如何自动启用HikVision摄像机的DHCP?

时间:2019-07-04 03:22:41

标签: hash md5 reverse-engineering sha hikvision

我正在编写一个脚本来自动启用HikVision摄像机的DHCP。为了做到这一点,我试图对SADP Tool进行一些反向工程以了解其工作原理。我捕获了SADP工具和照相机之间的通信。这是数据包之一:

<?xml version="1.0" encoding="utf-8"?>
<Probe>
    <Uuid>0000008A-00E6-0048-A54A-F64BE0AA9F26</Uuid>
    <Types>update</Types>
    <PWErrorParse>true</PWErrorParse>
    <MAC>54-c4-15-1b-06-67</MAC>
    <Password bSalt="true">DJ5WSs/jb1G1S1BQdB81HBFxxulih6kpzhajqN3/3jgnKmB9DKWwJqx0NnxejDhWO1j0bOoVubzQ7IvNeaxgVg==</Password>
    <IPv4Address>192.168.1.64</IPv4Address>
    <CommandPort>8000</CommandPort>
    <HttpPort>80</HttpPort>
    <IPv4SubnetMask>255.255.255.0</IPv4SubnetMask>
    <IPv4Gateway>192.168.1.1</IPv4Gateway>
    <IPv6Address>::</IPv6Address>
    <IPv6Gateway>::</IPv6Gateway>
    <IPv6MaskLen>64</IPv6MaskLen>
    <DHCP>true</DHCP>
    <SDKOverTLSPort>0</SDKOverTLSPort>
</Probe>

在上述数据包中,某些信息已加密

<Password bSalt="true">DJ5WSs/jb1G1S1BQdB81HBFxxulih6kpzhajqN3/3jgnKmB9DKWwJqx0NnxejDhWO1j0bOoVubzQ7IvNeaxgVg==</Password>

我猜这是从中生成的散列的base64编码:

 - admin's password: simple123
 - camera salt: b68053c65b06b1b322b6cbc53fce1f614eee9366384a12aa01188bdaa8f14ac3
 - and uuid: 0000009A-0087-004C-A898-6E131DE7E584
 - (and maybe other info like MAC, IP...)

但是,在尝试了一些散列函数之后,我仍然无法重现该散列。有人知道HikVision SADP如何生成此密码吗?

0 个答案:

没有答案
相关问题