Skip to content

Commit 76c71bd

Browse files
Update README.md
1 parent 345eb88 commit 76c71bd

File tree

1 file changed

+24
-22
lines changed

1 file changed

+24
-22
lines changed

README.md

Lines changed: 24 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ hash.txt outside of the firmware image's filesystem.
205205
206206
```bash
207207
$ cat hash.txt
208-
208+
209209
root:91rMiZzGliXHM:1:0:99999:7:::
210210
```
211211
To install John:
@@ -216,29 +216,31 @@ To install John:
216216
And finally, the only thing needed is to run `john` on the file containing the hash, no options:
217217
218218
```bash
219-
[~]$ john hash.txt
220-
221-
Created directory: /home/kali/.john
222-
Using default input encoding: UTF-8
223-
Loaded 1 password hash (descrypt, traditional crypt(3) [DES 256/256 AVX2])
224-
Will run 4 OpenMP threads
225-
Proceeding with single, rules:Single
226-
Press 'q' or Ctrl-C to abort, almost any other key for status
227-
Almost done: Processing the remaining buffered candidate passwords, if any.
228-
Proceeding with wordlist:/usr/share/john/password.lst
229-
tina (root)
230-
1g 0:00:00:01 DONE 2/3 (2025-03-31 08:15) 0.9803g/s 26739p/s 26739c/s 26739C/s 123456..HALLO
231-
Use the "--show" option to display all of the cracked passwords reliably
232-
Session completed.
233-
234-
[~]$ john hash.txt --show
235-
root:tina:1:0:99999:7:::
219+
$ john hash.txt
220+
221+
Created directory: /home/kali/.john
222+
Using default input encoding: UTF-8
223+
Loaded 1 password hash (descrypt, traditional crypt(3) [DES 256/256 AVX2])
224+
Will run 4 OpenMP threads
225+
Proceeding with single, rules:Single
226+
Press 'q' or Ctrl-C to abort, almost any other key for status
227+
Almost done: Processing the remaining buffered candidate passwords, if any.
228+
Proceeding with wordlist:/usr/share/john/password.lst
229+
tina (root)
230+
1g 0:00:00:01 DONE 2/3 (2025-03-31 08:15) 0.9803g/s 26739p/s 26739c/s 26739C/s 123456..HALLO
231+
Use the "--show" option to display all of the cracked passwords reliably
232+
Session completed.
233+
234+
$ john hash.txt --show
235+
236+
root:tina:1:0:99999:7:::
236237
237-
1 password hash cracked, 0 left
238-
239-
```
238+
1 password hash cracked, 0 left
239+
```
240+
## Password: 🗝 The password for the root user is <ins>tina</ins>
241+
I think it's safe to say that ***tina*** comes from ***Tina Linux*** and that implies that default passwords are being used. I was able to verify this by performing the same steps on another doorbell, same manufacturer.
242+
The password was in fact the same, ***tina***.
240243

241-
🗝fr
242244
## Contributing & Collaboration: 🤝
243245

244246
#### This is an open project, and I welcome contributions and feedback from the community. If you have insights, improvements, or additional findings related to the firmware, please feel free to submit issues or pull requests.

0 commit comments

Comments
 (0)