<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.exploitee.rs/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rchase</id>
	<title>Exploitee.rs - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.exploitee.rs/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rchase"/>
	<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Special:Contributions/Rchase"/>
	<updated>2026-05-07T11:09:26Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.0-alpha</generator>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2970</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2970"/>
		<updated>2018-04-25T17:45:34Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Momentum_Axel-720P.jpg|100px|thumb|left|Momentum Axel 720P]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Momentum Axel 720P.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Momentum Axel 720P is a Wi-Fi camera with a built-in microphone, speaker, motion detection. Comes with free iPhone/Android app for control of the device. Recordings can be stored on micro SD card (not included) or cloud storage with a subscription. Sold at Walmart and Target. For more information, see https://www.momentumcam.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware Upgrade via SD Card ==&lt;br /&gt;
&lt;br /&gt;
Root shell over telnet can be enabled by placing this customized firmware onto the micro SD card, and rebooting the camera. After reboot, you can log in to telnet with root/EHLGVG.&lt;br /&gt;
&lt;br /&gt;
== Build Your Own Firmware ==&lt;br /&gt;
&lt;br /&gt;
Alternatively, you can build your own firmware by following these instructions:&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: The root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2969</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2969"/>
		<updated>2018-04-25T17:45:13Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Momentum_Axel-720P.jpg|100px|thumb|left|Momentum Axel 720P]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Momentum Axel 720P.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Momentum Axel 720P is a Wi-Fi camera with a built-in microphone, speaker, motion detection. Comes with free iPhone/Android app for control of the device. Recordings can be stored on micro SD card (not included) or cloud storage with a subscription. Sold at Walmart and Target. For more information, see https://www.momentumcam.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware Upgrade via SD Card ==&lt;br /&gt;
&lt;br /&gt;
Root shell over telnet can be enabled by placing this customized firmware onto the micro SD card, and rebooting the camera. After reboot, you can log in to telnet with root/EHLGVG.&lt;br /&gt;
&lt;br /&gt;
[[File:Ezviz.c]]&lt;br /&gt;
&lt;br /&gt;
== Build Your Own Firmware ==&lt;br /&gt;
&lt;br /&gt;
Alternatively, you can build your own firmware by following these instructions:&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: The root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2968</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2968"/>
		<updated>2018-04-24T20:35:34Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Momentum_Axel-720P.jpg|100px|thumb|left|Momentum Axel 720P]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Momentum Axel 720P.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Momentum Axel 720P is a Wi-Fi camera with a built in microphone, speaker, motion detection. Comes with free iPhone/Android app for control of the device. Recordings can be stored on micro SD card (not included) or cloud storage with a subscription. Sold at Walmart and Target. For more information, see https://www.momentumcam.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware Upgrade via SD Card ==&lt;br /&gt;
&lt;br /&gt;
Root shell over telnet can be enabled by placing this customized firmware onto the micro SD card, and rebooting the camera. After reboot, you can log in to telnet with root/EHLGVG.&lt;br /&gt;
&lt;br /&gt;
[[File:Ezviz.c]]&lt;br /&gt;
&lt;br /&gt;
== Build Your Own Firmware ===&lt;br /&gt;
&lt;br /&gt;
Alternatively, you can build your own firmware by following these instructions:&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: The root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:Ezviz.c&amp;diff=2967</id>
		<title>File:Ezviz.c</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:Ezviz.c&amp;diff=2967"/>
		<updated>2018-04-24T20:15:27Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2966</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2966"/>
		<updated>2018-04-24T20:10:21Z</updated>

		<summary type="html">&lt;p&gt;Rchase: /* Root: Custom Firmware Upgrade via SD Card */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Momentum_Axel-720P.jpg|100px|thumb|left|Momentum Axel 720P]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Momentum Axel 720P.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Momentum Axel 720P is a Wi-Fi camera with a built in microphone, speaker, motion detection. Comes with free iPhone/Android app for control of the device. Recordings can be stored on micro SD card (not included) or cloud storage with a subscription. Sold at Walmart and Target. For more information, see https://www.momentumcam.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware Upgrade via SD Card ==&lt;br /&gt;
&lt;br /&gt;
Root shell over telnet can be enabled by creating a custom firmware, naming it &#039;ezviz.dav&#039;, placing it on the SD card, and rebooting:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Instructions to build custom firmware:&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: The root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2965</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2965"/>
		<updated>2018-04-24T20:09:41Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Momentum_Axel-720P.jpg|100px|thumb|left|Momentum Axel 720P]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Momentum Axel 720P.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Momentum Axel 720P is a Wi-Fi camera with a built in microphone, speaker, motion detection. Comes with free iPhone/Android app for control of the device. Recordings can be stored on micro SD card (not included) or cloud storage with a subscription. Sold at Walmart and Target. For more information, see https://www.momentumcam.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware Upgrade via SD Card ==&lt;br /&gt;
&lt;br /&gt;
Root shell over telnet can be enabled by creating a custom firmware, naming it &#039;ezviz.dav&#039;, placing it on the SD card, and rebooting:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: The root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:Momentum_Axel-720P.jpg&amp;diff=2964</id>
		<title>File:Momentum Axel-720P.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:Momentum_Axel-720P.jpg&amp;diff=2964"/>
		<updated>2018-04-24T20:08:52Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2963</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2963"/>
		<updated>2018-04-24T20:08:27Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:|100px|left|thumb]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Momentum Axel 720P.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Momentum Axel 720P is a Wi-Fi camera with a built in microphone, speaker, motion detection. Comes with free iPhone/Android app for control of the device. Recordings can be stored on micro SD card (not included) or cloud storage with a subscription. Sold at Walmart and Target. For more information, see https://www.momentumcam.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware Upgrade via SD Card ==&lt;br /&gt;
&lt;br /&gt;
Root shell over telnet can be enabled by creating a custom firmware, naming it &#039;ezviz.dav&#039;, placing it on the SD card, and rebooting:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: The root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2962</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2962"/>
		<updated>2018-04-24T20:06:40Z</updated>

		<summary type="html">&lt;p&gt;Rchase: /* About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Alarm.com_ADC-v520IR.jpg|100px|left|thumb]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Alarm.com ADC-v520IR.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Momentum Axel 720P is a Wi-Fi camera with a built in microphone, speaker, motion detection. Comes with free iPhone/Android app for control of the device. Recordings can be stored on micro SD card (not included) or cloud storage with a subscription. Sold at Walmart and Target. For more information, see https://www.momentumcam.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware Upgrade via SD Card ==&lt;br /&gt;
&lt;br /&gt;
Root shell over telnet can be enabled by creating a custom firmware, naming it &#039;ezviz.dav&#039;, placing it on the SD card, and rebooting:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: The root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2961</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2961"/>
		<updated>2018-04-24T20:06:24Z</updated>

		<summary type="html">&lt;p&gt;Rchase: /* About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Alarm.com_ADC-v520IR.jpg|100px|left|thumb]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Alarm.com ADC-v520IR.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Momentum Axel 720P is a Wi-Fi camera with a built in microphone, speaker, motion detection. Comes with free iPhone/Android app for control of the device. Recordings can be stored on micro SD card (not included) or cloud storage with a subscription. Sold at Walmart and target. For more information, see https://www.momentumcam.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware Upgrade via SD Card ==&lt;br /&gt;
&lt;br /&gt;
Root shell over telnet can be enabled by creating a custom firmware, naming it &#039;ezviz.dav&#039;, placing it on the SD card, and rebooting:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: The root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2960</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2960"/>
		<updated>2018-04-24T20:05:30Z</updated>

		<summary type="html">&lt;p&gt;Rchase: /* Root: Custom Firmware with Telnet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Alarm.com_ADC-v520IR.jpg|100px|left|thumb]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Alarm.com ADC-v520IR.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Momentumcam.com Axel 720P is a Wi-Fi camera with a built in microphone, speaker, motion detection. Comes with free iPhone/Android app for control of the device. Recordings can be stored on micro SD card (not included) or cloud storage with a subscription.&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware Upgrade via SD Card ==&lt;br /&gt;
&lt;br /&gt;
Root shell over telnet can be enabled by creating a custom firmware, naming it &#039;ezviz.dav&#039;, placing it on the SD card, and rebooting:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: The root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2959</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2959"/>
		<updated>2018-04-24T20:04:32Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Alarm.com_ADC-v520IR.jpg|100px|left|thumb]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Alarm.com ADC-v520IR.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Momentumcam.com Axel 720P is a Wi-Fi camera with a built in microphone, speaker, motion detection. Comes with free iPhone/Android app for control of the device. Recordings can be stored on micro SD card (not included) or cloud storage with a subscription.&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware with Telnet ==&lt;br /&gt;
&lt;br /&gt;
Telnet to root shell can be enabled by creating a custom firmware, naming it &#039;ezviz.dav&#039;, placing it on the SD card, and rebooting:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: The root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2958</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2958"/>
		<updated>2018-04-24T20:01:04Z</updated>

		<summary type="html">&lt;p&gt;Rchase: /* Root: Custom Firmware with Telnet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Alarm.com_ADC-v520IR.jpg|100px|left|thumb]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Alarm.com ADC-v520IR.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Alarm.com ADC-v520IR is a network (Wifi/Ethernet) camera w/ IR LEDs provided by alarm.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware with Telnet ==&lt;br /&gt;
&lt;br /&gt;
Telnet to root shell can be enabled by creating a custom firmware, naming it &#039;ezviz.dav&#039;, placing it on the SD card, and rebooting:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: The root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2957</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2957"/>
		<updated>2018-04-24T20:00:44Z</updated>

		<summary type="html">&lt;p&gt;Rchase: /* Root: Custom Firmware with Telnet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Alarm.com_ADC-v520IR.jpg|100px|left|thumb]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Alarm.com ADC-v520IR.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Alarm.com ADC-v520IR is a network (Wifi/Ethernet) camera w/ IR LEDs provided by alarm.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware with Telnet ==&lt;br /&gt;
&lt;br /&gt;
Telnet to root shell can be enabled by creating a custom firmware, naming it &#039;ezviz.dav&#039;, placing it on the SD card, and rebooting:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: This works because the current version of the firmware checks for the existence of &#039;ezviz.dav&#039; when booting up. Also, the root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2956</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2956"/>
		<updated>2018-04-24T20:00:29Z</updated>

		<summary type="html">&lt;p&gt;Rchase: /* Root: Custom Firmware with Telnet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Alarm.com_ADC-v520IR.jpg|100px|left|thumb]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Alarm.com ADC-v520IR.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Alarm.com ADC-v520IR is a network (Wifi/Ethernet) camera w/ IR LEDs provided by alarm.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware with Telnet ==&lt;br /&gt;
&lt;br /&gt;
Telnet to root shell can be enabled by creating a custom firmware, naming it &#039;ezviz.dav&#039;, placing it on the SD card, and rebooting:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
*NOTE: This works because the current version of the firmware checks for the existence of &#039;ezviz.dav&#039; when booting up. Also, the root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2955</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2955"/>
		<updated>2018-04-24T20:00:18Z</updated>

		<summary type="html">&lt;p&gt;Rchase: /* Root: Build Custom Firmware with Telnet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Alarm.com_ADC-v520IR.jpg|100px|left|thumb]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Alarm.com ADC-v520IR.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Alarm.com ADC-v520IR is a network (Wifi/Ethernet) camera w/ IR LEDs provided by alarm.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Custom Firmware with Telnet ==&lt;br /&gt;
&lt;br /&gt;
Telnet root shell can be enabled by creating a custom firmware, naming it &#039;ezviz.dav&#039;, placing it on the SD card, and rebooting:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
*NOTE: This works because the current version of the firmware checks for the existence of &#039;ezviz.dav&#039; when booting up. Also, the root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2954</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2954"/>
		<updated>2018-04-24T19:59:54Z</updated>

		<summary type="html">&lt;p&gt;Rchase: /* Root: Build Custom Firmware with Telnet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Alarm.com_ADC-v520IR.jpg|100px|left|thumb]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Alarm.com ADC-v520IR.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Alarm.com ADC-v520IR is a network (Wifi/Ethernet) camera w/ IR LEDs provided by alarm.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Build Custom Firmware with Telnet ==&lt;br /&gt;
&lt;br /&gt;
Telnet root shell can be enabled by creating a custom firmware, naming it &#039;ezviz.dav&#039;, placing it on the SD card, and rebooting:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
*NOTE: This works because the current version of the firmware checks for the existence of &#039;ezviz.dav&#039; when booting up. Also, the root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2953</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2953"/>
		<updated>2018-04-24T19:59:46Z</updated>

		<summary type="html">&lt;p&gt;Rchase: /* Telnet to Root via SD card custom firmware upgrade */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Alarm.com_ADC-v520IR.jpg|100px|left|thumb]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Alarm.com ADC-v520IR.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Alarm.com ADC-v520IR is a network (Wifi/Ethernet) camera w/ IR LEDs provided by alarm.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Root: Build Custom Firmware with Telnet ==&lt;br /&gt;
&lt;br /&gt;
Telnet root shell can be enabled by creating a custom firmware, naming it &#039;ezviz.dav&#039;, placing it on the SD card, and rebooting:&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
*NOTE: This works because the current version of the firmware checks for the existence of &#039;ezviz.dav&#039; when booting up. Also, the root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2952</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2952"/>
		<updated>2018-04-24T19:57:59Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Alarm.com_ADC-v520IR.jpg|100px|left|thumb]]&lt;br /&gt;
[[Category:Cameras]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Alarm.com ADC-v520IR.&lt;br /&gt;
&lt;br /&gt;
== About ==&lt;br /&gt;
The Alarm.com ADC-v520IR is a network (Wifi/Ethernet) camera w/ IR LEDs provided by alarm.com&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&lt;br /&gt;
== Telnet to Root via SD card custom firmware upgrade ==&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
*NOTE: This works because the current version of the firmware checks for the existence of &#039;ezviz.dav&#039; when booting up. Also, the root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_axel-720p&amp;diff=2951</id>
		<title>Momentum axel-720p</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_axel-720p&amp;diff=2951"/>
		<updated>2018-04-24T19:54:38Z</updated>

		<summary type="html">&lt;p&gt;Rchase: Blanked the page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2950</id>
		<title>Momentum Axel-720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_Axel-720P&amp;diff=2950"/>
		<updated>2018-04-24T19:54:02Z</updated>

		<summary type="html">&lt;p&gt;Rchase: Created page with &amp;quot;Telnet to Root via SD card custom firmware upgrade  1. Download Hikvision packer/unpacker (to Linux PC):  https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Telnet to Root via SD card custom firmware upgrade&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
*NOTE: This works because the current version of the firmware checks for the existence of &#039;ezviz.dav&#039; when booting up. Also, the root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_axel-720p&amp;diff=2949</id>
		<title>Momentum axel-720p</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_axel-720p&amp;diff=2949"/>
		<updated>2018-04-24T19:53:27Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Telnet to Root via SD card custom firmware upgrade&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
*NOTE: This works because the current version of the firmware checks for the existence of &#039;ezviz.dav&#039; when booting up. Also, the root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_axel-720p&amp;diff=2948</id>
		<title>Momentum axel-720p</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_axel-720p&amp;diff=2948"/>
		<updated>2018-04-24T19:52:46Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Telnet to Root via SD card custom firmware upgrade&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8%20build%20170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: This works because the current version of the firmware checks for the existence of &#039;ezviz.dav&#039; when booting up. Also, the root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_axel-720p&amp;diff=2947</id>
		<title>Momentum axel-720p</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_axel-720p&amp;diff=2947"/>
		<updated>2018-04-24T19:52:16Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Telnet to Root via SD card custom firmware upgrade&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8 build 170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
4. cd newfw&lt;br /&gt;
&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
&lt;br /&gt;
8. cd ..&lt;br /&gt;
&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*NOTE: This works because the current version of the firmware checks for the existence of &#039;ezviz.dav&#039; when booting up. Also, the root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Momentum_axel-720p&amp;diff=2946</id>
		<title>Momentum axel-720p</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Momentum_axel-720p&amp;diff=2946"/>
		<updated>2018-04-24T19:51:50Z</updated>

		<summary type="html">&lt;p&gt;Rchase: Created page with &amp;quot;Telnet to Root via SD card custom firmware upgrade  1. Download Hikvision packer/unpacker (to Linux PC):  https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Telnet to Root via SD card custom firmware upgrade&lt;br /&gt;
&lt;br /&gt;
1. Download Hikvision packer/unpacker (to Linux PC):&lt;br /&gt;
&lt;br /&gt;
https://ipcamtalk.com/threads/mcr-hikvision-packer-unpacker-for-5-3-x-and-newer-firmware.15710/&lt;br /&gt;
&lt;br /&gt;
2. Download original firmware:&lt;br /&gt;
&lt;br /&gt;
https://prod-peq-a-firmware-uploads.s3.amazonaws.com/firmware/Hikvision/MOCAM-720-01/V5.1.8 build 170829/digicap.dav?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Credential=AKIAI3CJ5PEMTCV2KBOA/20180422/us-east-1/s3/aws4_request&amp;amp;X-Amz-Date=20180422T154301Z&amp;amp;X-Amz-Expires=604799&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Signature=830a05ea9c676973fb282c53f70c6442eed9ba8894afbf0902652fd475ca0252&lt;br /&gt;
&lt;br /&gt;
3. ./hikpack -t r0 -x digicap.dav -o newfw&lt;br /&gt;
4. cd newfw&lt;br /&gt;
5. unsquahsfs app.img&lt;br /&gt;
6. cd squashfs-root&lt;br /&gt;
7. nano initrun.sh and add &#039;/bin/busybox telnetd &amp;amp;&#039; to the end to enable telnet (or make any changes you want)&lt;br /&gt;
8. cd ..&lt;br /&gt;
9. mksquashfs squashfs-root/ app.img -comp xz -b 256K -noappend -force-uid 4145 -force-gid 4148&lt;br /&gt;
10. rm -rf squashfs-root&lt;br /&gt;
11. ./hikpack -t r0 -p ezviz.dav -o newfw&lt;br /&gt;
12. Copy ezviz.dav to SD card&lt;br /&gt;
13. Insert SD card to camera&lt;br /&gt;
14. Reboot camera&lt;br /&gt;
15. Log in to telnet with root/EHLGVG&lt;br /&gt;
&lt;br /&gt;
*NOTE: This works because the current version of the firmware checks for the existence of &#039;ezviz.dav&#039; when booting up. Also, the root password is hard-coded to all devices.&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2945</id>
		<title>Rchase</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2945"/>
		<updated>2018-04-24T19:49:58Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Member Profile&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Exploitee.rs Name: rchase&lt;br /&gt;
&lt;br /&gt;
*Real Name: Reilly Chase&lt;br /&gt;
&lt;br /&gt;
*Email: rchase [at] rchase.com&lt;br /&gt;
&lt;br /&gt;
*Twitter: https://twitter.com/_rchase_&lt;br /&gt;
&lt;br /&gt;
*Web: https://rchase.com&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2944</id>
		<title>Rchase</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2944"/>
		<updated>2018-04-24T19:45:49Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Member Profile&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Exploitee.rs Name: rchase&lt;br /&gt;
&lt;br /&gt;
Real Name: Reilly Chase&lt;br /&gt;
&lt;br /&gt;
Email: rchase [at] rchase.com&lt;br /&gt;
&lt;br /&gt;
Twitter: https://twitter.com/_rchase_&lt;br /&gt;
&lt;br /&gt;
Web: https://rchase.com&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2943</id>
		<title>Rchase</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2943"/>
		<updated>2018-04-24T19:42:11Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Member Profile&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
-Exploitee.rs Name: rchase&lt;br /&gt;
-Real Name: Reilly Chase&lt;br /&gt;
&lt;br /&gt;
Email: rchase [at] rchase.com&lt;br /&gt;
&lt;br /&gt;
Twitter: [_rchase_]&lt;br /&gt;
&lt;br /&gt;
Area of expertise: Hax0r&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2942</id>
		<title>Rchase</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2942"/>
		<updated>2018-04-24T19:41:33Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Member Profile&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Exploitee.rs Name: rchase&lt;br /&gt;
&lt;br /&gt;
Real Name: Reilly Chase&lt;br /&gt;
&lt;br /&gt;
Email: rchase [at] rchase.com&lt;br /&gt;
&lt;br /&gt;
Twitter: _rchase_&lt;br /&gt;
&lt;br /&gt;
Area of expertise: Hax0r&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2941</id>
		<title>Rchase</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2941"/>
		<updated>2018-04-24T19:41:07Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Member Profile&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
-Exploitee.rs Name: rchase&lt;br /&gt;
-Real Name: Reilly Chase&lt;br /&gt;
&lt;br /&gt;
Email: rchase [at] rchase.com&lt;br /&gt;
&lt;br /&gt;
Twitter: _rchase_&lt;br /&gt;
&lt;br /&gt;
Area of expertise: Hax0r&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2940</id>
		<title>Rchase</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2940"/>
		<updated>2018-04-24T19:40:33Z</updated>

		<summary type="html">&lt;p&gt;Rchase: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Member Profile&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Exploitee.rs Name: rchase&lt;br /&gt;
&lt;br /&gt;
Real Name: Reilly Chase&lt;br /&gt;
&lt;br /&gt;
Email: rchase [at] rchase.com&lt;br /&gt;
&lt;br /&gt;
Twitter: _rchase_&lt;br /&gt;
&lt;br /&gt;
Area of expertise: Hax0r&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2939</id>
		<title>Rchase</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Rchase&amp;diff=2939"/>
		<updated>2018-04-24T19:40:19Z</updated>

		<summary type="html">&lt;p&gt;Rchase: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Member Profile&amp;#039;&amp;#039;&amp;#039;  Exploitee.rs Name: rchase Real Name: Reilly Chae Email: rchase [at] rchase.com Twitter: _rchase_ Area of expertise: Hax0r&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Member Profile&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Exploitee.rs Name: rchase&lt;br /&gt;
Real Name: Reilly Chae&lt;br /&gt;
Email: rchase [at] rchase.com&lt;br /&gt;
Twitter: _rchase_&lt;br /&gt;
Area of expertise: Hax0r&lt;/div&gt;</summary>
		<author><name>Rchase</name></author>
	</entry>
</feed>