ zawiera na pokładzie piny do usb i to działąjące, obsługuje nawet kartę wifi z serii rt2570, podłączałem i działa.

Uboot

U-Boot 2010.06 (Oct 24 2013 - 15:36:07)

NAND:  Special Nand id table Version 1.35
Nand ID: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
No NAND device found!!!
0 MiB
Check spi flash controller v350... Found
Spi(cs1) ID: 0xC2 0x20 0x18 0xC2 0x20 0x18
Spi(cs1): Block:64KB Chip:16MB Name:"MX25L128XX"
In:    serial
Out:   serial
Err:   serial
Hit any key to stop autoboot:  0
hisilicon #

hisilicon # help

?       - alias for 'help'
base    - print or set address offset
bootm   - boot application image from memory
bootp   - boot image via network using BOOTP/TFTP protocol
cmp     - memory compare
cp      - memory copy
crc32   - checksum calculation
ext2load- load binary file from a Ext2 filesystem
ext2ls  - list files in a directory (default /)
fatinfo - print information about filesystem
fatload - load binary file from a dos filesystem
fatls   - list files in a directory (default /)
getinfo - print hardware information
go      - start application at address 'addr'
help    - print command description/usage
loadb   - load binary file over serial line (kermit mode)
loady   - load binary file over serial line (ymodem mode)
loop    - infinite loop on address range
md      - memory display
mii     - MII utility commands
mm      - memory modify (auto-incrementing address)
mtest   - simple RAM read/write test
mw      - memory write (fill)
nand    - NAND sub-system
nboot   - boot from NAND device
nm      - memory modify (constant address)
ping    - send ICMP ECHO_REQUEST to network host
printenv- print environment variables
rarpboot- boot image via network using RARP/TFTP protocol
reset   - Perform RESET of the CPU
saveenv - save environment variables to persistent storage
setenv  - set environment variables
sf      - SPI flash sub-system
tftp    - tftp  - download or upload image via network using TFTP protocol
usb     - USB sub-system
usbboot - boot from USB device
version - print monitor version

12 (edytowany przez mexpert 2017-11-07 17:42:04)

Odp: Hakowanie mojej chinskiej kamery

No i jeszcze log z uruchomienia co oczywiście pominąłem.

U-Boot 2010.06 (Oct 24 2013 - 15:36:07)
NAND:  Special Nand id table Version 1.35
Nand ID: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
No NAND device found!!!
0 MiB
Check spi flash controller v350... Found
Spi(cs1) ID: 0xC2 0x20 0x18 0xC2 0x20 0x18
Spi(cs1): Block:64KB Chip:16MB Name:"MX25L128XX"
In:    serial
Out:   serial
Err:   serial
Hit any key to stop autoboot:  0
16384 KiB hi_sfc at 0:0 is now current device
Booting kernel from Legacy Image at 82000000 ...
   Image Name:   Linux-3.0.8
   Image Type:   ARM Linux Kernel Image (uncompressed)
   Data Size:    2596884 Bytes = 2.5 MiB
   Load Address: 80008000
   Entry Point:  80008000
   Loading Kernel Image ... OK
OK

Starting kernel ...
Uncompressing Linux... done, booting the kernel.
Linux version 3.0.8 (root@wang) (gcc version 4.4.1 (Hisilicon_v100(gcc4.4-290+uclibc_0.9.32.1+eabi+linuxpthread)) ) #1 Thu Oct 24 11:05:48 CST 2013
CPU: ARM926EJ-S [41069265] revision 5 (ARMv5TEJ), cr=00053177
CPU: VIVT data cache, VIVT instruction cache
Machine: hi3518
Memory policy: ECC disabled, Data cache writeback
AXI bus clock 220000000.
Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 32512
Kernel command line: mem=128M console=ttyAMA0,115200 root=/dev/mtdblock1 rootfstype=jffs2 mtdparts=hi_sfc:3M(boot),13M(rootfs)
PID hash table entries: 512 (order: -1, 2048 bytes)
Dentry cache hash table entries: 16384 (order: 4, 65536 bytes)
Inode-cache hash table entries: 8192 (order: 3, 32768 bytes)
Memory: 128MB = 128MB total
Memory: 125032k/125032k available, 6040k reserved, 0K highmem
Virtual kernel memory layout:
    vector  : 0xffff0000 - 0xffff1000   (   4 kB)
    fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
    DMA     : 0xffc00000 - 0xffe00000   (   2 MB)
    vmalloc : 0xc8800000 - 0xfe000000   ( 856 MB)
    lowmem  : 0xc0000000 - 0xc8000000   ( 128 MB)
    modules : 0xbf000000 - 0xc0000000   (  16 MB)
      .init : 0xc0008000 - 0xc0025000   ( 116 kB)
      .text : 0xc0025000 - 0xc0490000   (4524 kB)
      .data : 0xc0490000 - 0xc04afce0   ( 128 kB)
       .bss : 0xc04afd04 - 0xc04c3500   (  78 kB)
SLUB: Genslabs=13, HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
NR_IRQS:32 nr_irqs:32 32
sched_clock: 32 bits at 110MHz, resolution 9ns, wraps every 39045ms
Console: colour dummy device 80x30
Calibrating delay loop... 218.72 BogoMIPS (lpj=1093632)
pid_max: default: 32768 minimum: 301
Mount-cache hash table entries: 512
CPU: Testing write buffer coherency: ok
NET: Registered protocol family 16
Serial: AMBA PL011 UART driver
uart:0: ttyAMA0 at MMIO 0x20080000 (irq = 5) is a PL011 rev2
console [ttyAMA0] enabled
uart:1: ttyAMA1 at MMIO 0x20090000 (irq = 5) is a PL011 rev2
bio: create slab <bio-0> at 0
SCSI subsystem initialized
usbcore: registered new interface driver usbfs
usbcore: registered new interface driver hub
usbcore: registered new device driver usb
cfg80211: Calling CRDA to update world regulatory domain
Switching to clocksource timer1
NET: Registered protocol family 2
IP route cache hash table entries: 1024 (order: 0, 4096 bytes)
TCP established hash table entries: 4096 (order: 3, 32768 bytes)
TCP bind hash table entries: 4096 (order: 2, 16384 bytes)
TCP: Hash tables configured (established 4096 bind 4096)
TCP reno registered
UDP hash table entries: 256 (order: 0, 4096 bytes)
UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
NET: Registered protocol family 1
RPC: Registered named UNIX socket transport module.
RPC: Registered udp transport module.
RPC: Registered tcp transport module.
RPC: Registered tcp NFSv4.1 backchannel transport module.
NetWinder Floating Point Emulator V0.97 (double precision)
VFS: Disk quotas dquot_6.5.2
Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
JFFS2 version 2.2. (NAND) © 2001-2006 Red Hat, Inc.
fuse init (API version 7.16)
msgmni has been set to 244
Block layer SCSI generic (bsg) driver version 0.4 loaded (major 253)
io scheduler noop registered
io scheduler deadline registered (default)
io scheduler cfq registered
brd: module loaded
loop: module loaded
Spi id table Version 1.22
Spi(cs1) ID: 0xC2 0x20 0x18 0xC2 0x20 0x18
SPI FLASH start_up_mode is 3 Bytes
Spi(cs1):
Block:64KB
Chip:16MB
Name:"MX25L128XX"
spi size: 0x16777216
chip num: 1
2 cmdlinepart partitions found on MTD device hi_sfc
Creating 2 MTD partitions on "hi_sfc":
0x000000000000-0x000000300000 : "boot"
0x000000300000-0x000001000000 : "rootfs"
Fixed MDIO Bus: probed
himii: probed
usbcore: registered new interface driver rt2500usb
usbcore: registered new interface driver rt73usb
ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
hiusb-ehci hiusb-ehci.0: HIUSB EHCI
hiusb-ehci hiusb-ehci.0: new USB bus registered, assigned bus number 1
hiusb-ehci hiusb-ehci.0: irq 15, io mem 0x100b0000
hiusb-ehci hiusb-ehci.0: USB 0.0 started, EHCI 1.00
hub 1-0:1.0: USB hub found
hub 1-0:1.0: 1 port detected
ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
hiusb-ohci hiusb-ohci.0: HIUSB OHCI
hiusb-ohci hiusb-ohci.0: new USB bus registered, assigned bus number 2
hiusb-ohci hiusb-ohci.0: irq 16, io mem 0x100a0000
hub 2-0:1.0: USB hub found
hub 2-0:1.0: 1 port detected
mousedev: PS/2 mouse device common for all mice
TCP cubic registered
Initializing XFRM netlink socket
NET: Registered protocol family 10
NET: Registered protocol family 17
NET: Registered protocol family 15
lib80211: common routines for IEEE802.11 drivers
Registering the dns_resolver key type
registered taskstats version 1
drivers/rtc/hctosys.c: unable to open rtc device (rtc0)
▒VFS: Mounted root (jffs2 filesystem) on device 31:1.
Freeing init memory: 116K
[RCS]: /etc/init.d/S00devs
[RCS]: /etc/init.d/S01udev
udevd (449): /proc/449/oom_adj is deprecated, please use /proc/449/oom_score_adj instead.
[RCS]: /etc/init.d/S80network
/etc/init.d/rcS: line 22: /usr/sbin/smtpclient: not found
start ------------ Ver(2013.03.16)
chmod: /usr/fx256: No such file or directory
mkdir: can't create directory '/main': File exists
fx256
rmmod: can't unload 'himci': unknown symbol in module, or unknown parameter
rmmod: can't unload 'sd_mmc_sdio': unknown symbol in module, or unknown parameter
Can't find fx256-bak.tar !
can't find /usr/fx256-upbk.tar !
/bin/sh: /usr/hhRestLog: not found

-------start  is hi3518 -------
hi3518_io driver init start
alarmOutType gpio init 0, GpioFunctionType = 0
hi3518_io driver init successful(2012.12.22)!
-------start  is hi3518 -------
count == 2(/main/fx256)
main -- start1!
mkdir: can't create directory '/fx': File exists
Read DeviceCfg  = [0x00000000]
memsize 262144 logMode 0 logPri 3 FileNum 5
umount: can't umount /syslog/: Invalid argument
software 2.0.23.13  compile time is Aug  5 2014 17:11:17
SS_FLASH_ReadDeviceCfgUboot success 1256
cputype=3516c
byCPUTYPE=3
dwDeviceType=1
bySensorType3=32
st_size=192032
sttmpelen=100816
return
sysconfiglen=192032
.inita.size Width=1920
.inita.size Height=1080
*****************copy read time
************func = SS_FLASH_ReadBakTime, pTime->hour = 17, pTime->minute = 24
/etc/passwd: Resource temporarily unavailable
an error occurred updating the password file.
An error occurred updating the password file.
HiCpuType=3
Hisilicon Media Memory Zone Manager
hi3518_base: module license 'Proprietary' taints kernel.
Disabling lock debugging due to kernel taint
Hisilicon UMAP device driver interface: v3.00
pa:88000000, va:c8b00000
load sys.ko for Hi3518...OK!
ISP Mod init!
load vpss.ko ....OK!
rmmod: can't unload 'himci': unknown symbol in module, or unknown parameter
rmmod: can't unload 'mmc_block': unknown symbol in module, or unknown parameter
rmmod: can't unload 'mmc_core': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_adec': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_aenc': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_ao': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_ai': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_sio': unknown symbol in module, or unknown parameter
rmmod: can't unload 'acodec': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hidmac': unknown symbol in module, or unknown parameter
rmmod: can't unload 'pwm': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_ive': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_vda': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_region': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_rc': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_jpege': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_h264e': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_chnl': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_group': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_venc': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hifb': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_vou': unknown symbol in module, or unknown parameter
unload vpss.ko ....OK!
ISP Mod Exit!
rmmod: can't unload 'hi3518_viu': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_dsu': unknown symbol in module, or unknown parameter
rmmod: can't unload 'hi3518_tde': unknown symbol in module, or unknown parameter
MMZ force removed: PHYS(0x88000000, 0x8EFFFFFF), GFP=0, nBYTES=114688KB,        NAME="anonymous"
mkdir: can't create directory '/dev/misc': File exists
Hisilicon Media Memory Zone Manager
Hisilicon UMAP device driver interface: v3.00
pa:88000000, va:c8c00000
load sys.ko for Hi3518...OK!
load viu.ko for Hi3518...OK!
ISP Mod init!
load vpss.ko ....OK!
load vou.ko ....OK!
load venc.ko for Hi3518...OK!
load group.ko for Hi3518...OK!
load chnl.ko for Hi3518...OK!
load h264e.ko for Hi3518...OK!
load jpege.ko for Hi3518...OK!
load rc.ko for Hi3518...OK!
load region.ko ....OK!
load vda.ko ....OK!
hi_i2c init is ok!
hi3516_io driver remove successful(2011.10.28)!
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x200f000c: 0x00000000 --> 0x00000001
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x200f0010: 0x00000000 --> 0x00000001
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x200f0014: 0x00000000 --> 0x00000001
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20030030: 0x00000000 --> 0x00000006
[END]
Kernel: ssp initial ok!
hi3518_io driver init start
alarmOutType gpio init 0, GpioFunctionType = 1
hi3518_io driver init successful(2012.12.22)!
hi3518_io driver init start
alarmOutType gpio init 0
hi3518_io driver init successful(2012.12.22)!
Hisilicon Watchdog Timer: 0.01 initialized. default_margin=60 sec (nowayout= 0, nodeamon= 0)
ln: /dev/misc/io_dev: File exists
acodec inited!
SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).
PPP generic driver version 2.4.2
PPP BSD Compression module registered
PPP Deflate Compression module registered
NET: Registered protocol family 24
PPP MPPE Compression module registered
Initializing USB Mass Storage driver...
usbcore: registered new interface driver usb-storage
USB Mass Storage support registered.
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20110150: 0x00000004 --> 0x00003FF6
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20110154: 0x00000004 --> 0x00003FF6
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20110158: 0x00000004 --> 0x00003FF6
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x2011015C: 0x00000004 --> 0x00003FF6
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20110160: 0x00000004 --> 0x00003FF6
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20110164: 0x00000004 --> 0x00003FF6
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20110168: 0x00000004 --> 0x00010206
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x2011016C: 0x00000004 --> 0x00010206
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20110170: 0x00000004 --> 0x00003FF6
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20110174: 0x00000004 --> 0x00003FF6
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20110178: 0x00000004 --> 0x00003FF6
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x2011017C: 0x00000004 --> 0x00003FF3
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20110180: 0x00000004 --> 0x00003FF4
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20110184: 0x00000004 --> 0x00010C82
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20110188: 0x00000004 --> 0x00010101
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x2011018c: 0x00000004 --> 0x00010100
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20110100: 0x0000000F --> 0x00000067
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20050038: 0x00000000 --> 0x00000003
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20580010: 0x00000000 --> 0x00000003
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x205cce00: 0x00000000 --> 0x08003003
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20600314: 0x00FFFF66 --> 0x01640000
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x2061002c: 0x00888010 --> 0x00444010
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x206200A4: 0x00000007 --> 0x00000003
[END]
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x206600A4: 0x00000000 --> 0x00000003
[END]
(0)str=0------------------------
hc0104 driver init successful(2012.1.1)!
hc0104_ioctl cmd: 1 data: 0
hc0104_ioctl sta=0
@@@@@@@@@@@@@@@@@@L0 SysInit OK!
ADDRCONF(NETDEV_UP): eth0: link is not ready
udhcpc (v1.16.1) started
Sending discover...
PHY: himii:01 - Link is Up - 100/Full
ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Sending discover...
Sending select for 192.168.8.131...
Lease of 192.168.8.131 obtained, lease time 43200
deleting routers
route: SIOCDELRT: No such process
adding dns 192.168.8.1
route: SIOCADDRT: File exists
mkdir: can't create directory '/wifi': File exists
rtusb init rtusbSTA --->
usbcore: registered new interface driver rtusbSTA
ifconfig: SIOCGIFFLAGS: No such device
21 SysConfig.stNetBaseWifi.byAuthType = 2   0 2
/wifi/wpa_supplicant -Dwext -ira0 -c/etc/wpa_supplicant.conf &
udhcpc: SIOCGIFINDEX: No such device
Could not read interface ra0 flags: No such device
Failed to initialize driver interface
ifconfig: SIOCSIFADDR: No such device
supportHH = 1
@@@@@@@@@@@@@@@@hc0104_ioctl cmd: 1 data: 0
@@ SysInit OK!
hc0104_ioctl sta=0
@@@@@@@@@@@@@@@@@@L0 Check Data OK!
net lib Make On Jun 30 2014 10:40:10
g_server_info.hMultiListenSock=0
baseip=192.168.8.131
wifiip=192.168.1.160
@@@@@@@@@@@@@@@@hc0104_ioctl cmd: 1 data: 0
@@ SysInit OK!
hc0104_ioctl sta=0
@@@@@@@@@@@@@@@@@@L0 Check Data OK!
rm: /tmp/aaa: is a directory
rm: /tmp/bbb: is a directory
*******************fx256 init
Creat queue id:0
queue id:0
mkdir: can't create directory '/onvif': File exists
cdp uses obsolete (PF_INET,SOCK_PACKET)
device_service start...
device_service end...
3702 discovery Make On May 29 2014 19:40:06
send 3702  hello msg start...
onvif cgi Make On Jun 16 2014 22:14:19
.3702.hello...usDataLen=1480......
.3702.hello...ret=1480......
send 3702  hello msg end...
SensorLib Make On Jun 20 2014 17:56:35
LIBSENSOR  Sensor TYPE is  SENSOR_CMOS_1080P_IMX122
Socket connection successful: master socket = 4
-------Sony IMX122 Sensor Initial OK!-------
...size Width=1920
...size Height=1080
AnvLib Make On Jun 20 2014 17:56:17
.....nWidth=320.....nHeight=240....
LIBANV  mm = 0 (0)mask handle = 16777215 16777215 16777215 16777215
******************mac
set_filter_ctrl == 1
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20050078: 0x1E1EC001 --> 0x0909C001
[END]
gain_mic = 31
LIBANV  #########Ai Enalble Dev 0 Chn 0 Ok.
LIBANV  #########Ai Enalble Dev 0 Chn 1 Ok.
set_filter_ctrl == 0
set_filter_ctrl == 1
******************mac
*** Board tools : ver0.0.1_20120501  ***
[debug]: {source/utils/cmdshell.c:166}cmdstr:himm
0x20050078: 0x0E0EC001 --> 0x0909C001
[END]
gain_mic = 31
@@@@@@@@@@@@@@@@hc0104_ioctl cmd: 1 data: 0
@@ SysInit OK!
hc0104_ioctl sta=0
@@@@@@@@@@@@@@@@@@L0 Check Data OK!
=========RTSPlib version is Jun 30 2014 14:10:55
RTSPLib Make On Jun 30 2014 14:10:55
startRtspServer rtspPort=554,bUserAuth=0,bPassive=1,mtu=1460,maxChn=1
startRtspServer begin line = 4545
********* CreatRtspServer begin  socket=0 port=554
********* CreatRtspServer result  socket=55 port=554
********* CreatRtspServer success  socket=55 port=554
setAvInfor begin line = 4502
 RTSP setAvInfor === nCh=0,bMain=0,videoPt=96,audioPt=97
setAvInfor line = 4514
setAvInfor end line = 4522
setAvInfor begin line = 4502
 RTSP setAvInfor === nCh=0,bMain=1,videoPt=96,audioPt=97
setAvInfor line = 4514
setAvInfor end line = 4522
rtsp_unicast_multicast nRtspSever=0,bMutlicast=1,szMulticastIP=239.0.0.0,nMainVideoPort=5010,nMainAudioPort=5012,nViceVideoPort=5020,nViceAudioPort=5022,nRes=0
rtsp_unicast_multicast begin line = 4661
rtsp_unicast_multicast end line = 4680
gb28181 start...
szdec = eth0, pott == 18600, cGateway = 192.168.8.1
[08:34:05.570254] [udpserver] 7398bb50 started
[08:34:05.574558] [gsclient_start] 74222b50 started
[08:34:05.575045] [gtserver_start] 74a2eb50 started
[08:34:05.575520] [gtdiscovery_create] 75287b50 started
[08:34:05.576026] [upnp_func] 75ab9b50 started
[08:34:05.578857] [startMiniServer] 763a0b50 started
hk mobile no run
HiMFS_Init ---- start
mkdir: can't create directory '/disk/k:': No such file or directory
mkdir: can't create directory '/disk/l:': No such file or directory
HiMFS_Init ---- end
@@@@@@@@@@@@@@@@hc0104_ioctl cmd: 1 data: 0
@@ SysInit OK!
hc0104_ioctl sta=0
HiDEV_DiskMonitorThread  -------------- Start
@@@@@@@@@@@@@@@@hc0104_ioctl cmd: 1 data: 0
@@ SysInit OK!
hc0104_ioctl sta=0
@@@@@@@@@@@@@@@@@@L0 Check Data OK!
**********u32QpDelta = 0
enSuperFrmMode = 0, u32MaxIprop = 4
LIBANV  ######### SS_Hi3516c_VencSetChnAttr HI_MPI_VENC_SetChnAttr ok 0x0
**********u32QpDelta = 0
enSuperFrmMode = 0, u32MaxIprop = 4
LIBANV  ######### SS_Hi3516c_VencSetChnAttr HI_MPI_VENC_SetChnAttr ok 0x0
LIBANV  ######### SS_Hi3516c_VencSetChnAttr HI_MPI_VENC_SetChnAttr ok 0x0
@@@@@@@@@@@@@@@@@@L0 Check Data OK!
[08:34:09.723119] [SCTManager] 9583bb50 started
mkdir: can't create directory '/mempic': File exists
set_filter_ctrl == 0
bkp->tm_year=117
currp->tm_year=117
.InfraredDetectMode..cai zhuan hei .
struViScene.byphotoresistorLevel = 1
mkdir: can't create directory '/memrec': File exists
uVencErrorCount = 1
smtpclient ----------- v1.2(2011-12-31)
smtpclient key = -1 1644232972 id = 131076 163845(/unix/smtpclient)

13

Odp: Hakowanie mojej chinskiej kamery

Nadal robisz to źle, poczytaj proszę o znaczniku [ code ]: https://eko.one.pl/forum/help.php?section=bbcode

14

Odp: Hakowanie mojej chinskiej kamery

No masz rację wygląda to lepiej.

15

Odp: Hakowanie mojej chinskiej kamery

Weź sobie postaw serwer tftp na PC i w U-Boot skopiuj całą zawartość FLASH do RAM, a potem wyślij to na serwer tftp.

16

Odp: Hakowanie mojej chinskiej kamery

Czy w moim przypadku to jest 0x00000000 - 0x82000000?

17

Odp: Hakowanie mojej chinskiej kamery

mexpert napisał/a:

Czy w moim przypadku to jest 0x00000000 - 0x82000000?

Raczej wątpię żebyś miał tam ponad 2 GB RAM smile

Obstawiam, że RAM zaczyna Ci się na 0x80000000. Dodaj do tego 128 MB (-1) i będziesz miał końcowy adres.
Skopiuj sobie zawartość FLASH (polecenie z serii sf) gdzieś w połowie zakresu RAM, a potem wyślij przez tftp (powinieneś mieć polecenie od put).

A potem na PC binwalk -Me ... i zobacz co Ci znajdzie i wypakuje ze skopiowanego pliku.

18

Odp: Hakowanie mojej chinskiej kamery

Zrobiłem dump jak również binwalk, tylko binwalk rozpakował to i wyszło mi ponad 4GB danych. Nie wiem czy jest ok więc nie wrzucałem całego logu z binwalk ponieważ jest dosyć długi. Umieściłem tylko początek i koniec. 

U-Boot 2010.06 (Oct 24 2013 - 15:36:07)

NAND:  Special Nand id table Version 1.35
Nand ID: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
No NAND device found!!!
0 MiB
Check spi flash controller v350... Found
Spi(cs1) ID: 0xC2 0x20 0x18 0xC2 0x20 0x18
Spi(cs1): Block:64KB Chip:16MB Name:"MX25L128XX"
In:    serial
Out:   serial
Err:   serial
Hit any key to stop autoboot:  0
hisilicon # sf probe 0
16384 KiB hi_sfc at 0:0 is now current device
hisilicon # sf read 0x82000000 0 0x1000000

hisilicon # tftp 0x82000000 dump.bin 0x1000000
Hisilicon ETH net controler
MAC:   00-00-23-34-45-66
UP_PORT : phy status change : LINK=UP : DUPLEX=FULL : SPEED=100M
TFTP to server 192.168.20.216; our IP address is 192.168.20.131
Upload Filename 'dump.bin'.
Upload from address: 0x82000000, 16.000 MB to be send ...
Uploading: #    [ Connected ]
################################        [ 1.000 MB]
################################        [ 2.000 MB]
################################        [ 3.000 MB]
################################        [ 4.000 MB]
.......
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%                                                                                                                                                             %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%                                                                                                                                                             %%%%%%%%%%%#    [16.000 MB]

         16.000 MB upload ok.
hisilicon #
VirtualBox:~$ binwalk -Me dump.bin 

Scan Time:     2017-11-09 15:26:28
Target File:   /home/maruda/dump.bin
MD5 Checksum:  e4c77960d70db0f10b599b17c44080f5
Signatures:    344

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
157608        0x267A8         CRC32 polynomial table, little endian
524288        0x80000         uImage header, header size: 64 bytes, header CRC: 0x92A6107C, created: 2013-10-24 03:05:52, image size: 2596884 bytes, Data Address: 0x80008000, Entry Point: 0x80008000, data CRC: 0x893B3F08, OS: Linux, CPU: ARM, image type: OS Kernel Image, compression type: none, image name: "Linux-3.0.8"
546896        0x85850         gzip compressed data, maximum compression, from Unix, NULL date (1970-01-01 00:00:00)
3145728       0x300000        JFFS2 filesystem, little endian
4200472       0x401818        Zlib compressed data, compressed
4201212       0x401AFC        Zlib compressed data, compressed
4201948       0x401DDC        Zlib compressed data, compressed
4202688       0x4020C0        Zlib compressed data, compressed
4203428       0x4023A4        Zlib compressed data, compressed
4204168       0x402688        Zlib compressed data, compressed
4204908       0x40296C        Zlib compressed data, compressed
4205648       0x402C50        Zlib compressed data, compressed
4206388       0x402F34        Zlib compressed data, compressed
4207124       0x403214        Zlib compressed data, compressed
4207864       0x4034F8        Zlib compressed data, compressed
4208604       0x4037DC        Zlib compressed data, compressed
.....
Scan Time:     2017-11-09 14:49:42
Target File:   /home/maruda/Public/_dump.bin.extracted/F8FA64
MD5 Checksum:  394d806e54933bdd7ac3a5c277c10466
Signatures:    344

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------


Scan Time:     2017-11-09 14:49:42
Target File:   /home/maruda/Public/_dump.bin.extracted/F8FD58
MD5 Checksum:  72bf90ab8588ee71f17591d80cec1f73
Signatures:    344

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------


Scan Time:     2017-11-09 14:49:42
Target File:   /home/maruda/Public/_dump.bin.extracted/FBF8D4
MD5 Checksum:  0e746c73afbde0646190feb33bcf695a
Signatures:    344

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
1734          0x6C6           eCos RTOS string reference: "ecos"

19

Odp: Hakowanie mojej chinskiej kamery

Jakiś nagłówek pewnie był skopany i stąd zły rozmiar.
Wrzuć gdzieś ten dump i daj link.

20

Odp: Hakowanie mojej chinskiej kamery

Nie mam doświadczenia więc trudno mi się wypowiadać, poniżej link:
dump

21

Odp: Hakowanie mojej chinskiej kamery

@mexpert, Udało Ci się odnaleźć hasło do telnetu?