我正在编写一个脚本来自动启用HikVision摄像机的DHCP。为了做到这一点,我试图对SADP Tool进行一些反向工程以了解其工作原理。我捕获了SADP工具和照相机之间的通信。这是数据包之一:
<?xml version="1.0" encoding="utf-8"?>
<Probe>
<Uuid>0000008A-00E6-0048-A54A-F64BE0AA9F26</Uuid>
<Types>update</Types>
<PWErrorParse>true</PWErrorParse>
<MAC>54-c4-15-1b-06-67</MAC>
<Password bSalt="true">DJ5WSs/jb1G1S1BQdB81HBFxxulih6kpzhajqN3/3jgnKmB9DKWwJqx0NnxejDhWO1j0bOoVubzQ7IvNeaxgVg==</Password>
<IPv4Address>192.168.1.64</IPv4Address>
<CommandPort>8000</CommandPort>
<HttpPort>80</HttpPort>
<IPv4SubnetMask>255.255.255.0</IPv4SubnetMask>
<IPv4Gateway>192.168.1.1</IPv4Gateway>
<IPv6Address>::</IPv6Address>
<IPv6Gateway>::</IPv6Gateway>
<IPv6MaskLen>64</IPv6MaskLen>
<DHCP>true</DHCP>
<SDKOverTLSPort>0</SDKOverTLSPort>
</Probe>
在上述数据包中,某些信息已加密
<Password bSalt="true">DJ5WSs/jb1G1S1BQdB81HBFxxulih6kpzhajqN3/3jgnKmB9DKWwJqx0NnxejDhWO1j0bOoVubzQ7IvNeaxgVg==</Password>
我猜这是从中生成的散列的base64编码:
- admin's password: simple123
- camera salt: b68053c65b06b1b322b6cbc53fce1f614eee9366384a12aa01188bdaa8f14ac3
- and uuid: 0000009A-0087-004C-A898-6E131DE7E584
- (and maybe other info like MAC, IP...)
但是,在尝试了一些散列函数之后,我仍然无法重现该散列。有人知道HikVision SADP如何生成此密码吗?