-
Notifications
You must be signed in to change notification settings - Fork 80
Open
Description
Hi, great work:
root@mfsbsd:~/DahuaConsole-master # ./Console.py --logon netkeyboard --rhost 192.168.1.11 --proto dhip --rport 5000
[*] [Dahua Debug Console 2019-2021 bashis <mcw noemail eu>]
[*] logon type "netkeyboard" with proto "dhip" at 192.168.1.11:5000
[+] Opening connection to 192.168.1.11 on port 5000: Done
[+] Dahua Debug Console: Success
[+] Login: Success
[+] keepAlive thread: Started
[*] [Active Users]
admin@192.168.1.55 since 01-01-1970 01:47:17 with "NetKeyboard" (Id: 1)
[*] Remote Model: DHI-VTH5422HW, Class: VTH, Time: 1970-01-01 01:47:18
but so frustrating not being able to recover lost password or erase or getting an option to factory reset this crappy chinese intercom.....
I know your software is just intended to proove the backdoor effectiveness, but since dahua dosn't respond to password reset queries from europe I was expected your soft to be my last option ...
We can login as admin in the device, we can see hashed passwords:
[Console]# user -u
[02:31:38 trace Manager 2096 UserManager.cpp:2652]-------------
[02:31:38 trace Manager 2096 UserManager.cpp:2653]User Info
[02:31:38 trace Manager 2096 UserManager.cpp:2654]-------------
[02:31:38 info Manager 2096 UserManager.cpp:2661][
{
"Anonymous" : false,
"AuthorityList" : [
..... boring .....
],
"Group" : "admin",
"Id" : 1,
"Memo" : "admin's account",
"Name" : "admin",
"Password" : "617BC378D9407453D894213993E37F5C",
"PasswordModifiedTime" : "01-01-1970 00:15:18",
"PwdScore" : 35,
"RandSalt" : "05f9d1bcf00863e6c80b0e0e143e22c8",
"Reserved" : true,
"Sharable" : true
}
]
but no way to go further when an older person messed up the password ? any clue ?
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels