You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Use the "--show" option to display all of the cracked passwords reliably
232
+
Session completed.
233
+
234
+
$ john hash.txt --show
235
+
236
+
root:tina:1:0:99999:7:::
236
237
237
-
1 password hash cracked, 0 left
238
-
239
-
```
238
+
1 password hash cracked, 0 left
239
+
```
240
+
## Password: 🗝 The password for the root user is <ins>tina</ins>
241
+
I think it's safe to say that ***tina*** comes from ***Tina Linux*** and that implies that default passwords are being used. I was able to verify this by performing the same steps on another doorbell, same manufacturer.
242
+
The password was in fact the same, ***tina***.
240
243
241
-
🗝fr
242
244
## Contributing & Collaboration: 🤝
243
245
244
246
#### This is an open project, and I welcome contributions and feedback from the community. If you have insights, improvements, or additional findings related to the firmware, please feel free to submit issues or pull requests.
0 commit comments