Unpublished WPA key algorithms

JustGuardian

Active member
Feedback: 0 / 0 / 0
Joined
Feb 2, 2022
Messages
72
Reaction score
39
Credits
492
Found another keygen for C-data FD704GW-DAX in /bin/startup

It takes the MD5 of something in nvram (not the MAC, perhaps the serial number??) and does a modified base64 with chars "abcdefghijkmmnppqrstuvwxyzACCDEFGHJJKLMNPPQRSTUVWXYZZ223456799ab" of the MD5 digest resulting in a 20char password. But I cannot seem to find any pictures of it. It's all Russian sites, so I'm using google translate, but this looks to be a pretty rare router. But let me know if you find a C-Data/GPON router that looks to have a wifi password that matches this charset!

View attachment 37754
I wonder how you will extract that "thing" from the nvram. I'm really curious because I seen other routers getting something from the nvram and then using it to generate the key.
 

drsnooker

Active member
Contributor
Feedback: 0 / 0 / 0
Joined
Aug 1, 2020
Messages
316
Reaction score
501
Credits
2,721
Well if I can find a picture, I'd just try some things and see if the correct password pops out.
If not, I have to physically get my hands on a router (or have a local do it for me)
1) try telnet to get shell and pull the NVRAM data
2) no telnet, then UART
3) no UART then use an eprom programmer and a clip to extract the data
4) if the clip doesn't work, then desolder the NVRAM and dump with the programmer.
 

JustGuardian

Active member
Feedback: 0 / 0 / 0
Joined
Feb 2, 2022
Messages
72
Reaction score
39
Credits
492
Well if I can find a picture, I'd just try some things and see if the correct password pops out.
If not, I have to physically get my hands on a router (or have a local do it for me)
1) try telnet to get shell and pull the NVRAM data
2) no telnet, then UART
3) no UART then use an eprom programmer and a clip to extract the data
4) if the clip doesn't work, then desolder the NVRAM and dump with the programmer.
wow (especially the last 2 points) seems very expensive in terms of money and time. What if the "seed" is in the nvram and it is different for every router, can this be considered as secure?
I am talking about the TIM modem that I was inspecting: I found out that the seed for the password is in a eeprom partition and it differs for every devices. But what I am thinking is: how can this seed generate the same password at every "reconfiguration" and how can I extract it. Also, what if I find a pattern in the seed, could this lead to a wordlist generation?
 

drsnooker

Active member
Contributor
Feedback: 0 / 0 / 0
Joined
Aug 1, 2020
Messages
316
Reaction score
501
Credits
2,721
Expensive is relative. I've got a flashcat XPort ($45) and a variety of clips and adapters. Usually you don't know what you need until you take the unit apart, although most units I've cracked open had a TSOP48 NAND chip.
The seed will be different for each router (that's how they get different passwords) but some times the seeds are easy to guess like here where the seed is just the number of miliseconds since Jan1, 1970. Then you can just brute force the seed. Other times the seed is just the MD5 hash of the serial number or the mac. You just don't know until you see what the seed is.
But yes, if you know the pattern of the seed you can generate a wordlist.
Hashcat can run through a word list that is INT_MAX (2.1 billion entries) long in about 10 minutes. So if the seed is an integer, than that's not a problem at all.
 

JustGuardian

Active member
Feedback: 0 / 0 / 0
Joined
Feb 2, 2022
Messages
72
Reaction score
39
Credits
492
Expensive is relative. I've got a flashcat XPort ($45) and a variety of clips and adapters. Usually you don't know what you need until you take the unit apart, although most units I've cracked open had a TSOP48 NAND chip.
The seed will be different for each router (that's how they get different passwords) but some times the seeds are easy to guess like here where the seed is just the number of miliseconds since Jan1, 1970. Then you can just brute force the seed. Other times the seed is just the MD5 hash of the serial number or the mac. You just don't know until you see what the seed is.
But yes, if you know the pattern of the seed you can generate a wordlist.
Hashcat can run through a word list that is INT_MAX (2.1 billion entries) long in about 10 minutes. So if the seed is an integer, than that's not a problem at all.
Thanks for those info, this is really interesting. Those are like reading the bible of the routers lmao, in this field the experience is everything... Thanks
 
Top