01-08-2024, 06:59 AM
January 2024 update for all the found Zyxel modem keygens. (deleted the previous tables to keep the thread clean)
Keyspace List for WPA on Default Routers
|
01-08-2024, 06:59 AM
January 2024 update for all the found Zyxel modem keygens. (deleted the previous tables to keep the thread clean)
01-10-2024, 10:09 AM
So , how we get password list by these funtions?
01-10-2024, 07:58 PM
05-24-2024, 10:23 AM
Is there any key space list for wpa for fiberhome routers? ( router/ont model example : hg6544c)
Thanks
12-26-2024, 05:53 AM
Have found two 'Eufy' SSIDs, which by OUI lookup are:
04:17:B6 Smart Innovation LLC 10:2C:B1 Smart Innovation LLC Just discovered that the keyspace is ?h?h?h?h?h?h?h?h Also found a few NVRxxxxxxxxxxxx devices: 08:3A:2F Guangzhou Juan Intelligent Tech Joint Stock Co.,Ltd Keyspace appears to be ?d?d?d?d?d?d?d?d Finally, I dug through some Ebay listings for D-Link DIR-605L devices, and collected the PSKs: 2024-12-25 21_41_33-d-link DIR-605L.xlsx - Excel.png (Size: 97.89 KB / Downloads: 4) This has probably already been discovered by others, but it looks like the first 5 characters only consist of a-j, so it seems to be an alpha substitution for 0-9, making the keyspace: -1 abcdefghij -a 3 ?1?1?1?1?1?d?d?d?d?d
12-26-2024, 08:28 PM
The d-link DIR-605L is likely pretty complicated. I managed to reverse the 640L. If you want to see how that's done check out Plums conversion to Python:
https://github.com/PlumLulz/dir_640lpy
12-27-2024, 06:36 AM
(12-26-2024, 05:53 AM)Have Blue Wrote: This has probably already been discovered by others, but it looks like the first 5 characters only consist of a-j, so it seems to be an alpha substitution for 0-9, making the keyspace: -1 abcdefghij -a 3 ?1?1?1?1?1?d?d?d?d?d After looking a little bit closer at your dir-605L data, it looks to be very much in the family of the 640L The 640L takes a hexadecimal hash, and plucks letters from them (0..F) followed by modulus 10. (Hex value % 10) Which means that values 0..5 (and a..f) are almost twice as likely of showing up, versus chars '6789' and 'ghij' and that is reflected by the data you collected. d-link cleverly uses a few variants of the algo for each model, so tracking the exact algo down will be a bit tricky but it might be possible with enough data....
12-27-2024, 02:01 PM
Hi and Merry Christmas!
Here are my dlink- hits: Code: 0001015B7F0C dlink-4A1C yzlgq27544 Sadly, none of these match the dir-640l keygen :( I have 3K+ uncracked dlink hashes, so we can confirm other variations of the algo. Recently a tool for DLink FW image decryption for various devices was released: delink. It's already integrated upstream in binwalk v3. Many dlink FW images for outdated models can be directly downloaded here.
12-27-2024, 08:22 PM
This is getting interesting. Perhaps a worthy foe?
I ran all the variants I could think of from the 640L algo against the 605L and struck out. Some hits, but as you get with enough monkeys and typewriters even with a hash there are enough possibilities. The 605L firmware does not include the algo, but there might be variants in others. Let's see if the d-link engineers left any presents under the binwalk extracts tree....
12-28-2024, 05:24 AM
(12-27-2024, 06:36 AM)drsnooker Wrote: After looking a little bit closer at your dir-605L data, it looks to be very much in the family of the 640L One thing that struck me was the prevalence of the 'b' character versus 'a' which made me wonder if zeroes are for whatever reason much less likely to be generated from whatever the 'seed' is (my assumption being that 'a' equates to '0' and 'b' equates to '1'). I had done a statistical analysis on the data, and 'b' was indeed among the most common characters. |
« Next Oldest | Next Newest »
|