-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Config decryption doesn't work, difficult solution #17
Comments
Thanks for your effort! With that file I can extract the changed cryptographic key. |
i can't spot any potential keys or IV's in there. Can you upload the httpd binary and I'll take a look? also which modem firmware version are you running? |
8.382.1_F@ST3864AC_Optus is my version. Also, have you considered the possibility of monitoring outgoing requests to the Optus management and update server and using that to download a full firmware file? |
Thanks. I couldn't find the encrypt/decrypt routines in that binary. You can dump the firmware using the Set up a netcat listener to receiver the file on the computer you want to dump it to:
On the modem run:
repeat for /dev/mtd1, mtd2, mtd3, mtd4, and mtd5 changing the file name to dump it to on the remote computer each time. zip them up and upload them here or to a file sharing site and post a link. |
After trying and failing with the decryption method, I've found a different and much more difficult alternative. What you do it solder to the UART headers in the router, then boot and reset. Login with one of the default passwords listed in the readme, then plug the router into the internet. The password will change but you'll still be logged in (This might also be possible via telnet?). Then you can use dumpcfg command to get the whole file, find the password, and base64 decode it.
The text was updated successfully, but these errors were encountered: