Reset password on HikVision cameras and DVRs

On the test, I reset the password on the DVR DS-7204HQHI-SH with the firmware version 3.1.3.
Since to him probably some schoolboy picked up a password, changed it and wrote mucks in the names of the cameras :)

The first step is to download the SADP utility from the official site
https://www.hikvision.com/en/Support/Downloads/Tools

Run the utility, connect the device to the same network as the computer or a direct cable to the computer.
The utility displays the connected device, as well as its serial number, in my case:

DS-7204HQHI-SH0420150505AAWR516895417WCVU

We copy this serial number, removing the model of the device in the beginning, in my case it turned out:

0420150505AAWR516895417WCVU

Open the security key generator, enter this serial number, specify the date that is set on the device and generate the code.

Open SADP again, select the connected device in the list, click on the “Forgot Password” on the right, enter the code, then enter the new password in the “Admin Password” line.
Now you can enter under the admin login and the specified password in the web interface of the device.
If the device was hacked, it is desirable to immediately reset the settings and update the firmware to the latest.

Code generators can be found on the Internet, for example, here are a couple of online generators:
http://hikkvisionpasswordreset.github.io
https://ipcamtalk.com/pages/hikvision-password-reset-tool

Also, the code can be requested from HikVision technical support or the store in which the device was purchased.

See also:
Update firmware on HikVision devices
Reset password in Dahua DVRs

How to configure PPPoE in Mikrotik

To configure the PPPoE connection, open the web interface of the device by opening the link http://192.168.88.1 (its standard ip address) in any browser.
Then in the menu, open the tab “PPP“, push the button “Add” (red plus if via Winbox), choose “PPPoE Client“.
In the window that opens, specify the connection parameters, in the first tab “General” we indicate:

Name: (any word in English, this will be your PPP connection name)
Interfaces: ether1 (specify the WAN interface that looks towards the provider or PPPoE server)

Next, open the tab “Dial Out” and specify:
User: (PPP user name)
Password: (password)
Put a tick “Add Default Route” (if the routes are to be set automatically)
Put a tick “Use Peer DNS

Click “OK“, after which the connection will be configured and the letter “R” which means that the connection was successful.
If the letter does not appear, you can see the logs by clicking on the menu on the left “Log“, by which you can determine the connection error.

OID and MIB list for Arris Cadant C3

I’ll list a few oid below and briefly describe them.
Check the response to oid and mib in linux for example with the following command:

snmpwalk -v 2c -c public 192.168.0.10 .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.6

Connected modems (dcxUsStatsRegComplete) .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.6

Upstream Indexes: .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.8
Network Interface Status .1.3.6.1.2.1.2.2.1.8
Description of network interfaces .1.3.6.1.2.1.2.2.1.2
Network Interface Name .1.3.6.1.2.1.31.1.1.1.1

SignalNoise upstream (docsIfSigQSignalNoise) .1.3.6.1.2.1.10.127.1.1.4.1.5
SignalNoiseSNR upstream (docsIfSigQSignalNoiseSNR) .1.3.6.1.4.1.4115.1.4.3.6.1.3.1.21

Mibs for upstream power-level:
.1.3.6.1.4.1.4115.1.4.3.6.1.3.1.8.11
.1.3.6.1.4.1.4115.1.4.3.6.1.3.1.8.12
.1.3.6.1.4.1.4115.1.4.3.6.1.3.1.8.13
.1.3.6.1.4.1.4115.1.4.3.6.1.3.1.8.14
.1.3.6.1.4.1.4115.1.4.3.6.1.3.1.8.15
.1.3.6.1.4.1.4115.1.4.3.6.1.3.1.8.16

Number of modems on the upstream:
.1.3.6.1.4.1.4998.1.1.20.2.12.1.6.downstreamid.upstreamid

(dcxUsStatsOther) .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.1
(dcxUsStatsRanging) .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.2
(dcxUsStatsRngAborted) .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.3
(dcxUsStatsRngComplete) .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.4
(dcxUsStatsIpComplete) .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.5
(dcxUsStatsAccessDenied) .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.7

(UpstreamNum) .1.3.6.1.2.1.10.127.1.3.11.1.1
(dcxUsStatsAvgUtil) .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.12
(dcxUsStatsAvgContSlots) .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.13
(docsIfSigQUnerroreds) .1.3.6.1.2.1.10.127.1.1.4.1.2
(docsIfSigQCorrecteds) .1.3.6.1.2.1.10.127.1.1.4.1.3
(docsIfSigQUncorrectables) .1.3.6.1.2.1.10.127.1.1.4.1.4
(dcxUsStatsNumActiveUGS) .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.9
(dcxUsStatsAvgUGSLastOneHour) .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.10
(dcxUsStatsMaxUGSLastFiveMins) .1.3.6.1.4.1.4115.1.4.3.1.1.1.1.11

See also:
SNMP OID and MIB for interfaces

Firmware Update for TP-Link TL-WR840N Router

For the test, I will update the TP-Link TL-WR840N V1 with firmware 13xxxx RU.

1) Let’s look at the revision of the router, in my case it’s V1, and it’s for it that we download the archive with the new firmware from the official site:
https://www.tp-link.com/us/download/TL-WR840N.html
In my case, the last firmware for V1 was TL-WR840N_V1_151023_EN. If you download the firmware from an incorrect revision, you can damage the router. Unpack from the downloaded archive firmware file.

2) Open the router settings by typing in the browser address http://192.168.0.1 and enter login – admin, password – admin.

3) In the menu, select “System Tools” – “Firmware Update”, click the “Browse …” button and select the previously unpacked firmware file from the archive. Next, click the “Update” button and wait until the firmware is loaded into the router and it will reboot.

At the time of upgrade, you can not turn off the power of the router.
After updating the firmware, the settings in the router are not reset.