-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Interested? comment here #1
Comments
j3 translation = 左右 or left/right bt mining on a gm8126, that would be amusing. I very very very much doubt it! Have the SDK on the website under files/ARM9/GM8126 |
I don't mind using serial ports. I would like to try this soon. I got mine also from Amazon for ~$20 and it is absolutely great quality for a cheap IP camera. It would be great to figure out how to create a custom kernel for this thing. You are way more advanced here that I am, but I always try to get root on all my Android devices and install custom ROMS. I used to build the OS formally known as Cyanogenmod (Can't remember the new name, as my shitty S7 has a locked bootloader. No hacks!) for my Galaxy S5. I have used TFTP to flash many DD-WRT routers. So I know a bit. I will help out all I can. |
Interested. Mine is an "ieGeek" branded model. The admin interface reports model "f128" and software version "v5.1.8.1807231703", so some way ahead of your patches |
Bit of an update. I hooked up the serial connection, but it looks like the mmc utility has now been removed from the latest firmware, unfortunately! Any thoughts which don't require I buy an EEPROM programmer? Here's what we have left
|
Hmm... I did not try the USB; you would need a cable with which you could both power it and plug in a usb device; but i suppose there is no reason for them to have wired it ..... |
Is this project finalised? |
not worked on it for a long while.... so consider it historical information. They probably closed a lot of the holes :(. |
Thanks.
I was actually wondering if these cameras were able to be added to homebridge.
…Sent from my iPad
On 11 Apr 2020, at 20:31, btsimonh ***@***.***> wrote:
not worked on it for a long while.... so consider it historical information. They probably closed a lot of the holes :(.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub, or unsubscribe.
|
I was able to get into my cam and to copy the memory. I just have no idea how to get the proper size of the partition table (have HxD installed) nor how to cut it to 16MB (by calculating it? or how?) Any one up for help? |
Okay I just found the output of the uboot with, what i guess, are the partition table info:
after knowing this and comparing with the data on the wiki I'll continue to manipulate the file. |
Hi all. |
@NightDragon1 - although my camera has been in a box for a year or more, I still follow the repo :). Good work, and any improvements welcome... it's very difficult to write a complete and easily reproducible procedure when you've done 50 different things to get to the final idea.... |
@btsimonh Thanks, cool. |
How can I drop a shell into the camera using uart?
|
@MatteoGheza some information an be found on the Wiki, You have a model called f006. Not sure if it works for you. can you open the cam and provide a pic of the pcb? |
@NightDragon1 - the wiki is public :) - you can modify directly? |
@btsimonh no i can't. I guess just members of the repository with proper rights can. But I've never maintained a wiki on github, so no idea how the rules are. |
try now - there is a setting for that! |
https://send.firefox.com/download/0a904a40a2d983b6/#jnHtnepephZ7HhUSse-6HA |
In the other side of the pcb, it has some pin with "rx", "tx", "gnd" and "3.3v" |
@btsimonh works! Thanks! I'll add the content soon. |
Okay, a first draft of the guide is online. |
Note: setting the script to be executable fixed it. I have now access to my CAM. I one could review the guide and give me feedback, I would really appreciate it. |
I'm trying with Termite 3.4, but I get garbage like With putty, following the wiki, I can read only |
If this method fails, how can I execute commands into the camera (custom firmware, sd scripts, command injections,...)? |
this can't be right: data bit: 6 |
@MatteoGheza If it fails you can only check if you have a Firmware version for what already "hacked" images are available for (see Wiki - Notes). |
I'm trying to repair a broken component of the camera pcb, I'll try it tomorrow. Thanks. |
I think just found the meaning of p0 in the URL:. it seems like it's a "resolution/quality" parameter:
|
ohh... codec parameters. Can you make it do something browser compatible :)? |
@NightDragon1 can you create a simple rtmp/rtsp uri builder? |
@MatteoGheza Just a url genertation is one thing - but you need to sign in to the cam everytime |
Ok, thanks |
Just to mention it: This SoC is an armv5 one also seen in the ancient (2010ish) Ubiquiti AirCam. Quite interested if someone fishes up the full SDK -- could recompile something for the AirCam which is near EOL. I have a 16-pin SPI flash cable I could use to reflash my Aircam. |
I found something interesting: http://www.openipcam.com/forum/index.php?topic=1429.0
Can this be used to exploit the SD or gain access faster? |
What is the default FS used by camera? I read that the camera read only sd cards with a custom encrypted filesystem (???) and, if sd card is not readable, the camera formats it. |
Can someone try the sd card exploit? |
I subscribed to track progress and am comfortable enough to get a script to the right place on the SD, but not enough to know what to put in the script. |
I was thinking of trying this. |
gotcha - I will dig this camera out again and put some curls, pings and nslookups in the script - in an infinite loop I suppose. |
In my original testing, the camera firmware always erased the SD card after boot. |
Can you check (or post here) the script that check the FS of the sd card? |
I'd be interested in being able to use some of these security cameras in a local capacity bypassing the mipc app potentially using motioneye os or something similar. Are there any requirements of what camera to get to start messing around with one? privacy is my main concern as that MIPC app is too intrusive. Thanks for all the work you've done so far! |
While this projects focus is to hack, gain access and overrule the mipc cams, i just want to mention I found a almost low budget CAM with no cloud compulsion (while it does have features but you can simple not use them): Reolink E1 Pro. Note: Regarding Wifi password length/complexity and SSID: The webpage says and also the smartphone apps don't support passwords longer than a 127 chars. It also says it doesn't support special chars. But I can tell you that by using the desktop app and entering the access data (and just ignoring the failed/warning messages after you applied the settings, it does work. |
USD 140.77?! (€114.99 in Europe). |
Any update on this? |
Perfect, that exactly what I want! I wish there were more local only webcams, I've spent too much time looking for one. Thanks! |
Has anyone tried the SD card exploit yet? I have several of these cams and am kinda tired of them not being on my home assistant, also of them sending my feed to who-knows-where. Do the smarter people here know if this is a similar camera, and if anything discussed above might work? I have no idea how to debug serial from this thing, but could figure it out if directed. Thanks |
I never got around to it but I might have time this weekend. I did get these cameras loaded into TinyCam pro and from there into HA. Not pretty but works. And TinyCam can do the pan/tilt "ok". |
My camera(s) is not pan/tilt, and I would try the tinycam route but have no android devices. My cameras are running v5.3.3.2008151009 it looks like |
If you still have the image, please embed it directly here instead. |
This repo is my exposure of my attempt to keep my privacy faced with Chinese hardware with no published privacy policy....
If you have the same or similar camera, and are interested in contributing, then put a comment against this issue; maybe we can collaborate.
I've got the initial work done (root prompt, but requiring serial access to establish, permanently), but the ideal would be an exploit which did not require serial access.
There are promising hints of such exploits, but they require detailed investigation (ARM decompilation and debugging) which I simply don't have the time to do.
There are also (purely from the connections of the developer) hints that these cameras may actually be mining bitcoin on the developer's behalf - a good way of financing the internet infrastructure required for delivering the cloud video. I've not got a problem with that :). But I do need to have some guarantees about it's interaction with my home network....
The text was updated successfully, but these errors were encountered: