Hikvision Firmware Decrypted

Author: Brian Karas, Published on Mar 09, 2017

A developer has decrypted Hikvision's firmware, allowing examination of Hikvision's device source code and contents.

In this report, we overview the tool, showing you how it works, sharing a Hikvision's camera decrypted firmware and overviewing some things to look for inside.

* ********* *** ********* *********'* ********, ******** *********** ** *********'* device ****** **** *** ********.

** **** ******, ** ******** *** ****, ******* *** *** it *****, ******* * *********'* ****** ********* ******** *** *********** some ****** ** **** *** ******.

[***************]

Utility ********

*** *********, ***********,********* *** ******* ** *** ******* **** ** *********. "*******" ** ***** *** "********* ******/********". ** ******** *** extracts ****** ********* ******** ******, ******** *** ********* **** ******* to *******, *** ******* **** **** *** ****** ******** ** install ** ** * ****** ** ********. *** ****** ******* takes * *** *******.

*** ******* ******** "** *** **" ****** ********* *** "*** and ***" ******** *********, ***** ****** *** ******** ** *********'* most ******* ** *******, *** ****-****** *********.

Hikpack *****

* ** *** ***** *********** ** ******** ** *** *** hikpack *******. *** ***** ******* * ***** *******, * *********** of************* ****-***** ***** ***** ******** ** ****.

** *** ******* *** **** ********* ******** ****** (********* ******** ********* ****), ***** *** **** ****** ***** *** ********* *******:

** *** ***** ** ****** **** ************* (*.*., ******** ******** from *******), ******* "-* *" ** **** ** ** ******* the ***** ** ** ******* *******:

*** ********* ******** ** **** ****** ** *** ********* ********* ("test1" ** **** ****), ***** *** ** *******, ** ******** further ** ******** *****.

Sample ********* ********

***** **** *******, *** ** **** ** ******* *** ******* Hikvision's ******** ******** ****** ** *** * *** ** ******** files. ************** .*** ***** ********* ****** ********** ***** *** *********** ** examine.

******* **** *** ****, ******** *** *** *********** / ********** of *********'* ********:

**** *********** ******** **** *** ********* *****:

*** ********* "*****.***-**************" ******** *** **** ** *** ***** ********* system **** **** ** *** ******. **** **** ********* ** can **** ** /***/****** *** *** ** ******** * ****** value:

**** ***** **** ***** ** * ****-***** "****" ****, **** alone ** *** **********, ** ********* ***** ***** ** ***** a **** **** ** *** ********* *****. *** **** ** other ***** ***** ******** **** ***** ******* ** *** ****** runs ** ****, ***** *** **** ** ***** *********** ********** if ********** *** ***** ** ***** *********.

/***/****.*/*** ***** *** ********* *** ******** *** ****** ***** ** when ** ******:

*** *********** **** **** ** *** ******** ******** ****, ******* the ****** ** **** *********** ****** ** ** **** ** (SSH). ***** ****** ** ** **** ** **** *** *********** if *** ** *** ******* ** *** ******.

********* *** /***/*** **** **** ** ****** ***** **** **** shows *** ***** ******* ***** "********", * ****** *** ****** **** ** ******** *******:

** *** ******** **** *** ******* ***, *** ***** **** likely ** **** ** **** *** ****** ** *** ******, which ***** **** ******* *** ** **** *** **** ******** of *** ******.

***** ** **** * ****** **** ****** "*************", ***** **** implies ** ***** ** ****** **** ***** ********* ** ******* system-level ******** ** ******** ** ***** *******.

***** **** ** ***** ***** ******** ** ******** ******** *****, they ** **** **** ******** *** ********* ***** ****** ** keep ** *** ****** *******, *** ******* ** * ******** rule, ******* ** ****** *** ******* *** ** ***.

Firmware ********** **** ********

*** ********* ******** ****** **** *********** *** ********* ** ******* the ***** ******** ** *** ********. **** **** **** *** analysis ** ** ******** ** ***** *** ********** ********** **** can ** *********, *********, ***. **** ** *** *** *********** *************** ************ **********, **** *********** ******* ** ******* ******** ***** *** then ******* **** *** **********.

****** ********* ** *** **** ****** ** ******** ***** ** find *********** ********** ** * ******, ****** **** ****** ***** their *** **** ******.*** ********* **** *** ********** *** ******* ******** **** ** 70+ *** ************ **** ** **** **** **** ******** ******** ********.

Comments (16)

**** *****, **** ** ******.

***** * ***** **** ** **-***** ** *** **** ***** I *** **** **** *** **

******* **** ****** **** * ****** *** **** **** *** repos ** ** *******

Kali_screenshot

********* ** *** ***** ******** ***** ** **** ******< * had **** ******** ******* ** *** **** ****.

**** ******* ** **** *** *** ******* ** *** ***'* mind ** ******?

* ****** *** **** ****** ** **** * ****** ******* and ******** *** *** ********** ******* ** *** ****** *** server ******* ** ***, ***** ** ** ** **** ** access *** ****** *** * ********...

** ** * ***** ********** ** *** ***** ***** *** cia/nsa **** ********? =*

**,

** ***** * ********? ** "***** ****" ?

**** ********* ******** ******** **** **** ********* **** ******* ******. Now *** *** ***** ***. *** ***** ***** ******* **** their ****-******* (*********** *** ********* ************* ********) *** **** **** find **** *** ****** *******.

********* ****** ******* *** * ******* ****** ** ******** *******...

**'* **** ***** *** ** ******* *** ******** *** * long *****. **** ** *** ******* *************** **** **** *****.

*** **** ***'* *** ********** *** ** * ******** *****.

***** **** ** * **** ** ****** **** ** ** indeed ******* ****** ********?

***** ** ** **** ** * ***** * **** **** is *** ******* *** ********.

****** * *******, *** ** *******:

"********* *** /***/*** **** **** ** ****** ***** **** **** shows *** ***** ******* ***** "********", * ****** *** ****** **** ** ******** *******:"

"*** ********* ***** ****** ** **** ** *** ****** *******, but ******* ** * ******** ****, ******* ** ****** *** running *** ** ***."

******* **** *** ******* *** ******** **** ** * ****** cgi ** ********... *** ****** ** ** *** ********.

****'* ** *********** *******. *'* *** **** * ***** **** my ******* ***, *** **'* ***** * **********... *** ***** Hikvision **** **** ******* ***** ****** ********? **** **** ***** on ******** ***** *** ** **** **** ****** **, **** would ******* **** *** ********* ************ ** ***** **** (** at *** **** ***** ************ *** ******** ***************). ***** *** be * *** ****** **** ****'* **** ** **** ** themselves, **** *** ******** ******** ********, ** ******* **** ** the *********, *** **** ***** **** ******* **** *** ************ of ******** ****** ** *** *** ******.

**** ***** ** *** ******** *** **** ****** *******.

* ***** ****** ****** ******** **** *** ***** ********.

*** *** ***** ** *** ***** ********* ***'* ********** ** request *** ****** **** ** *** *** ******** ******** ** any ****. *** ************ *** ** **** *** * **** that ******** *** *** ***** *** *** ** *** ************* to *** ***** ****. *** "********" ** *** *** ******** the ************ ** ******* *** ************* ** *** **** **** under *** *******. **** ******* *.*. ** ******/****** ************* ** support *** ********* ***'*.

****** ***** ********: *****://**.*********.***/****/**************************

**** ********* ******* **** * *** ********?

********* **** ***, ********. ************ ********* **** ****** ******** ****

**** **** ** *** ******** **** ***** ***:

  • *** *******
  • ***** ******
  • ******* *.**.*
  • *-****
  • **** ***
  • ******** *.*.**
  • *** - ***** *** ******* *.*.*
  • ** *** ** *.*
  • ************** *.*.*
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Avigilon CEO Attacks Asian Companies Cyber Insecurity on Aug 18, 2017
Avigilon CEO is taking aim at their Asian competitors. And he is going directly after these company's cyber security issues. In this note, we...
IP Networking Course September 2017 on Aug 17, 2017
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
Directory Of Consumer Security Cameras on Aug 16, 2017
The consumer camera segment continues to grow, with new startups and models from existing players released seemingly every month. In this report we...
Hikvision Responds To Cracked Security Codes on Aug 15, 2017
Hikvision has responded to IPVM's report on Hikvision's security code being cracked, both with a 2 page update to dealers and communication...
Vulnerability Directory For Access Control Cards on Aug 14, 2017
Knowing which access credentials are insecure can be unclear, especially because most look and feel the same. Even the most insecure 125 kHz types...
Hikvision Security Code Cracked on Aug 08, 2017
Hikvision's 'security code' feature has been cracked and a program generating security codes is being distributed online. IPVM has obtained and...
US Army Bans Chinese DJI Drones on Aug 08, 2017
The US Army has issued a ban on Chinese-made DJI drones. A US Army memo obtained by sUAS News references a classified document from the Army...
Dahua Suffers Second Major Vulnerability, Silent [Finally Acknowledges] on Jul 25, 2017
Less than 3 months ago, Dahua received DHS ICS-CERT's worst score of 10.0 for their backdoor. Now, Dahua has received another 10.0 score for a new...
Wireless Burglar Alarm Sensors Guide on Jul 21, 2017
Wireless sensors for burglar alarm sensors are an increasingly common option for the historical labor intensive wired alarm systems. However,...
PR Campaign Exploiting Manufacturer Cybersecurity on Jul 20, 2017
Manufacturers increasingly have a bulls-eye on their back. As cyber security solutions providers grow, they realize a great way to get publicity...

Most Recent Industry Reports

Dahua 4K IR PTZ Tested on Aug 21, 2017
4K has made its way to IR PTZs. In this report, we examine the Dahua 6AE830VNI, a 4K PTZ with 30x optical zoom, 200m (~650') integrated IR, and...
Top Used License Plate Capture Cameras on Aug 21, 2017
Capturing license plates is a common video surveillance application. But what cameras do integrators mostly commonly used? Special purpose LPC...
VLAN For Video Surveillance Usage Statistics on Aug 21, 2017
VLANs (see our tutorial) are an option for networks using video surveillance, but how often are they actually used? 125+ integrators told us how...
Avigilon CEO Attacks Asian Companies Cyber Insecurity on Aug 18, 2017
Avigilon CEO is taking aim at their Asian competitors. And he is going directly after these company's cyber security issues. In this note, we...
Sony Next Gen HD Dome Camera Tested (SNC-EM642R) on Aug 18, 2017
Sony has released their latest generation, claiming improved WDR and low light, increased IR range, and more. We tested the SNC-EM642R outdoor IR...
IP Networking Course September 2017 on Aug 17, 2017
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
Knightscope Raises $10 Million With $3,320 Average Per Investor on Aug 17, 2017
Congrats to Knightscope. And condolences to their legion of little investors. Knightscope has disclosed they have raised $10+ million from their...
Axis and Arecont Legal Conflict Over Multi-Imager Cameras on Aug 17, 2017
Arecont threatened Axis. Axis has responded by moving to invalidate an Arecont patent. It is an important contest. Multi-imagers are Arecont's...
Directory Of Consumer Security Cameras on Aug 16, 2017
The consumer camera segment continues to grow, with new startups and models from existing players released seemingly every month. In this report we...
Cat 5e vs Cat 6 vs Cat 6a Network Cable Usage Statistics on Aug 16, 2017
Cat 5e? Cat 6? Cat 6a? What do integrators use in practice, today? 140+ integrators told IPVM. Here are the results: For those who want to...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact