![]() I'm guessing that the password is not hashed, since hashes typically are not reversible. Sadly, the password is still a base64-encoded string in the system.db file. Select id, name, username, password from camera ![]() In addition, there is a SQLite database at and the relevant camera data can be easily accessed using the sqlite3 binary and the following SQL statement: As near as I can tell, it is a Base64 encoded result of either an encrypted or hashed version of the plain-text password, but sadly, I'm a bit out of my depth here. I did try and do a camera settings export, but the password given there appears to have been hashed. This Synology DVA-3219 is running DSM 7.0.1-42218 and Surveillance Station 8.2.10-7310, so unfortunately, retrieving the password from the /volume1/surveillance//cam_nf file is no longer possible. I'm trying to retrieve a password for an IP camera that I'm loathe to factory reset, since it requires getting on a very tall ladder to get physical access to the device.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |