![]() |
5268ac routers - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: User Contributions (https://hashcat.net/forum/forum-25.html) +--- Thread: 5268ac routers (/thread-10483.html) |
RE: 5268ac routers - drsnooker - 10-01-2023 A nice even 1000 passwords for the 5268AC. I think this is a good place to leave it, unless anybody has any more ideas... https://pastebin.com/22ZGhHg4 RE: 5268ac routers - drsnooker - 12-23-2023 Look at what Santa left in my stocking!!!! ![]() Let's crack it open and see if its firmware contains any mysteries.... RE: 5268ac routers - drsnooker - 12-29-2023 This pace edition is straight from the factory! I've got root access over UART. And check out the /usr/bin directory.... factory_set_default_wifi_passwd! *sad trombone* It's just a script to pull the default password from elsewhere, not the algo. Now to find the elsewhere! Code: %factory# ls /usr/bin RE: 5268ac routers - b1tninja - 01-12-2025 (12-06-2021, 02:03 AM)drsnooker Wrote:(11-28-2021, 03:21 AM)calexico Wrote: Looks very promising, terrific work; sorry I'm no help. Curious if you've had any luck reading the filesystem from the NAND? I couldn't find any open source implementation of OpenTDS... so I was going to try and figure it out. I'd like to be able to modify the files, but there seems to be some checksums likely for bad block detection My idea is to unpack a pkgstream and then compare the chunks with the NAND dump and go from there... another was to try and emulate with QEMU RE: 5268ac routers - drsnooker - 01-12-2025 @b1tninja, I eventually got a clip and managed to get the NAND dumped in situ. However, since we know the root password as well as the algo for the password of user: rma (also with root privileges), it was no longer necessary to figure out how to binwalk the NAND dump, as you can just access the modem over UART. RE: 5268ac routers - b1tninja - 01-12-2025 (01-12-2025, 11:37 AM)drsnooker Wrote: @b1tninja, I eventually got a clip and managed to get the NAND dumped in situ. However, since we know the root password as well as the algo for the password of user: rma (also with root privileges), it was no longer necessary to figure out how to binwalk the NAND dump, as you can just access the modem over UART. Unfortunately the newer firmwares seem to prevent downgrade and one of the scripts at startup disables input over the debug port. I did find a compatible connector for that the uart though which is handy: samtec MEC1-108-02-S-D-A. Alright well thanks anyway guess I'm on my own I'll report back here when I figure it out RE: 5268ac routers - drsnooker - 01-12-2025 Perhaps if you purchase a used one of ebay, the FW might not have been upgraded past the point that you can change the firmware to an older one. Or perhaps downgrade to 11.0 first before going for 10.5.3? |