<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/rss-style.xsl" type="text/xsl"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	     xmlns:dc="http://purl.org/dc/elements/1.1/"
	   xmlns:atom="http://www.w3.org/2005/Atom"
	     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	  xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
<channel>
	<title>sercomm &#8211; Terence Eden’s Blog</title>
	<atom:link href="https://shkspr.mobi/blog/tag/sercomm/feed/" rel="self" type="application/rss+xml" />
	<link>https://shkspr.mobi/blog</link>
	<description>Regular nonsense about tech and its effects 🙃</description>
	<lastBuildDate>Fri, 14 Nov 2025 04:51:33 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://shkspr.mobi/blog/wp-content/uploads/2023/07/cropped-avatar-32x32.jpeg</url>
	<title>sercomm &#8211; Terence Eden’s Blog</title>
	<link>https://shkspr.mobi/blog</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title><![CDATA[Telnet and Root on the Sercomm iCamera2]]></title>
		<link>https://shkspr.mobi/blog/2017/11/telnet-and-root-on-the-sercomm-icamera2/</link>
					<comments>https://shkspr.mobi/blog/2017/11/telnet-and-root-on-the-sercomm-icamera2/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Tue, 14 Nov 2017 08:04:47 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[firmware]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[NaBloPoMo]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[sercomm]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=28737</guid>

					<description><![CDATA[tldr;   URL http://[IP]/adm/file.cgi?todo=inject_telnetd Telnet username root Telnet password Aq0+0009   History  Four years ago to the day, I wrote an exposé of the hideous security failings of Sercomm IP Cameras.  The blog has since attracted 200 comments - as people try to unlock their cameras, and find out what flaws they have.  Despite my best efforts at contacting Sercomm - the OEM who …]]></description>
										<content:encoded><![CDATA[<p>tldr;</p>

<ul>
<li>URL <code>http://[IP]/adm/file.cgi?todo=inject_telnetd</code></li>
<li>Telnet username <code>root</code></li>
<li>Telnet password <code>Aq0+0009</code></li>
</ul>

<h2 id="history"><a href="https://shkspr.mobi/blog/2017/11/telnet-and-root-on-the-sercomm-icamera2/#history">History</a></h2>

<p>Four years ago to the day, I wrote an exposé of <a href="https://shkspr.mobi/blog/2013/11/hacking-around-with-network-cameras/">the hideous security failings of Sercomm IP Cameras</a>.  The blog has since attracted 200 comments - as people try to unlock their cameras, and find out what flaws they have.</p>

<p>Despite my best efforts at contacting Sercomm - the OEM who manufactures the cameras - and the "security" resellers who irresponsibly sell them to unsuspecting customers, the flaws remain unpatched.</p>

<h2 id="factory-reset"><a href="https://shkspr.mobi/blog/2017/11/telnet-and-root-on-the-sercomm-icamera2/#factory-reset">Factory Reset</a></h2>

<p>Most of the Sercomm cameras have a custom firmware which locks them down. As documented in <a href="https://shkspr.mobi/blog/2013/11/hacking-around-with-network-cameras/">my previous blog post</a>, resetting the cameras is depressingly easy.</p>

<ol>
<li>Stick paperclip in the reset hole for a few seconds.</li>
<li>The default login name is <code>administrator</code></li>
<li>There is no password set!</li>
</ol>

<h2 id="turning-on-telnet"><a href="https://shkspr.mobi/blog/2017/11/telnet-and-root-on-the-sercomm-icamera2/#turning-on-telnet">Turning on Telnet</a></h2>

<p>The process for enabling Telnet was <a href="https://web.archive.org/web/20110228233406/http://nurds-r-us.blogspot.com/2011/01/hacking-sitecom-wl-404-wireless-webcam.html">first published in 2011</a>.  It depends on the firmware that Sercomm have pre-loaded, but you just need to visit the specially crafted URl: <code>http://[IP]/adm/file.cgi?todo=inject_telnetd</code></p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2017/10/telnet-fs8.png" alt="A web browser displaying the message &quot;Open Telnet Daemon successfully!&quot;" width="643" height="174" class="aligncenter size-full wp-image-28738">

<h2 id="firmware-trickery"><a href="https://shkspr.mobi/blog/2017/11/telnet-and-root-on-the-sercomm-icamera2/#firmware-trickery">Firmware Trickery</a></h2>

<p>Over on my <a href="https://github.com/edent/Sercomm-API/">GitHub repo of Sercomm API commands</a>, you'll find a copy of the <a href="https://github.com/edent/Sercomm-API/issues/4">firmware for the iCamera 1000</a>.</p>

<p>A contributor to the blog, Paul Chambers, describes how he deciphered the firmware.</p>

<blockquote><p>The firmware is a modified <a href="https://en.wikipedia.org/wiki/SquashFS">SquashFS</a> filesystem.
Inside, it contains a symlink from <code>/etc/passwd -&gt; /mnt/ramdisk/tmp/passwd</code></p>

<p><code>/etc/rc.sethost</code> contains the string <code>passwd</code></p>

<p>Running rc.sethost does various things including writing a passwd file to <code>/mnt/ramdisk/tmp/passwd</code></p>

<p>Inside that, I saw <code>root:9sXicXdz8JrVk:0:0:root:/root:/bin/sh</code></p>

<p>The string <code>9sXicXdz8JrVk</code> is a traditional <a href="https://en.wikipedia.org/wiki/Crypt_(C)#Traditional_DES-based_scheme">DES based hash</a></p>

<p>I patched <code>rc.sethost</code> to skip the call to <code>crypt</code>. Then I got:</p>

<p><code>root:Aq0+0009:0:0:root:/root:/bin/sh</code></p>

<p>I double-checked it was correct by running</p>

<p><code>squashfs-root$python -c "import crypt;print crypt.crypt('Aq0+0009', '9s')"</code></p>

<p><code>9sXicXdz8JrVk</code></p>

<p>So the username is <code>root</code> and the password is <code>Aq0+0009</code></p></blockquote>

<p>There you have it.  Different cameras may have different firmwares with different passwords - but I'd guess that they all follow a similar pattern.  This particular password works on Firmware version <code>V3.0.01.29</code></p>

<p>Enjoy!</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=28737&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2017/11/telnet-and-root-on-the-sercomm-icamera2/feed/</wfw:commentRss>
			<slash:comments>24</slash:comments>
		
		
			</item>
	</channel>
</rss>
