GithubHelp home page GithubHelp logo

gk7102-hack's Introduction

Hack for Cheap Chinese Goke GK7102 Cloud IP Cameras

This hack is for various Chinese Goke GK7102 based IP Cameras. There are few different firmware varieties across various brands of cameras, which means it is impossible to know what exactly will work for you. Older firmware are more hackable because the root filesystem is mounted read/write. In the new firmwares the root filesystem is mounted read-only but the /home directory is writeable. This hack is based on (https://github.com/ant-thomas/zsgx1hacks)

Working on the following camera models

  • V-Tac 1080P IP Indoor Camera (read-only version)
  • ZS-GX1
  • Snowman SRC-001
  • GUUDGO GD-SC01
  • GUUDGO GD-SC03
  • GUUDGO GD-SC11
  • Digoo DG-W01F
  • Digoo DG-MYQ
  • YSA CIPC-GC13H
  • KERUI CIPC-GC15HE (read-only version)
  • EYEPLUS CIPC-GC13H (read-only version)
  • HIP291-1M
  • 2M-AI
  • others on the GOKE processor: GK7102 (GK7102S)

Features

  • Blocking cloud hosts
  • New version of BusyBox v1.26.2
  • Configurable settings
  • BusyBox FTP Server
  • dropbear SSH Server: root can login ssh without password
  • WebUI PTZ - (http://192.168.200.1:8080/cgi-bin/webui)
  • Debug and diagnostics tools: andrew-d/static-binaries
  • Changes login credentials to user: root password: cxlinux
  • Improved terminal experience
  • Wi-Fi configuration without cloud account

Installation

Current version works only from microSD card and do not require installation. It should work normaly on both old and new read-only firmwares.

  • Download the hack
  • Copy contents of folder sdcard to the main directory of a vfat/fat32 formatted microSD card
  • Change options in config.txt
  • Insert microSD card into camera and reboot the device
  • Enjoy

Security

The security of these devices is terrible.

  • DO NOT expose these cameras to the internet.
  • For this hack, config.txt is used to decide what servers you want to run.
  • This hack is blocking the communication with the cloud providers, see /media/hack/etc/hosts.
  • By default the camera wants to use some app YCC365 Plus
  • tcpdump binary is included with this hack on /media/hack/bin/tcpdump
  • Logs in /tmp/closelicamera.log
  • The device was communicating with servers of icloseli.cn, icloseli.com and arcsoft.com
  • Some cameras are trying to use 30.108.91.227 and 47.104.139.168, even with the blocked hosts.
1970-01-01 12:39:32.251493 [4342] [APDirectConnect.cpp(136) bindUdpPort]Trace: Begin___
1970-01-01 12:39:32.252391 [4342] [APDirectConnect.cpp(157) bindUdpPort]Trace: udp bind port-9999 success.
1970-01-01 12:39:32.253287 [4342] [APDirectConnect.cpp(179) bindUdpPort]Trace: udp bind port-8888 success.
1970-01-01 12:39:32.229498 [4311] [Common.cpp(378) ParseCloudIniFile]Trace: read inifile, stun_server_ip = stun.icloseli.cn.
1970-01-01 12:39:32.257463 [4311] [Common.cpp(378) ParseCloudIniFile]Trace: read inifile, return_server_ip = relaycn.closeli.cn.
1970-01-01 12:39:32.265895 [4311] [NetInterface.cpp(453) GetIpByHostName]Error: can not get (stun.icloseli.cn) ip addr!
1970-01-01 12:39:32.267988 [4311] [P2PPlayback.cpp(913) Init]Trace: parse stun domain:stun.icloseli.cn, ret=0, ip=
1970-01-01 12:39:32.273120 [4311] [NetInterface.cpp(453) GetIpByHostName]Error: can not get (relaycn.closeli.cn) ip addr!
1970-01-01 12:39:32.274199 [4311] [P2PPlayback.cpp(918) Init]Trace: parse return domain:relaycn.closeli.cn, ret=0, ip=
1970-01-01 12:39:32.275416 [4311] [P2PNew.cpp(926) SetServerAddr]Trace: stunserver:47.104.139.168:19302, turnserver:30.108.91.227:5000
1970-01-01 12:39:32.276744 [4311] [P2PNew.cpp(53) P2PLogCb]Trace: ####p2p_log:M=CLP2P;V=c7ab521e;L=error;FC=createP2PClient;MSG=createP2PClient[No StunConfision] >>> build:[Nov 28 2018 16:31:52]
  • DO NOT expose these cameras to the internet.

Instructions

How to check version

  • Using an onvif tool/app like Onvifer (Android) should give firmware version.
  • You should also be able to find the firmware version by logging in via telnet and excuting the command
  • If you have already configured the camera with the cloud app there should be some info within the app showing firmware version.
ls /tmp | grep -F 3. or ls /tmp | head -1

Default Credentials

IP Port Service Username Password


192.168.200.1 23 telnet root cxlinux

RTSP Connection

  • rtsp://admin:@192.168.200.1:554
  • rtsp://admin:@192.168.200.1:554/0/av0 (with audio)
  • rtsp://admin:@192.168.200.1:554/0/av1 (low quality)
  • rtsp://admin:@192.168.200.1:8001
  • rtsp://admin:@192.168.200.1:8001/0/av0 (with audio)
  • rtsp://admin:@192.168.200.1:8001/0/av1 (low quality)

Debug Scripts and Files

By default, the startup script /home/start.sh will try to load and run some commands

Files running from SD Card

To run debug scripts create a file debug_cmd.sh on an SD card and you will be able to execute bash commands from it.

Files copied from SD Card to /home

*-hwcfg.ini, *-VOICE.tgz, *-ptz.cfg, *-hardinfo.bin, *-custom_init.sh

File will be flashed

firmware.bin

Connect to Wi-fi network

On the SD card, create the cls.conf file and write these 3 lines in it. Replace your_wifi_ssid and your_wifi_password with your credentials.

[cls_server]
ssid = your_wifi_ssid
passwd = your_wifi_password

Date and time

Camera loses the date and time setting when it loses power. The time is updated from a remote server.

You can set your date and time manualy by date --set

Recognized TIME formats:
   hh:mm[:ss]
   [YYYY.]MM.DD-hh:mm[:ss]
   YYYY-MM-DD hh:mm[:ss]
   [[[[[YY]YY]MM]DD]hh]mm[.ss]
   'date TIME' form accepts MMDDhhmm[[YY]YY][.ss] instead

For example: date --set="2023-03-23 16:10:00"

Disable the whitelight

If you want to disable the whitelight you can edit hwcfg.ini and change support_doublelight from 2 to 1. Check RussH007's comment for more details. support_doublelight = 1

Tweaks

Device Details

Product

1080P IP Indoor Camera EU Power Plug & Auto Track Function Brand: V-Tac Model: VT-5122

V-Tac 1080P IP Indoor Camera

Wi-Fi Manufacturer

MAC Address: 88:E6:28:xx:xx:xx - Shenzhen Kezhonglong Optoelectronic Technology Co.,Ltd Floor 3, Bldg. 5, Area B, Xinfu Industrial Park, Chongqing Rd., Baoan Dist,Shenzhen,Guangdong, China Shenzhen Guangdong CN 518103 (https://fccid.io/2AF2K-WM415)

Software Versions

$ ls /tmp | grep -F 3.
3.4.2.0724
gc2033

$ uname -a
Linux localhost 3.4.43-gk #46 PREEMPT Wed Jun 26 13:47:34 CST 2019 armv6l GNU/Linux

$ busybox
BusyBox v1.22.1 (2019-06-18 19:35:31 CST) multi-call binary.

$ cat /etc/issue
Welcome to Goke Linux

p2pcam
ver: 3.4.2.0724
Get Hardware Info: model:Y13,  firmware-ident:eyeplus_ipc_gk_008

"GOKE 7102C BOARD"

Hardware info

$ cat /home/hardinfo.bin
<DeviceClass>0</DeviceClass>
<OemCode>0</OemCode>
<BoardType>1007</BoardType>
<FirmwareIdent>eyeplus_ipc_gk_008</FirmwareIdent>
<Manufacturer>RS</Manufacturer>
<Model>GK7102</Model>
<GPIO>
<BoardReset>53_0x00000000_0_0</BoardReset>
<SpeakerCtrl>33_0x00000000_0_0</SpeakerCtrl>
<WhiteLight>15_0x00000000_0_1</WhiteLight>
<IrCtrl>12_0x00000000_0_1</IrCtrl>
<IrCut1B>44_0x00000000_0_1</IrCut1B>
<IrCut2B>39_0x00000000_0_1</IrCut2B>
</GPIO>

Open ports

$ nmap -p- 192.168.200.1
Nmap scan report for _gateway (192.168.200.1)
Host is up (0.018s latency).
Not shown: 65525 closed ports
PORT     STATE SERVICE
23/tcp   open  telnet
80/tcp   open  http
554/tcp  open  rtsp
843/tcp  open  unknown
3201/tcp open  cpq-tasksmart
5050/tcp open  mmcc
6670/tcp open  irc
7101/tcp open  elcn
7103/tcp open  unknown
8001/tcp open  vcom-tunnel

Processor

$ cat /proc/cpuinfo 
Processor       : ARMv6-compatible processor rev 7 (v6l)
BogoMIPS        : 597.60
Features        : swp half fastmult vfp edsp java tls 
CPU implementer : 0x41
CPU architecture: 7
CPU variant     : 0x0
CPU part        : 0xb76
CPU revision    : 7

Hardware        : Goke IPC Board
Revision        : 0000
Serial          : 0000000000000000
$ 

Memory

$ cat /proc/meminfo 
MemTotal:          31844 kB
MemFree:            2192 kB
Buffers:            2284 kB
Cached:            11256 kB
SwapCached:            0 kB
Active:             5488 kB
Inactive:          11856 kB
Active(anon):       3996 kB
Inactive(anon):      536 kB
Active(file):       1492 kB
Inactive(file):    11320 kB
Unevictable:           0 kB
Mlocked:               0 kB
SwapTotal:             0 kB
SwapFree:              0 kB
Dirty:                 0 kB
Writeback:             0 kB
AnonPages:          3820 kB
Mapped:             3412 kB
Shmem:               728 kB
Slab:               8548 kB
SReclaimable:       1212 kB
SUnreclaim:         7336 kB
KernelStack:         656 kB
PageTables:          384 kB
NFS_Unstable:          0 kB
Bounce:                0 kB
WritebackTmp:          0 kB
CommitLimit:       15920 kB
Committed_AS:     163912 kB
VmallocTotal:    2039808 kB
VmallocUsed:       63408 kB
VmallocChunk:    1005336 kB

/etc/passwd

$ cat /etc/passwd
root:yE7gW4O0CSXXg:0:0::/root:/bin/sh
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
sync:x:4:100:sync:/bin:/bin/sync
mail:x:8:8:mail:/var/spool/mail:/bin/sh
proxy:x:13:13:proxy:/bin:/bin/sh
www-data:x:33:33:www-data:/var/www:/bin/sh
backup:x:34:34:backup:/var/backups:/bin/sh
operator:x:37:37:Operator:/var:/bin/sh
haldaemon:x:68:68:hald:/:/bin/sh
dbus:x:81:81:dbus:/var/run/dbus:/bin/sh
ftp:x:83:83:ftp:/home/ftp:/bin/sh
nobody:x:99:99:nobody:/home:/bin/sh
sshd:x:103:99:Operator:/var:/bin/sh
default:x:1000:1000:Default non-root user:/home/default:/bin/sh

cat /home/cloud.ini

[SERVERINFO]
server_name=arcsoft.com
xmpp_server_ip=xmpp.icloseli.cn.
relay_server_ip=relaycn.arcsoftcloud.com
auto_update_server_ip=update.icloseli.cn.
lecam_purchase_server_ip=esd.icloseli.cn.
upns_pnserver=upns.icloseli.cn.
upns_xmpp_name=arcsoft.com
upns_xmpp_ip=xmpp.icloseli.cn.
argus_api_server_ip=argus.icloseli.cn.
argus_server_ip=argus.icloseli.cn.
relay_server_domain_name=relay.icloseli.cn.
stun_server_ip=stun.icloseli.cn.
cloud_auth_server_name=api.icloseli.cn.
bell_server_ip=bell.icloseli.cn
return_server_ip=relaycn.closeli.cn

References

gk7102-hack's People

Contributors

dc35956 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

gk7102-hack's Issues

config file

Hi, regarding the config file. Please can you confirm whether to set HACK-WIFI to YES or NO. Have model CICP-GC13H with GK7102S and have not succeeded yet. Any help with configuring the hack would be gratefully received. Cheers...

Does it support P05-7-C camera ?

Hi,
I wonder if chip camera bough on banggood.com is supported by your firmware hack?
YCC365 app reports model: P05-7-C and firmware version 5.5.3.0602
I can use ONVIF Device manager, but only for live video and control camera gimbal.
nmap reports following ports open
PORT STATE SERVICE VERSION
80/tcp open http Ginatex-HTTPServer
| http-methods:
|_ Supported Methods: GET HEAD OPTIONS
|_http-server-header: Ginatex-HTTPServer
554/tcp open rtsp?
3201/tcp open cpq-tasksmart?
6670/tcp open irc?
|_irc-info: Unable to open connection
7101/tcp open elcn?
7103/tcp open unknown
8001/tcp open vcom-tunnel?

but there is no way to use web bowers to access any settings ... it's redirect to index.asp which is not loaded..
The internals look like following
IMG_20201226_124437
IMG_20201226_124615
IMG_20201226_124650_1

Thank you in advance
Kris

Recording

Hello!

The hack works great! But I really can't understand how to record to SD card. I saw the link with tweaks, but still can't start it.
Can someone write some steps about that?

Thanks!

RTSP

Hi,
how is RTSP server started? with which binary? this binary can be run "standalone" or it needs other hacks to be applied?
thanks

Re-Flash info

Hi,

I emptied my home directory (think i mightve been drunk). Now my camera won't boot. can anyone help with flashing instructions or any other way to resolve this?

audio?

Is it possible to enable the mic to get audio in the rtsp stream?
Is there a setting somewhere or is it something that is missing in the code?
I have some Guudgo SC02 cameras.
Thx!

Disable whitelight

Thanks for the hack. Works great and nice to be able to use WiFi without cloud access. I have an issue where when it's dark and I move past the camera, then the whitelight comes on for a minute or so. Any idea how to stop it doing that? I can manually turn the whitelight off using gio - s 15 0 but next time I walk past the camera the whitelight comes on again. Any idea how I can permanently disable the white lights and just leave IR leds on at night?. Thx. P. S. Noticed that config.cfg changed a few days ago {before I installed the hack}
and it wasn't changed by me

Date & Time

I have a problem with time, my camera after "hack" does not have a proper time, starting form 1970 year...

Change the passwords and increase security

Hello,

Is it possible to change the password?
SSH FTP RTSP Telnet ... you name it...all of them?

And when you say do not expose them to the internet, what do you mean?
They cannot have DHCP wth default gateway? I have to block all the traffic from them?
Even after using this hack, they are still not secure?
I can see I lost the cloud access, isn't that enough?

Thank you very much for the work from all contributors!

Possible to figure out GK7202

I have a camera with a close part number GK7202 instead of GK7102. Is it possible to figure out how to make this work with your script? It has 0 open ports. It only works with an iOS or android app called LookCamPro. The app does not have any settings related to RTSP/ONVIF or remote access (even with SSH, Telnet, HTTP). I will pay for a working solution!

IMG_0686

IMG_0687

IMG_0692

pYYBAGHBktSAPAYXABSo2M63L7g576.pdf Chinese Original

pYYBAGHBktSAPAYXABSo2M63L7g576.zh-CN.en.pdf English Translated

Date Time and rtsp

hello is there anyway to set the correct time on camera display or remove it if possible.

cheers mick

Firmware blocked

I tried to install the firmware through the camera's own app, the ICSee. But the battery ran out halfway through and broke the whole installation. After that, the manufacturer sent a Chinese firmware and I tried again, but without success. Now, my camera speaks two languages when starting the installation: English and Chinese.

I tried to install your hack, but it didn't work. Is there any hope for this camera? Is there another procedure I can try?

Camera: GK7102
https://pt.aliexpress.com/item/1005004532650598.html?spm=a2g0o.order_list.order_list_main.5.7750caa4hGCC8g&gatewayAdapt=glo2bra
Thank you!

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.