Need to recover the *actual* password because of forensic reasons? .. if it's 
just for usability then 100% of the units I've encountered have some reset 
routine that wipes the defaults and resets to admin:admin (or whatever).

If it was forensics it'd probably be faster to just image the flash chip 
(hopefully leaded and not BGA but rework isn't *that* hard). It's probably 
salted by the firmware, sometimes the salt is static in the firmware, sometimes 
it's a derivative of something like the hardware address. 

If you can share the other details (make, model, firmware revision, processor 
type, etc.) .. whatever you know and can share) .. it would be more helpful. 
Also, how'd you get the hash? .. from a config file backup or from another 
device that used it to access this one? If so, what software, etc.

Cheers,

Michael Holstein
Cleveland State University
________________________________________
From: NANOG <nanog-boun...@nanog.org> on behalf of Lorell Hathcock 
<lor...@hathcock.org>
Sent: Tuesday, June 2, 2015 12:00 PM
To: nanog@nanog.org
Subject: Password Decryption Methods?

All:



I have a video camera that I need to recover the password.  I have a
password hash that is stored in a database, but any online decryption sites
are not working.



Can someone push me in the right direction on where I go from here?



Thanks,



Lorell




Reply via email to