Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Config decryption doesn't work, difficult solution #17

Open
penbob3 opened this issue Jul 28, 2019 · 6 comments
Open

Config decryption doesn't work, difficult solution #17

penbob3 opened this issue Jul 28, 2019 · 6 comments

Comments

@penbob3
Copy link

penbob3 commented Jul 28, 2019

After trying and failing with the decryption method, I've found a different and much more difficult alternative. What you do it solder to the UART headers in the router, then boot and reset. Login with one of the default passwords listed in the readme, then plug the router into the internet. The password will change but you'll still be logged in (This might also be possible via telnet?). Then you can use dumpcfg command to get the whole file, find the password, and base64 decode it.

@penbob3 penbob3 changed the title Config decryption doesn't owrk, difficult solution Config decryption doesn't work, difficult solution Jul 28, 2019
@mattimustang
Copy link
Owner

Thanks for your effort!
Since you have console access are you able to provide a copy of the httpd binary. I gave some instructions here before #12.

With that file I can extract the changed cryptographic key.

@penbob3
Copy link
Author

penbob3 commented Jul 30, 2019

keys.txt
iv.txt
These are the two files I got

@mattimustang
Copy link
Owner

i can't spot any potential keys or IV's in there. Can you upload the httpd binary and I'll take a look? also which modem firmware version are you running?

@penbob3
Copy link
Author

penbob3 commented Jul 30, 2019

httpd
Here's the binary, but github wouldnt let me upload the actual file so I added .gif, just remove it when you download it. I'll check the firmware version now.

@penbob3
Copy link
Author

penbob3 commented Jul 30, 2019

8.382.1_F@ST3864AC_Optus is my version. Also, have you considered the possibility of monitoring outgoing requests to the Optus management and update server and using that to download a full firmware file?

@mattimustang
Copy link
Owner

Thanks. I couldn't find the encrypt/decrypt routines in that binary. You can dump the firmware using the nanddump command.

Set up a netcat listener to receiver the file on the computer you want to dump it to:

nc -l -p 4444 > mtd0

On the modem run:

nanddump /dev/mtd0 | nc 192.168.0.2 4444

repeat for /dev/mtd1, mtd2, mtd3, mtd4, and mtd5 changing the file name to dump it to on the remote computer each time.

zip them up and upload them here or to a file sharing site and post a link.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants