You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,11 +94,11 @@ The name of this operating system is ***Tina Linux.*** If you haven't done so al
94
94
Tina Linux (Neptune, 5C1C9C53)
95
95
----------------------------------------------
96
96
```
97
-
>**Tip:**
97
+
>**💡Tip:**
98
98
> You can use `sed` to display only lines 36 to 47 from the Bootlogs.txt file.
99
99
100
100
101
-
# 📷 ["Hacking an IoT Video Doorbell: Extracting & Analyzing Firmware"](https://youtu.be/dVZNmC5-uO4?si=WXdHWTCoSJMnTiCV)
101
+
# ["Hacking an IoT Video Doorbell: Extracting & Analyzing Firmware"](https://youtu.be/dVZNmC5-uO4?si=WXdHWTCoSJMnTiCV)
102
102
103
103
## 
104
104
@@ -237,7 +237,7 @@ $ john hash.txt --show
237
237
238
238
1 password hash cracked, 0 left
239
239
```
240
-
## Password: 🗝 The password for the root user is <ins>tina</ins>
240
+
## Password: 🗝 The password for the root user is <ins>tina.</ins>
241
241
I think it's safe to say that ***tina*** comes from ***Tina Linux*** and that implies that default passwords are being used. I was able to verify this by performing the same steps on another doorbell, same manufacturer.
0 commit comments