<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[hashcat Forum - User Contributions]]></title>
		<link>https://hashcat.net/forum/</link>
		<description><![CDATA[hashcat Forum - https://hashcat.net/forum]]></description>
		<pubDate>Wed, 29 Apr 2026 04:43:11 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Verizon Fios - wordlists]]></title>
			<link>https://hashcat.net/forum/thread-13493.html</link>
			<pubDate>Mon, 23 Feb 2026 12:17:14 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20197">samer59</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13493.html</guid>
			<description><![CDATA[Hi,<br />
I case anyone is interested. I have the most updated 3 - 7 letter wordlists for Verizon Fios routers. <br />
And 8 - 9 in next post.<br />
Here they are.<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1398" target="_blank" title="">5lista.txt</a> (Size: 21.32 KB / Downloads: 16)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1399" target="_blank" title="">4lista.txt</a> (Size: 28.89 KB / Downloads: 9)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1400" target="_blank" title="">6lista.txt</a> (Size: 23.26 KB / Downloads: 9)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1401" target="_blank" title="">3lista.txt</a> (Size: 7.23 KB / Downloads: 8)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1402" target="_blank" title="">7lista.txt</a> (Size: 7.29 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[Hi,<br />
I case anyone is interested. I have the most updated 3 - 7 letter wordlists for Verizon Fios routers. <br />
And 8 - 9 in next post.<br />
Here they are.<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1398" target="_blank" title="">5lista.txt</a> (Size: 21.32 KB / Downloads: 16)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1399" target="_blank" title="">4lista.txt</a> (Size: 28.89 KB / Downloads: 9)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1400" target="_blank" title="">6lista.txt</a> (Size: 23.26 KB / Downloads: 9)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1401" target="_blank" title="">3lista.txt</a> (Size: 7.23 KB / Downloads: 8)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1402" target="_blank" title="">7lista.txt</a> (Size: 7.29 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[GUI For Hashcat]]></title>
			<link>https://hashcat.net/forum/thread-13454.html</link>
			<pubDate>Thu, 01 Jan 2026 06:15:41 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20693">sky1</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13454.html</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b">Real-time Dashboard:</span> Monitor hashrates, progress, and recovered hashes live via WebSockets.<br />
Remote Access: Securely share your instance over the web via Zrok tunnels to control it remotely.<br />
Security: Supports optional username/password protection.<br />
<span style="font-weight: bold;" class="mycode_b">Hash Extractor:</span> Extracts crackable hashes directly from Archives (7-Zip, etc.), Documents, Wallets, and System files.<br />
Job Queue System: Queue up multiple attacks (Wordlist, Mask, Hybrid, etc.) and let Reactor process them sequentially automatically.<br />
<span style="font-weight: bold;" class="mycode_b">Advanced Insights (PACK):</span> Integrated Password Analysis and Cracking Kit implementation. Analyzes your cracked hashes to generate optimized masks, identify top password patterns, charsets, and entropy data.<br />
Smart Potfile Management:<br />
<span style="font-weight: bold;" class="mycode_b">Pre-Crack Analysis:</span> Check target lists against your potfile before starting an attack to see what is already cracked.<br />
Interactive Terminal: Full pseudo-terminal (PTY) access to the underlying shell for manual overrides or running custom Hashcat commands directly from the GUI.<br />
<span style="font-weight: bold;" class="mycode_b">Multi-Language Support:</span> Fully localized interface available in English and Chinese (中文).<br />
Hardware Monitoring: Real-time GPU temperature and power usage tracking.<br />
Note: Power draw metrics currently support NVIDIA GPUs only via nvidia-smi.<br />
<span style="font-weight: bold;" class="mycode_b">Escrow Integration &amp; Auto-Uploads:</span><br />
Built-in module to submit cracked hashes to remote escrow APIs (hashes.com).<br />
<span style="font-weight: bold;" class="mycode_b">Auto-Upload:</span> Automatically upload recovered hashes when a set threshold is reached (e.g., every 10 hashes). Features smart detection to match running sessions to the correct Hashes.com algorithm ID.<br />
<span style="font-weight: bold;" class="mycode_b">Session History:</span> Tracks all past attacks, their configurations, and success rates for future reference.<br />
<br />
Github: <a href="https://github.com/jjsvs/Hashcat-Reactor" target="_blank" rel="noopener" class="mycode_url">https://github.com/jjsvs/Hashcat-Reactor</a><br />
<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1388" target="_blank" title="">dashboard.png</a> (Size: 377.91 KB / Downloads: 17)
<!-- end: postbit_attachments_attachment --><br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1389" target="_blank" title="">hash_extractor.png</a> (Size: 286.72 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment --><br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1390" target="_blank" title="">remote_access.png</a> (Size: 267 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment --><br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1391" target="_blank" title="">screenshot-36.png</a> (Size: 298.48 KB / Downloads: 5)
<!-- end: postbit_attachments_attachment --><br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1392" target="_blank" title="">screenshot-37.png</a> (Size: 98.83 KB / Downloads: 3)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b">Real-time Dashboard:</span> Monitor hashrates, progress, and recovered hashes live via WebSockets.<br />
Remote Access: Securely share your instance over the web via Zrok tunnels to control it remotely.<br />
Security: Supports optional username/password protection.<br />
<span style="font-weight: bold;" class="mycode_b">Hash Extractor:</span> Extracts crackable hashes directly from Archives (7-Zip, etc.), Documents, Wallets, and System files.<br />
Job Queue System: Queue up multiple attacks (Wordlist, Mask, Hybrid, etc.) and let Reactor process them sequentially automatically.<br />
<span style="font-weight: bold;" class="mycode_b">Advanced Insights (PACK):</span> Integrated Password Analysis and Cracking Kit implementation. Analyzes your cracked hashes to generate optimized masks, identify top password patterns, charsets, and entropy data.<br />
Smart Potfile Management:<br />
<span style="font-weight: bold;" class="mycode_b">Pre-Crack Analysis:</span> Check target lists against your potfile before starting an attack to see what is already cracked.<br />
Interactive Terminal: Full pseudo-terminal (PTY) access to the underlying shell for manual overrides or running custom Hashcat commands directly from the GUI.<br />
<span style="font-weight: bold;" class="mycode_b">Multi-Language Support:</span> Fully localized interface available in English and Chinese (中文).<br />
Hardware Monitoring: Real-time GPU temperature and power usage tracking.<br />
Note: Power draw metrics currently support NVIDIA GPUs only via nvidia-smi.<br />
<span style="font-weight: bold;" class="mycode_b">Escrow Integration &amp; Auto-Uploads:</span><br />
Built-in module to submit cracked hashes to remote escrow APIs (hashes.com).<br />
<span style="font-weight: bold;" class="mycode_b">Auto-Upload:</span> Automatically upload recovered hashes when a set threshold is reached (e.g., every 10 hashes). Features smart detection to match running sessions to the correct Hashes.com algorithm ID.<br />
<span style="font-weight: bold;" class="mycode_b">Session History:</span> Tracks all past attacks, their configurations, and success rates for future reference.<br />
<br />
Github: <a href="https://github.com/jjsvs/Hashcat-Reactor" target="_blank" rel="noopener" class="mycode_url">https://github.com/jjsvs/Hashcat-Reactor</a><br />
<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1388" target="_blank" title="">dashboard.png</a> (Size: 377.91 KB / Downloads: 17)
<!-- end: postbit_attachments_attachment --><br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1389" target="_blank" title="">hash_extractor.png</a> (Size: 286.72 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment --><br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1390" target="_blank" title="">remote_access.png</a> (Size: 267 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment --><br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1391" target="_blank" title="">screenshot-36.png</a> (Size: 298.48 KB / Downloads: 5)
<!-- end: postbit_attachments_attachment --><br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1392" target="_blank" title="">screenshot-37.png</a> (Size: 98.83 KB / Downloads: 3)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[metamask2hashcat update]]></title>
			<link>https://hashcat.net/forum/thread-13410.html</link>
			<pubDate>Mon, 20 Oct 2025 13:42:24 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=10624">Banaanhangwagen</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13410.html</guid>
			<description><![CDATA[I updated the script metamask2hashcat: did some error handling, added a new command to extract the hash from a Chromium-extension and added a new command to inspect the raw content in the rare case that a vault (mobile) is malformed.<br />
<br />
There is a little remark to make: I added the levelDB-parser "plyvel", but it's only compatible with Python 3.12 or lower. Couldn't find another solution for now.<br />
<br />
<br />
So...the updatet script is now compatible with vaults from Firefox, extension-folder from Chromium and persist-root from mobile phones.<br />
<br />
You can find it at my fork: <a href="https://github.com/Banaanhangwagen/hashcat/blob/master/tools/mozilla2hashcat.py" target="_blank" rel="noopener" class="mycode_url">https://github.com/Banaanhangwagen/hashc...hashcat.py</a><br />
<br />
More than happy to get feedback or suggestions to improve it, and maybe PR it to Hashcat-repo...]]></description>
			<content:encoded><![CDATA[I updated the script metamask2hashcat: did some error handling, added a new command to extract the hash from a Chromium-extension and added a new command to inspect the raw content in the rare case that a vault (mobile) is malformed.<br />
<br />
There is a little remark to make: I added the levelDB-parser "plyvel", but it's only compatible with Python 3.12 or lower. Couldn't find another solution for now.<br />
<br />
<br />
So...the updatet script is now compatible with vaults from Firefox, extension-folder from Chromium and persist-root from mobile phones.<br />
<br />
You can find it at my fork: <a href="https://github.com/Banaanhangwagen/hashcat/blob/master/tools/mozilla2hashcat.py" target="_blank" rel="noopener" class="mycode_url">https://github.com/Banaanhangwagen/hashc...hashcat.py</a><br />
<br />
More than happy to get feedback or suggestions to improve it, and maybe PR it to Hashcat-repo...]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Wallpapers]]></title>
			<link>https://hashcat.net/forum/thread-13390.html</link>
			<pubDate>Fri, 26 Sep 2025 06:36:05 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=5384">TheDarkOne</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13390.html</guid>
			<description><![CDATA[Hello everybody,<br />
<br />
based on the Work of the User pragmatic, who posted the Hashcat Logo as an SVG a view Years ago, I have created a simple Wallpaper. The Wallpaper comes in two Screen Ratios, 16:9 and 16:10. The 16:9 Version is 4k and the 16:10 Version is 5k so it should look sharp even on larger Screens with High Resolution.<br />
<br />
I've put the Wallpaper on Github as the Filesize is larger than the Upload Limit of the Board. The Wallpaper can be found here: <a href="https://github.com/benfoerster/hashcat-wallpaper" target="_blank" rel="noopener" class="mycode_url">GitHub Hashcat Wallpaper</a><br />
<br />
Hope, someone finds it usefull.]]></description>
			<content:encoded><![CDATA[Hello everybody,<br />
<br />
based on the Work of the User pragmatic, who posted the Hashcat Logo as an SVG a view Years ago, I have created a simple Wallpaper. The Wallpaper comes in two Screen Ratios, 16:9 and 16:10. The 16:9 Version is 4k and the 16:10 Version is 5k so it should look sharp even on larger Screens with High Resolution.<br />
<br />
I've put the Wallpaper on Github as the Filesize is larger than the Upload Limit of the Board. The Wallpaper can be found here: <a href="https://github.com/benfoerster/hashcat-wallpaper" target="_blank" rel="noopener" class="mycode_url">GitHub Hashcat Wallpaper</a><br />
<br />
Hope, someone finds it usefull.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Hashcat benchmark comparator]]></title>
			<link>https://hashcat.net/forum/thread-13314.html</link>
			<pubDate>Tue, 15 Jul 2025 18:17:02 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20284">whoisroot</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13314.html</guid>
			<description><![CDATA[I recently developed a mini-suite of tools to process and compare hashcat benchmarks. The original intent was comparing the performance between using CUDA directly and using OpenCL.<br />
<br />
The code is available on <a href="https://github.com/whoisroot/hashcat-benchmarking" target="_blank" rel="noopener" class="mycode_url">GitHub</a> if anyone wants to use or review it/laugh at my code. It's written mostly in python, to parse, process and compare the hashcat results, and shell/bash, a single script to generate the benchmarks.<br />
<br />
While doing the tests, I found some interesting diffs between the git version (v6.2.6-1320-g4a6b538b4+) and the release version on the Arch Linux repository (v6.2.6).<br />
<br />
Comparing performance on the CUDA backend of both versions, where difference &gt;50%:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>{<br />
  "old": [<br />
    "LastPass + LastPass sniffed -&gt; 19167.27%",<br />
    "PKZIP (Compressed) -&gt; 374.74%"<br />
  ],<br />
  "new": [<br />
    "AIX {ssha1} -&gt; 103.98%",<br />
    "Cisco-IOS &#36;9&#36; (scrypt) -&gt; 60.05%",<br />
    "PDF 1.4 - 1.6 (Acrobat 5 - 8) -&gt; 57.46%",<br />
    "Blockchain, My Wallet -&gt; 192.90%",<br />
    "DPAPI masterkey file v2 (context 3) -&gt; 90.91%",<br />
    "QNX /etc/shadow (MD5) -&gt; 57.53%",<br />
    "WPA-PMK-PMKID+EAPOL -&gt; 464.19%",<br />
    "Mozilla key3.db -&gt; 287.52%",<br />
    "NetNTLMv1 / NetNTLMv1+ESS (NT) -&gt; 580.83%",<br />
    "NetNTLMv2 (NT) -&gt; 410.81%",<br />
    "Flask Session Cookie (&#36;salt.&#36;salt.&#36;pass) -&gt; 263.46%"<br />
  ]<br />
}</code></div></div><br />
This may be subject to quirks of my GPU (Nvidia GTX 1660), CPU (AMD Ryzen 7 3700X) and temperature fluctuations (the tests were run on my personal desktop). To normalize the data, I ran 5 sequential benchmarks for each hash type, with the "--benchmark-all" flag.<br />
<br />
The full results are in a gist here: <a href="https://gist.github.com/whoisroot/5498a588c44cff88d01999b8bc6646d4" target="_blank" rel="noopener" class="mycode_url">https://gist.github.com/whoisroot/5498a5...b8bc6646d4</a>]]></description>
			<content:encoded><![CDATA[I recently developed a mini-suite of tools to process and compare hashcat benchmarks. The original intent was comparing the performance between using CUDA directly and using OpenCL.<br />
<br />
The code is available on <a href="https://github.com/whoisroot/hashcat-benchmarking" target="_blank" rel="noopener" class="mycode_url">GitHub</a> if anyone wants to use or review it/laugh at my code. It's written mostly in python, to parse, process and compare the hashcat results, and shell/bash, a single script to generate the benchmarks.<br />
<br />
While doing the tests, I found some interesting diffs between the git version (v6.2.6-1320-g4a6b538b4+) and the release version on the Arch Linux repository (v6.2.6).<br />
<br />
Comparing performance on the CUDA backend of both versions, where difference &gt;50%:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>{<br />
  "old": [<br />
    "LastPass + LastPass sniffed -&gt; 19167.27%",<br />
    "PKZIP (Compressed) -&gt; 374.74%"<br />
  ],<br />
  "new": [<br />
    "AIX {ssha1} -&gt; 103.98%",<br />
    "Cisco-IOS &#36;9&#36; (scrypt) -&gt; 60.05%",<br />
    "PDF 1.4 - 1.6 (Acrobat 5 - 8) -&gt; 57.46%",<br />
    "Blockchain, My Wallet -&gt; 192.90%",<br />
    "DPAPI masterkey file v2 (context 3) -&gt; 90.91%",<br />
    "QNX /etc/shadow (MD5) -&gt; 57.53%",<br />
    "WPA-PMK-PMKID+EAPOL -&gt; 464.19%",<br />
    "Mozilla key3.db -&gt; 287.52%",<br />
    "NetNTLMv1 / NetNTLMv1+ESS (NT) -&gt; 580.83%",<br />
    "NetNTLMv2 (NT) -&gt; 410.81%",<br />
    "Flask Session Cookie (&#36;salt.&#36;salt.&#36;pass) -&gt; 263.46%"<br />
  ]<br />
}</code></div></div><br />
This may be subject to quirks of my GPU (Nvidia GTX 1660), CPU (AMD Ryzen 7 3700X) and temperature fluctuations (the tests were run on my personal desktop). To normalize the data, I ran 5 sequential benchmarks for each hash type, with the "--benchmark-all" flag.<br />
<br />
The full results are in a gist here: <a href="https://gist.github.com/whoisroot/5498a588c44cff88d01999b8bc6646d4" target="_blank" rel="noopener" class="mycode_url">https://gist.github.com/whoisroot/5498a5...b8bc6646d4</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Dahua remote authentication]]></title>
			<link>https://hashcat.net/forum/thread-12542.html</link>
			<pubDate>Sat, 05 Apr 2025 07:16:00 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=19869">Ed</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-12542.html</guid>
			<description><![CDATA[Hi, guys.<br />
I have a shopcam DHI-XVR5116HE. There is an application DMSS to manage it and see screenshots and etc .<br />
I have udp packets from app. <br />
Using wireshark I  have found certain interesting string:<br />
<br />
<br />
<span style="color: #00007f;" class="mycode_color">NFPOST /device/3D011F0                /p2p-channel HTTP/1.1</span><br />
<span style="color: #00007f;" class="mycode_color">X-Version: 6.7.15</span><br />
<span style="color: #00007f;" class="mycode_color">x-pcs-request-id: 14fa2865e5ad0e0faca77e9beb79a7b4</span><br />
<span style="color: #00007f;" class="mycode_color">X-ToUType: Client/Dmss_Mac</span><br />
<span style="color: #00007f;" class="mycode_color">CSeq: 2088966071</span><br />
<span style="color: #00007f;" class="mycode_color">Authorization: WSSE profile="UsernameToken"</span><br />
<span style="color: #00007f;" class="mycode_color">X-WSSE: UsernameToken Username="cba1b29e32cb17aa46b8ff9e73c7f40b", PasswordDigest="y70nnRaOAk9Pbc1cz8L8esO9ph8=", Nonce="1552662507", Created="2025-04-04T15:17:40+03:00"</span><br />
<span style="color: #00007f;" class="mycode_color">X-SVersion: 1.1.0</span><br />
<span style="color: #00007f;" class="mycode_color">Content-Type: </span><br />
<span style="color: #00007f;" class="mycode_color">Content-Length: 532</span><br />
<span style="color: #00007f;" class="mycode_color">Content-MD5: 832f1c7f19bd8fe62e423770083c80de</span><br />
<br />
<span style="color: #00007f;" class="mycode_color">NFPOST /device/3D011F0          /relay-channel HTTP/1.1</span><br />
<span style="color: #00007f;" class="mycode_color">X-Version: 6.7.15</span><br />
<span style="color: #00007f;" class="mycode_color">x-pcs-request-id: 14fa2865e5ad0e0faca77e9beb79a7b4</span><br />
<span style="color: #00007f;" class="mycode_color">X-ToUType: Client/Dmss_Mac</span><br />
<span style="color: #00007f;" class="mycode_color">CSeq: -562956295</span><br />
<span style="color: #00007f;" class="mycode_color">Authorization: WSSE profile="UsernameToken"</span><br />
<span style="color: #00007f;" class="mycode_color">X-WSSE: UsernameToken Username="cba1b29e32cb17aa46b8ff9e73c7f40b", PasswordDigest="wg6ud9Lw7o1p/uPhm37jf1Lchv8=", Nonce="-2106309976", Created="2025-04-04T15:17:42+03:00"</span><br />
<span style="color: #00007f;" class="mycode_color">X-SVersion: 1.1.0</span><br />
<span style="color: #00007f;" class="mycode_color">Content-Type: </span><br />
<span style="color: #00007f;" class="mycode_color">Content-Length: 330</span><br />
<span style="color: #00007f;" class="mycode_color">Content-MD5: e2a3b2f84d59e1c7ed8966bd48c7d8de</span><br />
<br />
<br />
<span style="color: #00007f;" class="mycode_color">&lt;body&gt;&lt;ClientId&gt;3FB7F9E6-BE74-4A47-9A95-             :37777&lt;/ClientId&gt;&lt;CreateDate&gt;1743769062&lt;/CreateDate&gt;&lt;DevAuth&gt;QiU5g5MwLhAED8WxIRHM+nykTeS69S5fNcwRDar43oM=&lt;/DevAuth&gt;&lt;Nonce&gt;1437081999&lt;/Nonce&gt;&lt;UserName&gt;fullacs&lt;/UserName&gt;&lt;X-SvrVersion&gt;6.2.0&lt;/X-SvrVersion&gt;&lt;agentAddr&gt;128.14.231.148:46408&lt;/agentAddr&gt;&lt;sVersion&gt;1.1.0&lt;/sVersion&gt;&lt;/body&gt;NFPOST /device/3D011F0PAE00039/relay-channel HTTP/1.1</span><br />
<span style="color: #00007f;" class="mycode_color">X-Version: 6.7.15</span><br />
<span style="color: #00007f;" class="mycode_color">x-pcs-request-id: 14fa2865e5ad0e0faca77e9beb79a7b4</span><br />
<span style="color: #00007f;" class="mycode_color">X-ToUType: Client/Dmss_Mac</span><br />
<span style="color: #00007f;" class="mycode_color">CSeq: -562956295</span><br />
<span style="color: #00007f;" class="mycode_color">Authorization: WSSE profile="UsernameToken"</span><br />
<span style="color: #00007f;" class="mycode_color">X-WSSE: UsernameToken Username="cba1b29e32cb17aa46b8ff9e73c7f40b", PasswordDigest="0NXzm3+vygDq5Tqyj3duHhuPGTM=", Nonce="-1753810627", Created="2025-04 04T15:17:43+03:00"</span><br />
<span style="color: #00007f;" class="mycode_color">X-SVersion: 1.1.0</span><br />
<span style="color: #00007f;" class="mycode_color">Content-Type: </span><br />
<span style="color: #00007f;" class="mycode_color">Content-Length: 330</span><br />
<span style="color: #00007f;" class="mycode_color">Content-MD5: 1d044b86f5a205cbb1a0c76fe408756f</span> <br />
<br />
<br />
I define the way PasswordDigest string created:<br />
<div style="text-align: justify;" class="mycode_align">Password_Digest = Base64 ( SHA-1 ( nonce + created + password ) )<br />
<br />
Can I use hashcat to get a password and in what way?</div>]]></description>
			<content:encoded><![CDATA[Hi, guys.<br />
I have a shopcam DHI-XVR5116HE. There is an application DMSS to manage it and see screenshots and etc .<br />
I have udp packets from app. <br />
Using wireshark I  have found certain interesting string:<br />
<br />
<br />
<span style="color: #00007f;" class="mycode_color">NFPOST /device/3D011F0                /p2p-channel HTTP/1.1</span><br />
<span style="color: #00007f;" class="mycode_color">X-Version: 6.7.15</span><br />
<span style="color: #00007f;" class="mycode_color">x-pcs-request-id: 14fa2865e5ad0e0faca77e9beb79a7b4</span><br />
<span style="color: #00007f;" class="mycode_color">X-ToUType: Client/Dmss_Mac</span><br />
<span style="color: #00007f;" class="mycode_color">CSeq: 2088966071</span><br />
<span style="color: #00007f;" class="mycode_color">Authorization: WSSE profile="UsernameToken"</span><br />
<span style="color: #00007f;" class="mycode_color">X-WSSE: UsernameToken Username="cba1b29e32cb17aa46b8ff9e73c7f40b", PasswordDigest="y70nnRaOAk9Pbc1cz8L8esO9ph8=", Nonce="1552662507", Created="2025-04-04T15:17:40+03:00"</span><br />
<span style="color: #00007f;" class="mycode_color">X-SVersion: 1.1.0</span><br />
<span style="color: #00007f;" class="mycode_color">Content-Type: </span><br />
<span style="color: #00007f;" class="mycode_color">Content-Length: 532</span><br />
<span style="color: #00007f;" class="mycode_color">Content-MD5: 832f1c7f19bd8fe62e423770083c80de</span><br />
<br />
<span style="color: #00007f;" class="mycode_color">NFPOST /device/3D011F0          /relay-channel HTTP/1.1</span><br />
<span style="color: #00007f;" class="mycode_color">X-Version: 6.7.15</span><br />
<span style="color: #00007f;" class="mycode_color">x-pcs-request-id: 14fa2865e5ad0e0faca77e9beb79a7b4</span><br />
<span style="color: #00007f;" class="mycode_color">X-ToUType: Client/Dmss_Mac</span><br />
<span style="color: #00007f;" class="mycode_color">CSeq: -562956295</span><br />
<span style="color: #00007f;" class="mycode_color">Authorization: WSSE profile="UsernameToken"</span><br />
<span style="color: #00007f;" class="mycode_color">X-WSSE: UsernameToken Username="cba1b29e32cb17aa46b8ff9e73c7f40b", PasswordDigest="wg6ud9Lw7o1p/uPhm37jf1Lchv8=", Nonce="-2106309976", Created="2025-04-04T15:17:42+03:00"</span><br />
<span style="color: #00007f;" class="mycode_color">X-SVersion: 1.1.0</span><br />
<span style="color: #00007f;" class="mycode_color">Content-Type: </span><br />
<span style="color: #00007f;" class="mycode_color">Content-Length: 330</span><br />
<span style="color: #00007f;" class="mycode_color">Content-MD5: e2a3b2f84d59e1c7ed8966bd48c7d8de</span><br />
<br />
<br />
<span style="color: #00007f;" class="mycode_color">&lt;body&gt;&lt;ClientId&gt;3FB7F9E6-BE74-4A47-9A95-             :37777&lt;/ClientId&gt;&lt;CreateDate&gt;1743769062&lt;/CreateDate&gt;&lt;DevAuth&gt;QiU5g5MwLhAED8WxIRHM+nykTeS69S5fNcwRDar43oM=&lt;/DevAuth&gt;&lt;Nonce&gt;1437081999&lt;/Nonce&gt;&lt;UserName&gt;fullacs&lt;/UserName&gt;&lt;X-SvrVersion&gt;6.2.0&lt;/X-SvrVersion&gt;&lt;agentAddr&gt;128.14.231.148:46408&lt;/agentAddr&gt;&lt;sVersion&gt;1.1.0&lt;/sVersion&gt;&lt;/body&gt;NFPOST /device/3D011F0PAE00039/relay-channel HTTP/1.1</span><br />
<span style="color: #00007f;" class="mycode_color">X-Version: 6.7.15</span><br />
<span style="color: #00007f;" class="mycode_color">x-pcs-request-id: 14fa2865e5ad0e0faca77e9beb79a7b4</span><br />
<span style="color: #00007f;" class="mycode_color">X-ToUType: Client/Dmss_Mac</span><br />
<span style="color: #00007f;" class="mycode_color">CSeq: -562956295</span><br />
<span style="color: #00007f;" class="mycode_color">Authorization: WSSE profile="UsernameToken"</span><br />
<span style="color: #00007f;" class="mycode_color">X-WSSE: UsernameToken Username="cba1b29e32cb17aa46b8ff9e73c7f40b", PasswordDigest="0NXzm3+vygDq5Tqyj3duHhuPGTM=", Nonce="-1753810627", Created="2025-04 04T15:17:43+03:00"</span><br />
<span style="color: #00007f;" class="mycode_color">X-SVersion: 1.1.0</span><br />
<span style="color: #00007f;" class="mycode_color">Content-Type: </span><br />
<span style="color: #00007f;" class="mycode_color">Content-Length: 330</span><br />
<span style="color: #00007f;" class="mycode_color">Content-MD5: 1d044b86f5a205cbb1a0c76fe408756f</span> <br />
<br />
<br />
I define the way PasswordDigest string created:<br />
<div style="text-align: justify;" class="mycode_align">Password_Digest = Base64 ( SHA-1 ( nonce + created + password ) )<br />
<br />
Can I use hashcat to get a password and in what way?</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Verizon Fios G3100 and E3200 Research]]></title>
			<link>https://hashcat.net/forum/thread-12540.html</link>
			<pubDate>Thu, 03 Apr 2025 16:54:35 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=19860">FiosFiend</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-12540.html</guid>
			<description><![CDATA[I recently discovered how easy it was to crack my Netgear default password.  That thrill led me to turn my attention to my Fios G3100.  However, this has turned out to be a much worthier adversary.  Boredom and a bit of tenacity has led me down a winding path, but here is where I am at so far in my research.<br />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://hashcat.net/forum/attachment.php?aid=1237" loading="lazy"  alt="[Image: attachment.php?aid=1237]" class="mycode_img" /></div>
<br />
The G3100 and E3200 routers are distributed by Verizon.  Per usual, the sticker on the back of the unit has the necessary information.  I wrote a small python script to scrape Ebay and FB listings and collect all of the associated images.  A second script sorts the images using computer vision and OCR to detect the QR code or relevant text.  I then personally process the good images to collect the useful information, whenever possible I use the QR code as it is the most trustworthy data to read.  Thus far, I have collected over 230+ complete records, as well as saving the images for verification.<br />
<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/xls.gif" title="Microsoft Excel 2007 Document" border="0" alt=".xlsx" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1240" target="_blank" title="">FiosG3100andE3200.xlsx</a> (Size: 43.08 KB / Downloads: 12)
<!-- end: postbit_attachments_attachment --> <a href="https://uploadnow.io/f/M9CLGCr" target="_blank" rel="noopener" class="mycode_url"><br />
Link to Ref_Images.zip</a> (this is a temporary free file sharing link, dm me if it expires)<br />
<br />
From this sample we can gain some info on the G3100 key space:<ul class="mycode_list"><li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with 04.A2.22 are the oldest and have 16 character passwords</span><br />
    <span style="font-weight: bold;" class="mycode_b">SSID</span> is Fios-XXXXX where X is any char &lt;a-z&gt;&lt;A-Z&gt;&lt;0-9&gt;   <br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords</span> follow &lt;word&gt;&lt;number&gt;&lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">met8sonata868elm</span>)<br />
    <span style="font-weight: bold;" class="mycode_b">Admin Passwords</span> are 16 characters and follow a &lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">stubble16crowded</span>)<br />
</li>
<li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with B8:F8:53 are mixed and may have 15 or 16 character passwords</span><br />
    <span style="font-weight: bold;" class="mycode_b">SSID</span> is Fios-XXXXX where X is any char &lt;a-z&gt;&lt;A-Z&gt;&lt;0-9&gt; <br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords</span> follow &lt;word&gt;&lt;number&gt;&lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">moat288nit48pug</span>)<br />
    <span style="font-weight: bold;" class="mycode_b">Admin Passwords</span> are 16 characters and follow a &lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">chopper86notably</span>)<br />
</li>
<li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with 3C.BD.C5 are the newest and have 15 character passwords</span><br />
    <span style="font-weight: bold;" class="mycode_b">SSID</span> is Fios-XXXXX where X is any char &lt;a-z&gt;&lt;A-Z&gt;&lt;0-9&gt;<br />
             or Verizon_XXXXXX where X is any char &lt;A-Z&gt;&lt;0-9&gt;     <br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords </span>for “Fios” networks follow &lt;word&gt;&lt;number&gt;&lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">range36vex77toy</span>)<br />
             or “Verizon” networks follow &lt;word&gt;-&lt;word&gt;-&lt;word&gt; with a single digit at the end of one word (ex: <span style="color: #cf2be7;" class="mycode_color">miry9-elm-north</span>)<br />
</li>
<li>    <span style="font-weight: bold;" class="mycode_b">Admin Passwords </span>for “Fios” network are 16 characters and follow a &lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">unusual53smelter</span>)<br />
            or “Verizon” networks are 9 characters that are &lt;A-Z&gt;&lt;0-9&gt; (ex: <span style="color: #cf2be7;" class="mycode_color">Z79KGSX4T</span>)<br />
<span style="font-style: italic;" class="mycode_i">            Note: 0 and 1 are not seen in sample    </span><br />
</li>
</ul>
<br />
From this sample we can gain some info on the E3200 key space:<ul class="mycode_list"><li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with 04.A2.22 are the oldest and have 16 character passwords<br />
</span>    <span style="font-weight: bold;" class="mycode_b">SSID</span> is E3200-XXXXX where X is any char &lt;a-z&gt;&lt;A-Z&gt;&lt;0-9&gt;   <br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords</span> follow &lt;word&gt;&lt;number&gt;&lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">nylon88wit657aye</span>)<br />
    <span style="font-weight: bold;" class="mycode_b">Admin Passwords</span> are 16 characters and follow a &lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">ritual236auction</span>)<br />
</li>
<li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with B8:F8:53 are mixed and may have 15 or 16 character passwords<br />
</span>    <span style="font-weight: bold;" class="mycode_b">SSID</span> is E3200-XXXXX where X is any char &lt;a-z&gt;&lt;A-Z&gt;&lt;0-9&gt;<br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords</span> follow &lt;word&gt;&lt;number&gt;&lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">mach92see36flat</span>)<br />
    <span style="font-weight: bold;" class="mycode_b">Admin Passwords</span> are 16 characters and follow a &lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">seraph497lantern</span>)<br />
</li>
<li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with 3C.BD.C5 have 15 character passwords<br />
</span>    <span style="font-weight: bold;" class="mycode_b">SSID</span> is Verizon_XXXXXX where X is any char &lt;A-Z&gt;&lt;0-9&gt;<br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords</span> follow &lt;word&gt;-&lt;word&gt;-&lt;word&gt; with a single digit at the end of one word (ex: <span style="color: #cf2be7;" class="mycode_color">tenth-ben6-vend</span>)    <br />
    <span style="font-weight: bold;" class="mycode_b">Admin Passwords</span> are are 9 characters that are &lt;A-Z&gt;&lt;0-9&gt; (ex: <span style="color: #cf2be7;" class="mycode_color">3JB94H6CQ</span>)        <br />
<span style="font-style: italic;" class="mycode_i">    Note: 0 and 1 are not seen in sample  </span><br />
</li>
<li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with DC.F5.1B are the newest and have 15 character passwords<br />
</span>    <span style="font-weight: bold;" class="mycode_b">SSID</span> is Verizon_XXXXXX where X is any char &lt;A-Z&gt;&lt;0-9&gt;<br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords</span> follow &lt;word&gt;-&lt;word&gt;-&lt;word&gt; with a single digit at the end of one word (ex: <span style="color: #cf2be7;" class="mycode_color">plush-fast3-con</span>)    <br />
    <span style="font-weight: bold;" class="mycode_b">Admin Passwords</span> are are 9 characters that are &lt;A-Z&gt;&lt;0-9&gt; (ex: <span style="color: #cf2be7;" class="mycode_color">QVB734TKL</span>)           <br />
<span style="font-style: italic;" class="mycode_i">    Note: 0 and 1 are not seen in sample  </span><br />
</li>
</ul>
<br />
From this sample we can gain some other info:<ul class="mycode_list"><li>Password &lt;word&gt; are between 3-7 characters for SSID Password<br />
</li>
<li>Password &lt;number&gt; are between 1-4 digits<br />
</li>
<li>There are 3 HW version (1102, 1103, 1104)<br />
</li>
<li>Serial #’s are 16 digits (except for the most recent E3200 which have 11)<br />
</li>
<li>Shipped firmware ranges from 1.3.5.1 to 3.1.1.16 <br />
</li>
<li>There are the 568 unique words extracted from the passwords:<br />
</li>
</ul>
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>add<br />
aft<br />
ago<br />
aim<br />
air<br />
ait<br />
alp<br />
ape<br />
ark<br />
art<br />
ash<br />
ask<br />
awe<br />
aye<br />
bat<br />
bay<br />
bed<br />
bee<br />
beg<br />
ben<br />
bet<br />
bid<br />
biz<br />
boa<br />
bog<br />
bot<br />
bow<br />
bug<br />
bun<br />
bus<br />
bye<br />
cat<br />
caw<br />
cif<br />
cob<br />
con<br />
cot<br />
cub<br />
cud<br />
cup<br />
cut<br />
dab<br />
dad<br />
dam<br />
daw<br />
day<br />
del<br />
dew<br />
dia<br />
did<br />
dig<br />
dit<br />
doe<br />
dos<br />
due<br />
dun<br />
ear<br />
eeg<br />
ego<br />
eke<br />
elk<br />
elm<br />
end<br />
fad<br />
fat<br />
fax<br />
fay<br />
fed<br />
fee<br />
fen<br />
few<br />
fez<br />
fib<br />
fig<br />
fin<br />
fir<br />
fit<br />
fob<br />
fog<br />
fop<br />
for<br />
fox<br />
fro<br />
gad<br />
gap<br />
gel<br />
gem<br />
gen<br />
gig<br />
gin<br />
gnp<br />
gnu<br />
got<br />
gut<br />
had<br />
han<br />
has<br />
hat<br />
hew<br />
hey<br />
hid<br />
hie<br />
him<br />
hin<br />
hit<br />
hod<br />
hub<br />
hue<br />
hum<br />
ice<br />
icy<br />
jab<br />
jag<br />
jam<br />
jaw<br />
jet<br />
jib<br />
jog<br />
joy<br />
jus<br />
lab<br />
law<br />
lay<br />
let<br />
mad<br />
may<br />
met<br />
mil<br />
mix<br />
mod<br />
mow<br />
mud<br />
mug<br />
mum<br />
nag<br />
naw<br />
new<br />
nib<br />
nip<br />
nit<br />
nod<br />
non<br />
not<br />
now<br />
oak<br />
oar<br />
odd<br />
ode<br />
oil<br />
one<br />
ope<br />
opt<br />
ork<br />
out<br />
owl<br />
pal<br />
paw<br />
pay<br />
pea<br />
pet<br />
pit<br />
pod<br />
pug<br />
pun<br />
pup<br />
put<br />
ram<br />
ran<br />
rap<br />
raw<br />
ray<br />
ree<br />
ret<br />
rid<br />
rna<br />
roe<br />
rug<br />
run<br />
rut<br />
rye<br />
sat<br />
say<br />
see<br />
set<br />
sew<br />
sir<br />
sit<br />
six<br />
sly<br />
sou<br />
sow<br />
soy<br />
spa<br />
sum<br />
sun<br />
sup<br />
tag<br />
tap<br />
tax<br />
tee<br />
too<br />
tot<br />
toy<br />
tun<br />
ush<br />
vex<br />
vie<br />
vim<br />
wad<br />
was<br />
wax<br />
web<br />
wed<br />
why<br />
wig<br />
win<br />
wit<br />
woe<br />
won<br />
woo<br />
wry<br />
yak<br />
yam<br />
yea<br />
yes<br />
yet<br />
yon<br />
you<br />
zap<br />
zoo<br />
abbe<br />
aery<br />
agog<br />
alas<br />
alga<br />
allo<br />
arms<br />
atom<br />
back<br />
bake<br />
beak<br />
been<br />
beep<br />
bits<br />
boar<br />
bolt<br />
bone<br />
book<br />
boss<br />
bred<br />
brew<br />
brow<br />
cafe<br />
cape<br />
cart<br />
cast<br />
cene<br />
cere<br />
cham<br />
char<br />
cloy<br />
copy<br />
crib<br />
cuff<br />
dark<br />
dear<br />
deny<br />
dewy<br />
dial<br />
dine<br />
dint<br />
dock<br />
doff<br />
dory<br />
doth<br />
drub<br />
dump<br />
dust<br />
each<br />
ever<br />
exam<br />
fade<br />
fame<br />
fare<br />
fast<br />
fawn<br />
feet<br />
felt<br />
fine<br />
flat<br />
flaw<br />
flit<br />
form<br />
fund<br />
fuss<br />
gage<br />
gain<br />
gall<br />
gate<br />
gent<br />
golf<br />
grab<br />
gray<br />
grey<br />
grim<br />
hair<br />
hake<br />
halt<br />
hasp<br />
have<br />
hawk<br />
held<br />
hide<br />
high<br />
holm<br />
hone<br />
hoot<br />
hour<br />
huff<br />
hung<br />
ibis<br />
iron<br />
jibe<br />
jill<br />
june<br />
kale<br />
kidd<br />
kirk<br />
knit<br />
knot<br />
lack<br />
lead<br />
lean<br />
lend<br />
lens<br />
less<br />
lump<br />
mach<br />
mama<br />
mass<br />
meat<br />
mica<br />
mint<br />
miry<br />
moat<br />
mood<br />
myth<br />
nail<br />
name<br />
nice<br />
nigh<br />
nite<br />
oboe<br />
oily<br />
ouch<br />
over<br />
paid<br />
pail<br />
pant<br />
pelf<br />
pell<br />
pelt<br />
pert<br />
plan<br />
plot<br />
plus<br />
pool<br />
pram<br />
push<br />
quiz<br />
raze<br />
rill<br />
ripe<br />
roar<br />
rome<br />
roof<br />
rook<br />
ruby<br />
rush<br />
sage<br />
sale<br />
self<br />
shed<br />
sign<br />
sill<br />
skim<br />
slop<br />
slue<br />
slug<br />
soap<br />
solo<br />
spin<br />
stir<br />
swam<br />
swap<br />
tare<br />
tele<br />
tell<br />
than<br />
then<br />
they<br />
tidy<br />
tier<br />
ting<br />
tout<br />
tram<br />
trod<br />
tron<br />
tune<br />
type<br />
upon<br />
vain<br />
vane<br />
vend<br />
vide<br />
vine<br />
wain<br />
wait<br />
wake<br />
wane<br />
want<br />
wash<br />
wavy<br />
what<br />
whom<br />
will<br />
wind<br />
wing<br />
wire<br />
wisp<br />
wood<br />
yard<br />
yeah<br />
yell<br />
yelp<br />
yond<br />
zest<br />
acute<br />
amaze<br />
angel<br />
apace<br />
basic<br />
begot<br />
bough<br />
brush<br />
camel<br />
carry<br />
chase<br />
clean<br />
clump<br />
coach<br />
cocky<br />
combe<br />
comet<br />
coney<br />
could<br />
crate<br />
creak<br />
credo<br />
cress<br />
crock<br />
crone<br />
demur<br />
deter<br />
divan<br />
douse<br />
drily<br />
eater<br />
elope<br />
enact<br />
endow<br />
favor<br />
fifth<br />
fifty<br />
finny<br />
flock<br />
floor<br />
floss<br />
flown<br />
focal<br />
focus<br />
forte<br />
froth<br />
fuzzy<br />
games<br />
gorse<br />
guise<br />
hoary<br />
hobby<br />
hutch<br />
inapt<br />
inner<br />
jewel<br />
mayor<br />
meant<br />
mense<br />
mixed<br />
moose<br />
muddy<br />
mulct<br />
niter<br />
north<br />
nylon<br />
order<br />
papal<br />
pivot<br />
plait<br />
plumy<br />
plush<br />
poser<br />
price<br />
quard<br />
quell<br />
quest<br />
range<br />
rapid<br />
rayon<br />
sales<br />
salon<br />
salty<br />
scend<br />
scope<br />
scour<br />
sense<br />
shack<br />
sixty<br />
smack<br />
snips<br />
snort<br />
spark<br />
spent<br />
steep<br />
stiff<br />
swell<br />
synod<br />
taper<br />
tarry<br />
tempt<br />
tenth<br />
thank<br />
tinge<br />
today<br />
trace<br />
track<br />
tract<br />
trade<br />
trawl<br />
trend<br />
tweet<br />
tyler<br />
vague<br />
verse<br />
vetch<br />
vital<br />
whose<br />
witty<br />
woman<br />
worse<br />
wrist<br />
behove<br />
bethel<br />
german<br />
iodine<br />
pallor<br />
remove<br />
sonata<br />
bloated<br />
sweater</code></div></div><br />
Although there is a lot of useful information collected in the sample, it is still a fairly large key space.  With that in mind I decided to take my first dives into firmware analysis, which of course requires some firmware.  Looking online, I was able to find a single reddit post that linked to g3100 firmware version 3.2.0.15.  With a lot more digging, I was able to find posts with links to firmware for other devices.  Using this information I wrote another script to try to find additional firmware.  Here’s what I've found, many of these are the first time posted online I believe.<br />
<br />
<a href="https://cpe-ems34.verizon.com/firmware/g3100_fw_2.0.0.6.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/g....0.0.6.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/g3100_fw_3.1.1.17.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/g...1.1.17.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/g3100_fw_3.1.1.18.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/g...1.1.18.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/g3100_fw_3.2.0.11.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/g...2.0.11.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.2.0.13.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...2.0.13.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.2.0.14.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...2.0.14.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.2.0.15.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...2.0.15.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.4.0.4_loader.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...loader.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.4.0.6_loader.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...loader.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.4.0.8_loader.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...loader.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.4.0.9_loader.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...loader.bin</a><br />
<br />
All of the links I found online for Verizon G3100, E3200, and CR1000 all used the cpe-ems34 link.  I did find some other routers that were using different servers such as cpe-ems20 and cpe-ems31.  Further investigation lead to this site showing all of the <a href="https://subdomainfinder.c99.nl/scans/2021-01-01/verizon.com" target="_blank" rel="noopener" class="mycode_url">Verizon subdomains</a>, which there are a ton of cpe-ems domains.<br />
<br />
I tried my script with a few such as 31, 33, 43, however nothing new was turned up.<br />
<a href="https://cpe-ems33.verizon.com/firmware/g3100_fw_3.1.1.17.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems33.verizon.com/firmware/g...1.1.17.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/g3100_fw_3.2.0.15.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/g...2.0.15.bin</a><br />
<br />
I tried binwalk on the first firmware I found (3.2.0.15), and while it extracts the file system, none of the files were readable for me.  The entropy graph shows that only a small part is encrypted, so I am a bit confused.  My next step is to try to mount it in a VM Linux since I only have Mac and RPI for testing.<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1238" target="_blank" title="">g3100_fw_3.2.0.15.bin.png</a> (Size: 75.17 KB / Downloads: 3)
<!-- end: postbit_attachments_attachment --><br />
<br />
This is what led me to looking for older firmware, however using binwalk on 2.0.0.6 gives me similar results.  I know that there should be at least 2 more older firmware 1.3.6.27 and 1.5.0.10 but I have not been able to locate them.  <br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1239" target="_blank" title="">g3100_fw_2.0.0.6.bin.png</a> (Size: 79.38 KB / Downloads: 1)
<!-- end: postbit_attachments_attachment --><br />
<br />
The possibility of firmware encryption led me to look at physical access of the device.  After some quick soldering, I connected to the UART.  Unfortunately this did not lead to a shell either, but did provide a bit more information.  Referencing some of the output online, I found someone else who also connected this way and had a longer output (possibly because of older firmware?).<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>BTRM<br />
V1.0<br />
R1.0<br />
L1CD<br />
MMUI<br />
MMU9<br />
DATA<br />
ZBBS<br />
MAIN<br />
OTP?<br />
REF?<br />
REFP<br />
RTF?<br />
RTFP<br />
OTPP<br />
FSBT<br />
NAND<br />
IMG?<br />
IMGL<br />
UHD?<br />
UHDP<br />
RLO?<br />
RLOP<br />
AHD?<br />
ROT?<br />
ROTA<br />
MID?<br />
MIDP<br />
AHDP<br />
SBI?<br />
SBIA<br />
PASS<br />
----<br />
<br />
U-Boot SPL 2019.07 (Oct 31 2023 - 03:52:42 -0400)<br />
Strap register: 0x53008176<br />
Board is FLD secure<br />
&#36;SPL: 5.04L.02@419765 &#36;<br />
nand flash device id 0x98d39126, total size 1024MB<br />
block size 256KB, page size 4096 bytes, spare area 216 bytes<br />
ECC BCH-8 <br />
FFinit done<br />
find magic number 0x75456e76 at address 0x100000<br />
FFinit find magic number 0xcb00cb at address 0x114000<br />
reading blob from 0x114000 offset 0x26c len 608<br />
digest sha256 OK<br />
FFinit find magic number 0x64447233 at address 0x105000<br />
reading blob from 0x105000 offset 0xc len 59888<br />
digest sha256 OK<br />
mcb selector 0x1427 checksum 0x722c322d safe_mode 0<br />
<br />
U-Boot DDR standalone 2019.07 (Jul 25 2021 - 18:43:37 -0700) Build: 5.04L.02@348603<br />
<br />
MemsysInit hpg0_generic_aarch64 3.5.1.1 20171009<br />
DDR3<br />
8267D980 80180000 801A0000 00000000 00000000 0020476E<br />
MCB rev=0x00000501 Ref ID=0x0476E Sub Bld=0x002<br />
Dram Timing 11-11-11<br />
<br />
start of memsys_begin<br />
mc_cfg_init(): Initialize the default values on mc_cfg<br />
init_memc_dram_profile(): Initializing MEMC DRAM profile<br />
---------------------------------------------------------------<br />
MEMC DRAM profile (memc_dram_profile_struct) values:<br />
  dram_type    = DDR3<br />
====================================================<br />
PART values:<br />
  part_speed_grade    = 1600 CL11 <br />
  part_size_Mbits    = 4096 (DRAM size in MegaBits)<br />
  part_row_bits      = 15 (number of row bits)<br />
  part_col_bits      = 10 (number of column bits)<br />
  part_ba_bits        = 3 (number of bank bits)<br />
  part_width_bits    = 16 (DRAM width in bits)<br />
NUMER OF PARTS:<br />
  part_num            = 1 (Number of parts)<br />
TOTAL values:<br />
  total_size_Mbits    = 4096 (DRAM size in MegaBits)<br />
  total_cs_bits      = 0 (number of cs bits, for dual_rank mode)<br />
  total_width_bits    = 16 (DRAM width in bits)<br />
  total_burst_bytes  = 16 (Number of bytes per DRAM access)<br />
  total_max_byte_addr = 0x1fffffff (Maximum/last DRAM byte address)<br />
                        (Number of bits in total_max_byte_addr is 29)<br />
                        (i.e. total_max_byte_addr goes from bit 0 to bit 28)<br />
  ddr_2T_mode        = 0<br />
  ddr_hdp_mode        = 1<br />
  large_page          = 1<br />
  ddr_dual_rank      = 0<br />
  cs_mode            = 0<br />
MEMC timing (memc_dram_timing_cfg_struct) values:<br />
====================================================<br />
  MC_CHN_TIM_TIM1_0 register fields:<br />
    tCwl  = 8<br />
    tRP    = 11<br />
    tCL    = 11<br />
    tRCD  = 11<br />
  MC_CHN_TIM_TIM1_1 register fields:<br />
    tCCD_L = 4<br />
    tCCD  = 4<br />
    tRRD_L = 6<br />
    tRRD  = 6<br />
  MC_CHN_TIM_TIM1_2 register fields:<br />
    tFAW  = 32<br />
    tRTP  = 6<br />
    tRCr  = 39<br />
  MC_CHN_TIM_TIM1_3 register fields:<br />
    tWTR_L = 6<br />
    tWTR  = 6<br />
    tWR_L  = 12<br />
    tWR    = 12<br />
  MC_CHN_TIM_TIM2 register fields:<br />
    tR2R  = 0<br />
    tR2W  = 2<br />
    tW2R  = 2<br />
    tW2W  = 0<br />
    tAL    = 0<br />
    tRFC  = 208<br />
====================================================<br />
%1 SSC enabled<br />
<br />
Poll PHY Status register<br />
PHY Status= 1<br />
Disable Auto-Refresh<br />
[0000000080180200] = 0x00000305<br />
End of memsys_begin<br />
Add/Ctl Alignment<br />
Coarse Adj=0x087 deg, cmd steps=0x0DC<br />
reg 0x801A0090 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A0094 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A0098 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A009C set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00A0 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00A4 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00A8 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00AC set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00B0 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00B4 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00B8 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00BC set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00C0 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00C4 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00C8 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00CC set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00D0 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00D4 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00D8 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00DC set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00E0 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00E4 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00E8 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00EC set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00F0 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00F4 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00F8 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00FC set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A0100 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A0108 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A010C set to VDL 0x054 with Fine Adj=0x01 deg<br />
HP RX TRIM<br />
itrim = 0x0<br />
lstrim = 0x9<br />
<br />
ZQ Cal HP PHY<br />
R in Ohm<br />
P: Finger=0x318 Term=0x71 Drv=0x28<br />
N: Finger=0x2A6 Term=0x71 Drv=0x28<br />
<br />
PLL Ref(Hz)=0x02FAF080 UI STEPS=0x06E<br />
DDR CLK(MHz)=0x31B WL CLK dly(ps)=0x0C8 bitT(ps)=0x274 VDLsize(fs)=0x164D CLK_VDL=0x023<br />
start of memc_init<br />
[0000000080180004] = 0x0110061f<br />
[0000000080180234] = 0x00001101<br />
Enable Auto-Refresh<br />
[0000000080180110] = 0x11100f0e<br />
[0000000080180114] = 0x15141312<br />
[0000000080180118] = 0x19181716<br />
[000000008018011c] = 0x001c1b1a<br />
[0000000080180124] = 0x04000000<br />
[0000000080180128] = 0x08070605<br />
[000000008018012c] = 0x00000a09<br />
[0000000080180134] = 0x000d0c0b<br />
Writing to MC_CHN_CFG_CNFG reg; data=0x00000000<br />
[0000000080180100] = 0x00000000<br />
cfg_memc_timing_ctrl() Called<br />
[0000000080180214] = 0x080b0b0b<br />
[0000000080180218] = 0x04040606<br />
[000000008018021c] = 0x20000627<br />
[0000000080180220] = 0x06060c0c<br />
[0000000080180224] = 0x120000d0<br />
End of memc_init<br />
start of pre_shmoo<br />
[0000000080180004] = 0xc110071f<br />
end of pre_shmoo<br />
<br />
SHMOO 28nm<br />
801A0000 80180800 00000000 00020000 00000000<br />
<br />
Shmoo WL<br />
<br />
One UI Steps : 0x7B<br />
<br />
auto-clk result = 01B (filter=0C steps)<br />
initial CLK shift = 023<br />
final CLK shift  = 01B<br />
<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 S-------------------X------------------------------------------------------------------------------------------------------<br />
01 S-----------X--------------------------------------------------------------------------------------------------------------<br />
<br />
Shmoo RD En<br />
FORCED WR ODT = 0x00001800<br />
DQSN DRIVE PAD CONTROL (from) (to)<br />
B0 00039A91 00079A91<br />
B1 00039A91 00079A91<br />
B0 RISE UI=1 VDL=1B PICK UI=2 VDL=1B<br />
B1 RISE UI=1 VDL=28 PICK UI=2 VDL=28<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 --S-----------------+---+++X+++++++++++++++--------------------------------------------------------------------------------<br />
01 --S-----------------------------+----++-X+++++++++++++++-------------------------------------------------------------------<br />
<br />
Shmoo RD DQ NP<br />
DQS :<br />
B0 VDL=6E ok<br />
B1 VDL=6E ok<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 ---------------------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++-------<br />
01 ---------------+++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++---------<br />
02 ------------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---------<br />
03 ----------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++-----------------<br />
04 --------------+++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++-----------------<br />
05 ------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---------------<br />
06 ------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-------------<br />
07 --------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++--------------------<br />
08 ------------------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---<br />
09 -----------------------++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---<br />
10 -------------------+++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-----<br />
11 --------------------+++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++---<br />
12 -----------------+++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++------<br />
13 ----------------++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++-----<br />
14 --------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-----------<br />
15 ------------------++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++---<br />
<br />
Shmoo RD DQ P<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 ---------------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++------<br />
01 ---------------+++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++-----<br />
02 -------------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++------<br />
03 ---------++++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++-------------<br />
04 --------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++-------------<br />
05 ------------+++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++-----------<br />
06 ------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-------------<br />
07 --------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-----------------<br />
08 ------------------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-<br />
09 -----------------------++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---<br />
10 -------------------+++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-----<br />
11 --------------------+++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++---<br />
12 -----------------+++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-------<br />
13 ---------------++++++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++++---<br />
14 --------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-----------<br />
15 -----------------+++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++---<br />
<br />
Shmoo RD DQ N<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 ------------------+-+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++-------<br />
01 ----------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++---------<br />
02 ------------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---------<br />
03 ---------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++------------------<br />
04 ------------++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++-----------------<br />
05 -----------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++--------------<br />
06 -----------+++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-------------<br />
07 -----++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++--------------------<br />
08 ------------------------++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++--<br />
09 ---------------------++++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++-<br />
10 ------------------+++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++-----<br />
11 ------------------+++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++--<br />
12 ---------------++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++------<br />
13 ----------------++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++-----<br />
14 ------------++++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++----------<br />
15 ------------------++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++---<br />
<br />
RD DQS adjustments :<br />
BL0: Start: 0x6E Final: 0x6E<br />
BL1: Start: 0x6E Final: 0x6E<br />
<br />
Shmoo WR DQ<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 ------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---------------<br />
01 ----------+++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++---------------------<br />
02 ------------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++----------------<br />
03 ---+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++------------------------<br />
04 ---------+++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++-----------------------<br />
05 --------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++--------------------<br />
06 -----------++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++------------------<br />
07 ---+++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++-----------------------------<br />
08 ---------------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++-------------<br />
09 ---------------++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++---------------<br />
10 -----------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++----------------<br />
11 -----------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++-----------------<br />
12 -----------+++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++--------------------<br />
13 -----------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++-----------------<br />
14 ----+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++------------------------<br />
15 ------------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++----------------<br />
<br />
Shmoo WR DM<br />
WR DM<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 -------++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++-----------------------<br />
01 --------++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++------------------<br />
start of memsys_end<br />
[0000000080180004] = 0x8110071f<br />
[0000000080180010] = 0x00000009<br />
end of memsys_end<br />
DDR test done successfully<br />
FFinit find magic number 0x75456e76 at address 0x100000<br />
FFinit find magic number 0x74506c21 at address 0x140000<br />
reading blob from 0x140000 offset 0xc len 163741<br />
digest sha256 OK<br />
<br />
U-Boot TPL 2019.07 (Oct 31 2023 - 03:52:39 -0400)<br />
Board is FLD secure<br />
&#36;TPL: 5.04L.02@419765 &#36;<br />
CPU Clock: 1500MHz<br />
IMAGE is NAND<br />
Trying to boot from NAND<br />
nand flash device id 0x98d39126, total size 1024MB<br />
block size 256KB, page size 4096 bytes, spare area 216 bytes<br />
ECC BCH-8 <br />
image from 2097152 to 315621376<br />
brcmnand_read_buf(): Attempt to read bad nand block 760<br />
brcmnand_read_buf(): Attempt to read bad nand block 762<br />
brcmnand_read_buf(): Attempt to read bad nand block 768<br />
brcmnand_read_buf(): Attempt to read bad nand block 770<br />
brcmnand_read_buf(): Attempt to read bad nand block 772<br />
brcmnand_read_buf(): Attempt to read bad nand block 780<br />
brcmnand_read_buf(): Attempt to read bad nand block 782<br />
RESET STATUS is 0x80000000<br />
SELECTED Image 1 FIT_VOL_ID is 3<br />
brcmnand_read_buf(): Attempt to read bad nand block 760<br />
brcmnand_read_buf(): Attempt to read bad nand block 762<br />
brcmnand_read_buf(): Attempt to read bad nand block 768<br />
brcmnand_read_buf(): Attempt to read bad nand block 770<br />
brcmnand_read_buf(): Attempt to read bad nand block 772<br />
brcmnand_read_buf(): Attempt to read bad nand block 780<br />
brcmnand_read_buf(): Attempt to read bad nand block 782<br />
Found FIT format U-Boot<br />
tpl_load_read: sector 7000000, count 3194, buf 0000000007000000<br />
tpl_load_read: sector 7000000, count 4192, buf 0000000007000000<br />
fit read sector 7000000, sectors=16786, dst=0000000007000000, count=16786, size=0x4192<br />
FIT Header Authentication Successfull!<br />
INFO: Found disabled /trust/anti-rollback node!<br />
INFO: Found /trust/hw_state node in fit<br />
tpl_load_read: sector 7003680, count 8028, buf 0000000000004000<br />
## Checking hash(es) for Image atf ... sha256+ OK<br />
tpl_load_read: sector 700b680, count 27fc80, buf 0000000001000000<br />
## Checking hash(es) for Image uboot ... sha256+ OK<br />
tpl_load_read: sector 76ea1c0, count c5be, buf 000000000127fc80<br />
## Checking hash(es) for Image fdt_VERIZON-G3100 ... sha256+ OK<br />
INFO: Creating //trust<br />
INFO: Creating /trust/antirollback_lvl<br />
INFO: Adding exported item node antirollback_lvl to dtb, size:4<br />
INFO: Creating /trust/brcm_pub_key<br />
INFO: Adding exported item node brcm_pub_key to dtb, size:256<br />
<br />
<br />
U-Boot 2019.07 (Oct 31 2023 - 03:52:45 -0400), Build: 5.04L.02@419765<br />
<br />
Model: VERIZON-G3100<br />
DRAM:  512 MiB<br />
max supported leds 32[32]<br />
Serial LED interface found num shifters 2 [2] serial data polarity low 0<br />
BCA LED Controller initialized<br />
HW led 3 registered<br />
HW led 4 registered<br />
HW led 5 registered<br />
HW led 6 registered<br />
HW led 7 registered<br />
HW led 8 registered<br />
HW led 9 registered<br />
HW led 10 registered<br />
SW led 0 registered<br />
SW led 1 registered<br />
SW led 2 registered<br />
SW led 11 registered<br />
SW led 12 registered<br />
SW led 13 registered<br />
SW led 14 registered<br />
SW led 15 registered<br />
Dump Current setting of SWREGs<br />
1.0D, reg=0x00, val=0xc690<br />
1.0D, reg=0x01, val=0x0d06<br />
1.0D, reg=0x02, val=0xcb12<br />
1.0D, reg=0x03, val=0x5372<br />
1.0D, reg=0x04, val=0x0000<br />
1.0D, reg=0x05, val=0x0702<br />
1.0D, reg=0x06, val=0xb000<br />
1.0D, reg=0x07, val=0x0029<br />
1.0D, reg=0x08, val=0x0c02<br />
1.0D, reg=0x09, val=0x0071<br />
1.8 , reg=0x00, val=0xc690<br />
1.8 , reg=0x01, val=0x0d06<br />
1.8 , reg=0x02, val=0xcb12<br />
1.8 , reg=0x03, val=0x5370<br />
1.8 , reg=0x04, val=0x0000<br />
1.8 , reg=0x05, val=0x0702<br />
1.8 , reg=0x06, val=0xb000<br />
1.8 , reg=0x07, val=0x0029<br />
1.8 , reg=0x08, val=0x0c02<br />
1.8 , reg=0x09, val=0x0071<br />
1.5 , reg=0x00, val=0xc690<br />
1.5 , reg=0x01, val=0x0d06<br />
1.5 , reg=0x02, val=0xcb12<br />
1.5 , reg=0x03, val=0x5370<br />
1.5 , reg=0x04, val=0x0000<br />
1.5 , reg=0x05, val=0x0702<br />
1.5 , reg=0x06, val=0xb000<br />
1.5 , reg=0x07, val=0x0029<br />
1.5 , reg=0x08, val=0x0c02<br />
1.5 , reg=0x09, val=0x0071<br />
1.0A, reg=0x00, val=0xc690<br />
1.0A, reg=0x01, val=0x0d06<br />
1.0A, reg=0x02, val=0xcb12<br />
1.0A, reg=0x03, val=0x5370<br />
1.0A, reg=0x04, val=0x0000<br />
1.0A, reg=0x05, val=0x0702<br />
1.0A, reg=0x06, val=0xb000<br />
1.0A, reg=0x07, val=0x0029<br />
1.0A, reg=0x08, val=0x0c02<br />
1.0A, reg=0x09, val=0x0071<br />
Take PMC out of reset<br />
waiting for PMC finish booting<br />
PMC rev: 3.4.1.427360 running<br />
pmc_init:PMC using DQM mode<br />
Chip ID: BCM68369_B1<br />
Broadcom B53 Dual Core: 1500MHz<br />
RDP: 1400MHz<br />
&#36;Uboot: 5.04L.02@419765 &#36;<br />
WDT:  Started with servicing (80s timeout)<br />
NAND:  1024 MiB<br />
MMC:  sdhci: 0<br />
Loading Environment from BOOT_MAGIC... ENV_BOOT_MAGIC_LOAD<br />
found magic at 100000<br />
good crc<br />
resize from 16384 to 8192<br />
OK<br />
In:    serial0<br />
Out:  serial0<br />
Err:  serial0<br />
Board is FLD secure<br />
INFO: Can't find /trust/fit-aes1 node in boot DTB!<br />
Now we are in UBOOT proper<br />
HTTPD: ready for starting<br />
boot_device is NAND<br />
Net:  Using MAC Address b8:f8:53:0b:1d:01<br />
eth0: switch0<br />
No size specified -&gt; Using max size (7300992)<br />
Read 7300992 bytes from volume bootfs1 to 0000000002000000<br />
FIT Header Authentication Successfull!<br />
Read 4 bytes from volume rootfs1 to 000000001dd40664<br />
## Loading kernel from FIT Image at 02000000 ...<br />
  Using 'conf_lx_VERIZON-G3100' configuration<br />
  Verifying Hash Integrity ... OK<br />
  Trying 'kernel' kernel subimage<br />
    Description:  4.19 kernel<br />
    Type:        Kernel Image<br />
    Compression:  lzma compressed<br />
    Data Start:  0x0228c800<br />
    Data Size:    3461392 Bytes = 3.3 MiB<br />
    Architecture: AArch64<br />
    OS:          Linux<br />
    Load Address: 0x00100000<br />
    Entry Point:  0x00100000<br />
    Hash algo:    sha256<br />
    Hash value:  77e40836ec218fa969f9d2bd572115ed9a7ef008cc75bfec4912354ce78a6349<br />
  Verifying Hash Integrity ... sha256+ OK<br />
## Loading fdt from FIT Image at 02000000 ...<br />
  Using 'conf_lx_VERIZON-G3100' configuration<br />
  Verifying Hash Integrity ... OK<br />
  Trying 'fdt_VERIZON-G3100' fdt subimage<br />
    Description:  dtb<br />
    Type:        Flat Device Tree<br />
    Compression:  uncompressed<br />
    Data Start:  0x026ea1c4<br />
    Data Size:    50618 Bytes = 49.4 KiB<br />
    Architecture: AArch64<br />
    Hash algo:    sha256<br />
    Hash value:  c50470d2e693ebcd7dd68e42cc1de0ace24ccc30766e9c36d08c6b4462fa2e53<br />
  Verifying Hash Integrity ... sha256+ OK<br />
  Booting using the fdt blob at 0x26ea1c4<br />
ARCADYAN: Authenticating vmlinux ...<br />
ARCADYAN: Authenticating vmlinux pass<br />
ARCADYAN: Decrypting kernel image ...<br />
ARCADYAN: Decrypting kernel image done<br />
  Uncompressing Kernel Image ... OK<br />
ERROR: reserving fdt memory region failed (addr=1b400000 size=4c00000)<br />
  Loading Device Tree to 0000000007f73000, end 0000000007fff5b9 ... OK<br />
RSVD: not found enrty for adsl<br />
RSVD: not found enrty for bufmem<br />
RSVD: not found enrty for rnrmem<br />
RSVD: Allocated for rdp1    64MB<br />
RSVD: Allocated for rdp2    8MB<br />
RSVD: Allocated for dhd0    11MB<br />
RSVD: Allocated for dhd1    11MB<br />
RSVD: Allocated for dhd2    11MB<br />
RSVD: Total 0x06c00000 bytes CMA reserved memory @ 0x19400000<br />
appending extra boot args to linux boot command line:<br />
  mtdparts=brcmnand.0:2097152(loader),313524224@2097152(image),8388608@315621376(misc1),1048576@324009984(misc3),709885952@325058560(data),28311552@1034944512(owl),1048576@1063256064(mtdoops),2097152@1064304640(license),2097152@1066401792(certificate),1048576@1068498944(pri<br />
Starting kernel ...<br />
<br />
D%G</code></div></div><br />
My device is currently running firmware 3.4.0.9, which I tried to revert to any previous version.  I found a reference to a “hidden” admin page to update firmware at <a href="https://192.168.1.1/#/firmware_upgrade" target="_blank" rel="noopener" class="mycode_url">https://192.168.1.1/#/firmware_upgrade</a>, but none of the firmware I downloaded would work (I think due to anti rollback).<br />
<br />
So this is where I am currently stuck.  I doubt that the key generation algorithm is on the device.  However, if anyone is able to make sense of the serial output that might help unlock the firmware, I would love to just have a look around for curiosity sake.  I will try to periodically scrape and update the password file, I originally thought it would have more entries by now.<br />
<br />
Next Steps:<ul class="mycode_list"><li>Analyze the data set to try to reduce key space (unused characters, common words, find the wordlist?)<br />
</li>
<li>Collect more complete entries for the dataset<br />
</li>
<li>Try to mount file system (ubi.img) in a proper Linux environment<br />
</li>
<li>Try to find older firmware<br />
</li>
</ul>
<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="JPEG Image" border="0" alt=".jpeg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1237" target="_blank" title="">Backref.jpeg</a> (Size: 50 KB / Downloads: 238)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[I recently discovered how easy it was to crack my Netgear default password.  That thrill led me to turn my attention to my Fios G3100.  However, this has turned out to be a much worthier adversary.  Boredom and a bit of tenacity has led me down a winding path, but here is where I am at so far in my research.<br />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://hashcat.net/forum/attachment.php?aid=1237" loading="lazy"  alt="[Image: attachment.php?aid=1237]" class="mycode_img" /></div>
<br />
The G3100 and E3200 routers are distributed by Verizon.  Per usual, the sticker on the back of the unit has the necessary information.  I wrote a small python script to scrape Ebay and FB listings and collect all of the associated images.  A second script sorts the images using computer vision and OCR to detect the QR code or relevant text.  I then personally process the good images to collect the useful information, whenever possible I use the QR code as it is the most trustworthy data to read.  Thus far, I have collected over 230+ complete records, as well as saving the images for verification.<br />
<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/xls.gif" title="Microsoft Excel 2007 Document" border="0" alt=".xlsx" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1240" target="_blank" title="">FiosG3100andE3200.xlsx</a> (Size: 43.08 KB / Downloads: 12)
<!-- end: postbit_attachments_attachment --> <a href="https://uploadnow.io/f/M9CLGCr" target="_blank" rel="noopener" class="mycode_url"><br />
Link to Ref_Images.zip</a> (this is a temporary free file sharing link, dm me if it expires)<br />
<br />
From this sample we can gain some info on the G3100 key space:<ul class="mycode_list"><li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with 04.A2.22 are the oldest and have 16 character passwords</span><br />
    <span style="font-weight: bold;" class="mycode_b">SSID</span> is Fios-XXXXX where X is any char &lt;a-z&gt;&lt;A-Z&gt;&lt;0-9&gt;   <br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords</span> follow &lt;word&gt;&lt;number&gt;&lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">met8sonata868elm</span>)<br />
    <span style="font-weight: bold;" class="mycode_b">Admin Passwords</span> are 16 characters and follow a &lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">stubble16crowded</span>)<br />
</li>
<li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with B8:F8:53 are mixed and may have 15 or 16 character passwords</span><br />
    <span style="font-weight: bold;" class="mycode_b">SSID</span> is Fios-XXXXX where X is any char &lt;a-z&gt;&lt;A-Z&gt;&lt;0-9&gt; <br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords</span> follow &lt;word&gt;&lt;number&gt;&lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">moat288nit48pug</span>)<br />
    <span style="font-weight: bold;" class="mycode_b">Admin Passwords</span> are 16 characters and follow a &lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">chopper86notably</span>)<br />
</li>
<li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with 3C.BD.C5 are the newest and have 15 character passwords</span><br />
    <span style="font-weight: bold;" class="mycode_b">SSID</span> is Fios-XXXXX where X is any char &lt;a-z&gt;&lt;A-Z&gt;&lt;0-9&gt;<br />
             or Verizon_XXXXXX where X is any char &lt;A-Z&gt;&lt;0-9&gt;     <br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords </span>for “Fios” networks follow &lt;word&gt;&lt;number&gt;&lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">range36vex77toy</span>)<br />
             or “Verizon” networks follow &lt;word&gt;-&lt;word&gt;-&lt;word&gt; with a single digit at the end of one word (ex: <span style="color: #cf2be7;" class="mycode_color">miry9-elm-north</span>)<br />
</li>
<li>    <span style="font-weight: bold;" class="mycode_b">Admin Passwords </span>for “Fios” network are 16 characters and follow a &lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">unusual53smelter</span>)<br />
            or “Verizon” networks are 9 characters that are &lt;A-Z&gt;&lt;0-9&gt; (ex: <span style="color: #cf2be7;" class="mycode_color">Z79KGSX4T</span>)<br />
<span style="font-style: italic;" class="mycode_i">            Note: 0 and 1 are not seen in sample    </span><br />
</li>
</ul>
<br />
From this sample we can gain some info on the E3200 key space:<ul class="mycode_list"><li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with 04.A2.22 are the oldest and have 16 character passwords<br />
</span>    <span style="font-weight: bold;" class="mycode_b">SSID</span> is E3200-XXXXX where X is any char &lt;a-z&gt;&lt;A-Z&gt;&lt;0-9&gt;   <br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords</span> follow &lt;word&gt;&lt;number&gt;&lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">nylon88wit657aye</span>)<br />
    <span style="font-weight: bold;" class="mycode_b">Admin Passwords</span> are 16 characters and follow a &lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">ritual236auction</span>)<br />
</li>
<li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with B8:F8:53 are mixed and may have 15 or 16 character passwords<br />
</span>    <span style="font-weight: bold;" class="mycode_b">SSID</span> is E3200-XXXXX where X is any char &lt;a-z&gt;&lt;A-Z&gt;&lt;0-9&gt;<br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords</span> follow &lt;word&gt;&lt;number&gt;&lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">mach92see36flat</span>)<br />
    <span style="font-weight: bold;" class="mycode_b">Admin Passwords</span> are 16 characters and follow a &lt;word&gt;&lt;number&gt;&lt;word&gt; format (ex: <span style="color: #cf2be7;" class="mycode_color">seraph497lantern</span>)<br />
</li>
<li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with 3C.BD.C5 have 15 character passwords<br />
</span>    <span style="font-weight: bold;" class="mycode_b">SSID</span> is Verizon_XXXXXX where X is any char &lt;A-Z&gt;&lt;0-9&gt;<br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords</span> follow &lt;word&gt;-&lt;word&gt;-&lt;word&gt; with a single digit at the end of one word (ex: <span style="color: #cf2be7;" class="mycode_color">tenth-ben6-vend</span>)    <br />
    <span style="font-weight: bold;" class="mycode_b">Admin Passwords</span> are are 9 characters that are &lt;A-Z&gt;&lt;0-9&gt; (ex: <span style="color: #cf2be7;" class="mycode_color">3JB94H6CQ</span>)        <br />
<span style="font-style: italic;" class="mycode_i">    Note: 0 and 1 are not seen in sample  </span><br />
</li>
<li><span style="color: #e82a1f;" class="mycode_color">MAC address starting with DC.F5.1B are the newest and have 15 character passwords<br />
</span>    <span style="font-weight: bold;" class="mycode_b">SSID</span> is Verizon_XXXXXX where X is any char &lt;A-Z&gt;&lt;0-9&gt;<br />
    <span style="font-weight: bold;" class="mycode_b">SSID Passwords</span> follow &lt;word&gt;-&lt;word&gt;-&lt;word&gt; with a single digit at the end of one word (ex: <span style="color: #cf2be7;" class="mycode_color">plush-fast3-con</span>)    <br />
    <span style="font-weight: bold;" class="mycode_b">Admin Passwords</span> are are 9 characters that are &lt;A-Z&gt;&lt;0-9&gt; (ex: <span style="color: #cf2be7;" class="mycode_color">QVB734TKL</span>)           <br />
<span style="font-style: italic;" class="mycode_i">    Note: 0 and 1 are not seen in sample  </span><br />
</li>
</ul>
<br />
From this sample we can gain some other info:<ul class="mycode_list"><li>Password &lt;word&gt; are between 3-7 characters for SSID Password<br />
</li>
<li>Password &lt;number&gt; are between 1-4 digits<br />
</li>
<li>There are 3 HW version (1102, 1103, 1104)<br />
</li>
<li>Serial #’s are 16 digits (except for the most recent E3200 which have 11)<br />
</li>
<li>Shipped firmware ranges from 1.3.5.1 to 3.1.1.16 <br />
</li>
<li>There are the 568 unique words extracted from the passwords:<br />
</li>
</ul>
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>add<br />
aft<br />
ago<br />
aim<br />
air<br />
ait<br />
alp<br />
ape<br />
ark<br />
art<br />
ash<br />
ask<br />
awe<br />
aye<br />
bat<br />
bay<br />
bed<br />
bee<br />
beg<br />
ben<br />
bet<br />
bid<br />
biz<br />
boa<br />
bog<br />
bot<br />
bow<br />
bug<br />
bun<br />
bus<br />
bye<br />
cat<br />
caw<br />
cif<br />
cob<br />
con<br />
cot<br />
cub<br />
cud<br />
cup<br />
cut<br />
dab<br />
dad<br />
dam<br />
daw<br />
day<br />
del<br />
dew<br />
dia<br />
did<br />
dig<br />
dit<br />
doe<br />
dos<br />
due<br />
dun<br />
ear<br />
eeg<br />
ego<br />
eke<br />
elk<br />
elm<br />
end<br />
fad<br />
fat<br />
fax<br />
fay<br />
fed<br />
fee<br />
fen<br />
few<br />
fez<br />
fib<br />
fig<br />
fin<br />
fir<br />
fit<br />
fob<br />
fog<br />
fop<br />
for<br />
fox<br />
fro<br />
gad<br />
gap<br />
gel<br />
gem<br />
gen<br />
gig<br />
gin<br />
gnp<br />
gnu<br />
got<br />
gut<br />
had<br />
han<br />
has<br />
hat<br />
hew<br />
hey<br />
hid<br />
hie<br />
him<br />
hin<br />
hit<br />
hod<br />
hub<br />
hue<br />
hum<br />
ice<br />
icy<br />
jab<br />
jag<br />
jam<br />
jaw<br />
jet<br />
jib<br />
jog<br />
joy<br />
jus<br />
lab<br />
law<br />
lay<br />
let<br />
mad<br />
may<br />
met<br />
mil<br />
mix<br />
mod<br />
mow<br />
mud<br />
mug<br />
mum<br />
nag<br />
naw<br />
new<br />
nib<br />
nip<br />
nit<br />
nod<br />
non<br />
not<br />
now<br />
oak<br />
oar<br />
odd<br />
ode<br />
oil<br />
one<br />
ope<br />
opt<br />
ork<br />
out<br />
owl<br />
pal<br />
paw<br />
pay<br />
pea<br />
pet<br />
pit<br />
pod<br />
pug<br />
pun<br />
pup<br />
put<br />
ram<br />
ran<br />
rap<br />
raw<br />
ray<br />
ree<br />
ret<br />
rid<br />
rna<br />
roe<br />
rug<br />
run<br />
rut<br />
rye<br />
sat<br />
say<br />
see<br />
set<br />
sew<br />
sir<br />
sit<br />
six<br />
sly<br />
sou<br />
sow<br />
soy<br />
spa<br />
sum<br />
sun<br />
sup<br />
tag<br />
tap<br />
tax<br />
tee<br />
too<br />
tot<br />
toy<br />
tun<br />
ush<br />
vex<br />
vie<br />
vim<br />
wad<br />
was<br />
wax<br />
web<br />
wed<br />
why<br />
wig<br />
win<br />
wit<br />
woe<br />
won<br />
woo<br />
wry<br />
yak<br />
yam<br />
yea<br />
yes<br />
yet<br />
yon<br />
you<br />
zap<br />
zoo<br />
abbe<br />
aery<br />
agog<br />
alas<br />
alga<br />
allo<br />
arms<br />
atom<br />
back<br />
bake<br />
beak<br />
been<br />
beep<br />
bits<br />
boar<br />
bolt<br />
bone<br />
book<br />
boss<br />
bred<br />
brew<br />
brow<br />
cafe<br />
cape<br />
cart<br />
cast<br />
cene<br />
cere<br />
cham<br />
char<br />
cloy<br />
copy<br />
crib<br />
cuff<br />
dark<br />
dear<br />
deny<br />
dewy<br />
dial<br />
dine<br />
dint<br />
dock<br />
doff<br />
dory<br />
doth<br />
drub<br />
dump<br />
dust<br />
each<br />
ever<br />
exam<br />
fade<br />
fame<br />
fare<br />
fast<br />
fawn<br />
feet<br />
felt<br />
fine<br />
flat<br />
flaw<br />
flit<br />
form<br />
fund<br />
fuss<br />
gage<br />
gain<br />
gall<br />
gate<br />
gent<br />
golf<br />
grab<br />
gray<br />
grey<br />
grim<br />
hair<br />
hake<br />
halt<br />
hasp<br />
have<br />
hawk<br />
held<br />
hide<br />
high<br />
holm<br />
hone<br />
hoot<br />
hour<br />
huff<br />
hung<br />
ibis<br />
iron<br />
jibe<br />
jill<br />
june<br />
kale<br />
kidd<br />
kirk<br />
knit<br />
knot<br />
lack<br />
lead<br />
lean<br />
lend<br />
lens<br />
less<br />
lump<br />
mach<br />
mama<br />
mass<br />
meat<br />
mica<br />
mint<br />
miry<br />
moat<br />
mood<br />
myth<br />
nail<br />
name<br />
nice<br />
nigh<br />
nite<br />
oboe<br />
oily<br />
ouch<br />
over<br />
paid<br />
pail<br />
pant<br />
pelf<br />
pell<br />
pelt<br />
pert<br />
plan<br />
plot<br />
plus<br />
pool<br />
pram<br />
push<br />
quiz<br />
raze<br />
rill<br />
ripe<br />
roar<br />
rome<br />
roof<br />
rook<br />
ruby<br />
rush<br />
sage<br />
sale<br />
self<br />
shed<br />
sign<br />
sill<br />
skim<br />
slop<br />
slue<br />
slug<br />
soap<br />
solo<br />
spin<br />
stir<br />
swam<br />
swap<br />
tare<br />
tele<br />
tell<br />
than<br />
then<br />
they<br />
tidy<br />
tier<br />
ting<br />
tout<br />
tram<br />
trod<br />
tron<br />
tune<br />
type<br />
upon<br />
vain<br />
vane<br />
vend<br />
vide<br />
vine<br />
wain<br />
wait<br />
wake<br />
wane<br />
want<br />
wash<br />
wavy<br />
what<br />
whom<br />
will<br />
wind<br />
wing<br />
wire<br />
wisp<br />
wood<br />
yard<br />
yeah<br />
yell<br />
yelp<br />
yond<br />
zest<br />
acute<br />
amaze<br />
angel<br />
apace<br />
basic<br />
begot<br />
bough<br />
brush<br />
camel<br />
carry<br />
chase<br />
clean<br />
clump<br />
coach<br />
cocky<br />
combe<br />
comet<br />
coney<br />
could<br />
crate<br />
creak<br />
credo<br />
cress<br />
crock<br />
crone<br />
demur<br />
deter<br />
divan<br />
douse<br />
drily<br />
eater<br />
elope<br />
enact<br />
endow<br />
favor<br />
fifth<br />
fifty<br />
finny<br />
flock<br />
floor<br />
floss<br />
flown<br />
focal<br />
focus<br />
forte<br />
froth<br />
fuzzy<br />
games<br />
gorse<br />
guise<br />
hoary<br />
hobby<br />
hutch<br />
inapt<br />
inner<br />
jewel<br />
mayor<br />
meant<br />
mense<br />
mixed<br />
moose<br />
muddy<br />
mulct<br />
niter<br />
north<br />
nylon<br />
order<br />
papal<br />
pivot<br />
plait<br />
plumy<br />
plush<br />
poser<br />
price<br />
quard<br />
quell<br />
quest<br />
range<br />
rapid<br />
rayon<br />
sales<br />
salon<br />
salty<br />
scend<br />
scope<br />
scour<br />
sense<br />
shack<br />
sixty<br />
smack<br />
snips<br />
snort<br />
spark<br />
spent<br />
steep<br />
stiff<br />
swell<br />
synod<br />
taper<br />
tarry<br />
tempt<br />
tenth<br />
thank<br />
tinge<br />
today<br />
trace<br />
track<br />
tract<br />
trade<br />
trawl<br />
trend<br />
tweet<br />
tyler<br />
vague<br />
verse<br />
vetch<br />
vital<br />
whose<br />
witty<br />
woman<br />
worse<br />
wrist<br />
behove<br />
bethel<br />
german<br />
iodine<br />
pallor<br />
remove<br />
sonata<br />
bloated<br />
sweater</code></div></div><br />
Although there is a lot of useful information collected in the sample, it is still a fairly large key space.  With that in mind I decided to take my first dives into firmware analysis, which of course requires some firmware.  Looking online, I was able to find a single reddit post that linked to g3100 firmware version 3.2.0.15.  With a lot more digging, I was able to find posts with links to firmware for other devices.  Using this information I wrote another script to try to find additional firmware.  Here’s what I've found, many of these are the first time posted online I believe.<br />
<br />
<a href="https://cpe-ems34.verizon.com/firmware/g3100_fw_2.0.0.6.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/g....0.0.6.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/g3100_fw_3.1.1.17.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/g...1.1.17.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/g3100_fw_3.1.1.18.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/g...1.1.18.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/g3100_fw_3.2.0.11.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/g...2.0.11.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.2.0.13.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...2.0.13.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.2.0.14.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...2.0.14.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.2.0.15.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...2.0.15.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.4.0.4_loader.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...loader.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.4.0.6_loader.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...loader.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.4.0.8_loader.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...loader.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/BHRx/g3100_fw_3.4.0.9_loader.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/B...loader.bin</a><br />
<br />
All of the links I found online for Verizon G3100, E3200, and CR1000 all used the cpe-ems34 link.  I did find some other routers that were using different servers such as cpe-ems20 and cpe-ems31.  Further investigation lead to this site showing all of the <a href="https://subdomainfinder.c99.nl/scans/2021-01-01/verizon.com" target="_blank" rel="noopener" class="mycode_url">Verizon subdomains</a>, which there are a ton of cpe-ems domains.<br />
<br />
I tried my script with a few such as 31, 33, 43, however nothing new was turned up.<br />
<a href="https://cpe-ems33.verizon.com/firmware/g3100_fw_3.1.1.17.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems33.verizon.com/firmware/g...1.1.17.bin</a><br />
<a href="https://cpe-ems34.verizon.com/firmware/g3100_fw_3.2.0.15.bin" target="_blank" rel="noopener" class="mycode_url">https://cpe-ems34.verizon.com/firmware/g...2.0.15.bin</a><br />
<br />
I tried binwalk on the first firmware I found (3.2.0.15), and while it extracts the file system, none of the files were readable for me.  The entropy graph shows that only a small part is encrypted, so I am a bit confused.  My next step is to try to mount it in a VM Linux since I only have Mac and RPI for testing.<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1238" target="_blank" title="">g3100_fw_3.2.0.15.bin.png</a> (Size: 75.17 KB / Downloads: 3)
<!-- end: postbit_attachments_attachment --><br />
<br />
This is what led me to looking for older firmware, however using binwalk on 2.0.0.6 gives me similar results.  I know that there should be at least 2 more older firmware 1.3.6.27 and 1.5.0.10 but I have not been able to locate them.  <br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1239" target="_blank" title="">g3100_fw_2.0.0.6.bin.png</a> (Size: 79.38 KB / Downloads: 1)
<!-- end: postbit_attachments_attachment --><br />
<br />
The possibility of firmware encryption led me to look at physical access of the device.  After some quick soldering, I connected to the UART.  Unfortunately this did not lead to a shell either, but did provide a bit more information.  Referencing some of the output online, I found someone else who also connected this way and had a longer output (possibly because of older firmware?).<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>BTRM<br />
V1.0<br />
R1.0<br />
L1CD<br />
MMUI<br />
MMU9<br />
DATA<br />
ZBBS<br />
MAIN<br />
OTP?<br />
REF?<br />
REFP<br />
RTF?<br />
RTFP<br />
OTPP<br />
FSBT<br />
NAND<br />
IMG?<br />
IMGL<br />
UHD?<br />
UHDP<br />
RLO?<br />
RLOP<br />
AHD?<br />
ROT?<br />
ROTA<br />
MID?<br />
MIDP<br />
AHDP<br />
SBI?<br />
SBIA<br />
PASS<br />
----<br />
<br />
U-Boot SPL 2019.07 (Oct 31 2023 - 03:52:42 -0400)<br />
Strap register: 0x53008176<br />
Board is FLD secure<br />
&#36;SPL: 5.04L.02@419765 &#36;<br />
nand flash device id 0x98d39126, total size 1024MB<br />
block size 256KB, page size 4096 bytes, spare area 216 bytes<br />
ECC BCH-8 <br />
FFinit done<br />
find magic number 0x75456e76 at address 0x100000<br />
FFinit find magic number 0xcb00cb at address 0x114000<br />
reading blob from 0x114000 offset 0x26c len 608<br />
digest sha256 OK<br />
FFinit find magic number 0x64447233 at address 0x105000<br />
reading blob from 0x105000 offset 0xc len 59888<br />
digest sha256 OK<br />
mcb selector 0x1427 checksum 0x722c322d safe_mode 0<br />
<br />
U-Boot DDR standalone 2019.07 (Jul 25 2021 - 18:43:37 -0700) Build: 5.04L.02@348603<br />
<br />
MemsysInit hpg0_generic_aarch64 3.5.1.1 20171009<br />
DDR3<br />
8267D980 80180000 801A0000 00000000 00000000 0020476E<br />
MCB rev=0x00000501 Ref ID=0x0476E Sub Bld=0x002<br />
Dram Timing 11-11-11<br />
<br />
start of memsys_begin<br />
mc_cfg_init(): Initialize the default values on mc_cfg<br />
init_memc_dram_profile(): Initializing MEMC DRAM profile<br />
---------------------------------------------------------------<br />
MEMC DRAM profile (memc_dram_profile_struct) values:<br />
  dram_type    = DDR3<br />
====================================================<br />
PART values:<br />
  part_speed_grade    = 1600 CL11 <br />
  part_size_Mbits    = 4096 (DRAM size in MegaBits)<br />
  part_row_bits      = 15 (number of row bits)<br />
  part_col_bits      = 10 (number of column bits)<br />
  part_ba_bits        = 3 (number of bank bits)<br />
  part_width_bits    = 16 (DRAM width in bits)<br />
NUMER OF PARTS:<br />
  part_num            = 1 (Number of parts)<br />
TOTAL values:<br />
  total_size_Mbits    = 4096 (DRAM size in MegaBits)<br />
  total_cs_bits      = 0 (number of cs bits, for dual_rank mode)<br />
  total_width_bits    = 16 (DRAM width in bits)<br />
  total_burst_bytes  = 16 (Number of bytes per DRAM access)<br />
  total_max_byte_addr = 0x1fffffff (Maximum/last DRAM byte address)<br />
                        (Number of bits in total_max_byte_addr is 29)<br />
                        (i.e. total_max_byte_addr goes from bit 0 to bit 28)<br />
  ddr_2T_mode        = 0<br />
  ddr_hdp_mode        = 1<br />
  large_page          = 1<br />
  ddr_dual_rank      = 0<br />
  cs_mode            = 0<br />
MEMC timing (memc_dram_timing_cfg_struct) values:<br />
====================================================<br />
  MC_CHN_TIM_TIM1_0 register fields:<br />
    tCwl  = 8<br />
    tRP    = 11<br />
    tCL    = 11<br />
    tRCD  = 11<br />
  MC_CHN_TIM_TIM1_1 register fields:<br />
    tCCD_L = 4<br />
    tCCD  = 4<br />
    tRRD_L = 6<br />
    tRRD  = 6<br />
  MC_CHN_TIM_TIM1_2 register fields:<br />
    tFAW  = 32<br />
    tRTP  = 6<br />
    tRCr  = 39<br />
  MC_CHN_TIM_TIM1_3 register fields:<br />
    tWTR_L = 6<br />
    tWTR  = 6<br />
    tWR_L  = 12<br />
    tWR    = 12<br />
  MC_CHN_TIM_TIM2 register fields:<br />
    tR2R  = 0<br />
    tR2W  = 2<br />
    tW2R  = 2<br />
    tW2W  = 0<br />
    tAL    = 0<br />
    tRFC  = 208<br />
====================================================<br />
%1 SSC enabled<br />
<br />
Poll PHY Status register<br />
PHY Status= 1<br />
Disable Auto-Refresh<br />
[0000000080180200] = 0x00000305<br />
End of memsys_begin<br />
Add/Ctl Alignment<br />
Coarse Adj=0x087 deg, cmd steps=0x0DC<br />
reg 0x801A0090 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A0094 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A0098 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A009C set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00A0 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00A4 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00A8 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00AC set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00B0 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00B4 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00B8 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00BC set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00C0 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00C4 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00C8 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00CC set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00D0 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00D4 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00D8 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00DC set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00E0 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00E4 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00E8 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00EC set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00F0 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00F4 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00F8 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A00FC set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A0100 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A0108 set to VDL 0x054 with Fine Adj=0x01 deg<br />
reg 0x801A010C set to VDL 0x054 with Fine Adj=0x01 deg<br />
HP RX TRIM<br />
itrim = 0x0<br />
lstrim = 0x9<br />
<br />
ZQ Cal HP PHY<br />
R in Ohm<br />
P: Finger=0x318 Term=0x71 Drv=0x28<br />
N: Finger=0x2A6 Term=0x71 Drv=0x28<br />
<br />
PLL Ref(Hz)=0x02FAF080 UI STEPS=0x06E<br />
DDR CLK(MHz)=0x31B WL CLK dly(ps)=0x0C8 bitT(ps)=0x274 VDLsize(fs)=0x164D CLK_VDL=0x023<br />
start of memc_init<br />
[0000000080180004] = 0x0110061f<br />
[0000000080180234] = 0x00001101<br />
Enable Auto-Refresh<br />
[0000000080180110] = 0x11100f0e<br />
[0000000080180114] = 0x15141312<br />
[0000000080180118] = 0x19181716<br />
[000000008018011c] = 0x001c1b1a<br />
[0000000080180124] = 0x04000000<br />
[0000000080180128] = 0x08070605<br />
[000000008018012c] = 0x00000a09<br />
[0000000080180134] = 0x000d0c0b<br />
Writing to MC_CHN_CFG_CNFG reg; data=0x00000000<br />
[0000000080180100] = 0x00000000<br />
cfg_memc_timing_ctrl() Called<br />
[0000000080180214] = 0x080b0b0b<br />
[0000000080180218] = 0x04040606<br />
[000000008018021c] = 0x20000627<br />
[0000000080180220] = 0x06060c0c<br />
[0000000080180224] = 0x120000d0<br />
End of memc_init<br />
start of pre_shmoo<br />
[0000000080180004] = 0xc110071f<br />
end of pre_shmoo<br />
<br />
SHMOO 28nm<br />
801A0000 80180800 00000000 00020000 00000000<br />
<br />
Shmoo WL<br />
<br />
One UI Steps : 0x7B<br />
<br />
auto-clk result = 01B (filter=0C steps)<br />
initial CLK shift = 023<br />
final CLK shift  = 01B<br />
<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 S-------------------X------------------------------------------------------------------------------------------------------<br />
01 S-----------X--------------------------------------------------------------------------------------------------------------<br />
<br />
Shmoo RD En<br />
FORCED WR ODT = 0x00001800<br />
DQSN DRIVE PAD CONTROL (from) (to)<br />
B0 00039A91 00079A91<br />
B1 00039A91 00079A91<br />
B0 RISE UI=1 VDL=1B PICK UI=2 VDL=1B<br />
B1 RISE UI=1 VDL=28 PICK UI=2 VDL=28<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 --S-----------------+---+++X+++++++++++++++--------------------------------------------------------------------------------<br />
01 --S-----------------------------+----++-X+++++++++++++++-------------------------------------------------------------------<br />
<br />
Shmoo RD DQ NP<br />
DQS :<br />
B0 VDL=6E ok<br />
B1 VDL=6E ok<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 ---------------------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++-------<br />
01 ---------------+++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++---------<br />
02 ------------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---------<br />
03 ----------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++-----------------<br />
04 --------------+++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++-----------------<br />
05 ------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---------------<br />
06 ------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-------------<br />
07 --------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++--------------------<br />
08 ------------------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---<br />
09 -----------------------++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---<br />
10 -------------------+++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-----<br />
11 --------------------+++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++---<br />
12 -----------------+++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++------<br />
13 ----------------++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++-----<br />
14 --------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-----------<br />
15 ------------------++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++---<br />
<br />
Shmoo RD DQ P<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 ---------------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++------<br />
01 ---------------+++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++-----<br />
02 -------------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++------<br />
03 ---------++++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++-------------<br />
04 --------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++-------------<br />
05 ------------+++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++-----------<br />
06 ------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-------------<br />
07 --------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-----------------<br />
08 ------------------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-<br />
09 -----------------------++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---<br />
10 -------------------+++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-----<br />
11 --------------------+++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++---<br />
12 -----------------+++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-------<br />
13 ---------------++++++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++++---<br />
14 --------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-----------<br />
15 -----------------+++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++---<br />
<br />
Shmoo RD DQ N<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 ------------------+-+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++-------<br />
01 ----------------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++---------<br />
02 ------------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---------<br />
03 ---------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++------------------<br />
04 ------------++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++-----------------<br />
05 -----------++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++--------------<br />
06 -----------+++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++-------------<br />
07 -----++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++--------------------<br />
08 ------------------------++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++--<br />
09 ---------------------++++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++-<br />
10 ------------------+++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++-----<br />
11 ------------------+++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++--<br />
12 ---------------++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++------<br />
13 ----------------++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++-----<br />
14 ------------++++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++++----------<br />
15 ------------------++++++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++++++---<br />
<br />
RD DQS adjustments :<br />
BL0: Start: 0x6E Final: 0x6E<br />
BL1: Start: 0x6E Final: 0x6E<br />
<br />
Shmoo WR DQ<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 ------------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++---------------<br />
01 ----------+++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++---------------------<br />
02 ------------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++----------------<br />
03 ---+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++------------------------<br />
04 ---------+++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++-----------------------<br />
05 --------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++--------------------<br />
06 -----------++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++------------------<br />
07 ---+++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++-----------------------------<br />
08 ---------------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++-------------<br />
09 ---------------++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++---------------<br />
10 -----------+++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++----------------<br />
11 -----------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++-----------------<br />
12 -----------+++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++--------------------<br />
13 -----------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++-----------------<br />
14 ----+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++------------------------<br />
15 ------------+++++++++++++++++++++++++++++++++++++++++++++++X+++++++++++++++++++++++++++++++++++++++++++++++----------------<br />
<br />
Shmoo WR DM<br />
WR DM<br />
  000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011111111111111111111111<br />
  000000000011111111112222222222333333333344444444445555555555666666666677777777778888888888999999999900000000001111111111222<br />
  012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012<br />
00 -------++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++-----------------------<br />
01 --------++++++++++++++++++++++++++++++++++++++++++++++++X++++++++++++++++++++++++++++++++++++++++++++++++------------------<br />
start of memsys_end<br />
[0000000080180004] = 0x8110071f<br />
[0000000080180010] = 0x00000009<br />
end of memsys_end<br />
DDR test done successfully<br />
FFinit find magic number 0x75456e76 at address 0x100000<br />
FFinit find magic number 0x74506c21 at address 0x140000<br />
reading blob from 0x140000 offset 0xc len 163741<br />
digest sha256 OK<br />
<br />
U-Boot TPL 2019.07 (Oct 31 2023 - 03:52:39 -0400)<br />
Board is FLD secure<br />
&#36;TPL: 5.04L.02@419765 &#36;<br />
CPU Clock: 1500MHz<br />
IMAGE is NAND<br />
Trying to boot from NAND<br />
nand flash device id 0x98d39126, total size 1024MB<br />
block size 256KB, page size 4096 bytes, spare area 216 bytes<br />
ECC BCH-8 <br />
image from 2097152 to 315621376<br />
brcmnand_read_buf(): Attempt to read bad nand block 760<br />
brcmnand_read_buf(): Attempt to read bad nand block 762<br />
brcmnand_read_buf(): Attempt to read bad nand block 768<br />
brcmnand_read_buf(): Attempt to read bad nand block 770<br />
brcmnand_read_buf(): Attempt to read bad nand block 772<br />
brcmnand_read_buf(): Attempt to read bad nand block 780<br />
brcmnand_read_buf(): Attempt to read bad nand block 782<br />
RESET STATUS is 0x80000000<br />
SELECTED Image 1 FIT_VOL_ID is 3<br />
brcmnand_read_buf(): Attempt to read bad nand block 760<br />
brcmnand_read_buf(): Attempt to read bad nand block 762<br />
brcmnand_read_buf(): Attempt to read bad nand block 768<br />
brcmnand_read_buf(): Attempt to read bad nand block 770<br />
brcmnand_read_buf(): Attempt to read bad nand block 772<br />
brcmnand_read_buf(): Attempt to read bad nand block 780<br />
brcmnand_read_buf(): Attempt to read bad nand block 782<br />
Found FIT format U-Boot<br />
tpl_load_read: sector 7000000, count 3194, buf 0000000007000000<br />
tpl_load_read: sector 7000000, count 4192, buf 0000000007000000<br />
fit read sector 7000000, sectors=16786, dst=0000000007000000, count=16786, size=0x4192<br />
FIT Header Authentication Successfull!<br />
INFO: Found disabled /trust/anti-rollback node!<br />
INFO: Found /trust/hw_state node in fit<br />
tpl_load_read: sector 7003680, count 8028, buf 0000000000004000<br />
## Checking hash(es) for Image atf ... sha256+ OK<br />
tpl_load_read: sector 700b680, count 27fc80, buf 0000000001000000<br />
## Checking hash(es) for Image uboot ... sha256+ OK<br />
tpl_load_read: sector 76ea1c0, count c5be, buf 000000000127fc80<br />
## Checking hash(es) for Image fdt_VERIZON-G3100 ... sha256+ OK<br />
INFO: Creating //trust<br />
INFO: Creating /trust/antirollback_lvl<br />
INFO: Adding exported item node antirollback_lvl to dtb, size:4<br />
INFO: Creating /trust/brcm_pub_key<br />
INFO: Adding exported item node brcm_pub_key to dtb, size:256<br />
<br />
<br />
U-Boot 2019.07 (Oct 31 2023 - 03:52:45 -0400), Build: 5.04L.02@419765<br />
<br />
Model: VERIZON-G3100<br />
DRAM:  512 MiB<br />
max supported leds 32[32]<br />
Serial LED interface found num shifters 2 [2] serial data polarity low 0<br />
BCA LED Controller initialized<br />
HW led 3 registered<br />
HW led 4 registered<br />
HW led 5 registered<br />
HW led 6 registered<br />
HW led 7 registered<br />
HW led 8 registered<br />
HW led 9 registered<br />
HW led 10 registered<br />
SW led 0 registered<br />
SW led 1 registered<br />
SW led 2 registered<br />
SW led 11 registered<br />
SW led 12 registered<br />
SW led 13 registered<br />
SW led 14 registered<br />
SW led 15 registered<br />
Dump Current setting of SWREGs<br />
1.0D, reg=0x00, val=0xc690<br />
1.0D, reg=0x01, val=0x0d06<br />
1.0D, reg=0x02, val=0xcb12<br />
1.0D, reg=0x03, val=0x5372<br />
1.0D, reg=0x04, val=0x0000<br />
1.0D, reg=0x05, val=0x0702<br />
1.0D, reg=0x06, val=0xb000<br />
1.0D, reg=0x07, val=0x0029<br />
1.0D, reg=0x08, val=0x0c02<br />
1.0D, reg=0x09, val=0x0071<br />
1.8 , reg=0x00, val=0xc690<br />
1.8 , reg=0x01, val=0x0d06<br />
1.8 , reg=0x02, val=0xcb12<br />
1.8 , reg=0x03, val=0x5370<br />
1.8 , reg=0x04, val=0x0000<br />
1.8 , reg=0x05, val=0x0702<br />
1.8 , reg=0x06, val=0xb000<br />
1.8 , reg=0x07, val=0x0029<br />
1.8 , reg=0x08, val=0x0c02<br />
1.8 , reg=0x09, val=0x0071<br />
1.5 , reg=0x00, val=0xc690<br />
1.5 , reg=0x01, val=0x0d06<br />
1.5 , reg=0x02, val=0xcb12<br />
1.5 , reg=0x03, val=0x5370<br />
1.5 , reg=0x04, val=0x0000<br />
1.5 , reg=0x05, val=0x0702<br />
1.5 , reg=0x06, val=0xb000<br />
1.5 , reg=0x07, val=0x0029<br />
1.5 , reg=0x08, val=0x0c02<br />
1.5 , reg=0x09, val=0x0071<br />
1.0A, reg=0x00, val=0xc690<br />
1.0A, reg=0x01, val=0x0d06<br />
1.0A, reg=0x02, val=0xcb12<br />
1.0A, reg=0x03, val=0x5370<br />
1.0A, reg=0x04, val=0x0000<br />
1.0A, reg=0x05, val=0x0702<br />
1.0A, reg=0x06, val=0xb000<br />
1.0A, reg=0x07, val=0x0029<br />
1.0A, reg=0x08, val=0x0c02<br />
1.0A, reg=0x09, val=0x0071<br />
Take PMC out of reset<br />
waiting for PMC finish booting<br />
PMC rev: 3.4.1.427360 running<br />
pmc_init:PMC using DQM mode<br />
Chip ID: BCM68369_B1<br />
Broadcom B53 Dual Core: 1500MHz<br />
RDP: 1400MHz<br />
&#36;Uboot: 5.04L.02@419765 &#36;<br />
WDT:  Started with servicing (80s timeout)<br />
NAND:  1024 MiB<br />
MMC:  sdhci: 0<br />
Loading Environment from BOOT_MAGIC... ENV_BOOT_MAGIC_LOAD<br />
found magic at 100000<br />
good crc<br />
resize from 16384 to 8192<br />
OK<br />
In:    serial0<br />
Out:  serial0<br />
Err:  serial0<br />
Board is FLD secure<br />
INFO: Can't find /trust/fit-aes1 node in boot DTB!<br />
Now we are in UBOOT proper<br />
HTTPD: ready for starting<br />
boot_device is NAND<br />
Net:  Using MAC Address b8:f8:53:0b:1d:01<br />
eth0: switch0<br />
No size specified -&gt; Using max size (7300992)<br />
Read 7300992 bytes from volume bootfs1 to 0000000002000000<br />
FIT Header Authentication Successfull!<br />
Read 4 bytes from volume rootfs1 to 000000001dd40664<br />
## Loading kernel from FIT Image at 02000000 ...<br />
  Using 'conf_lx_VERIZON-G3100' configuration<br />
  Verifying Hash Integrity ... OK<br />
  Trying 'kernel' kernel subimage<br />
    Description:  4.19 kernel<br />
    Type:        Kernel Image<br />
    Compression:  lzma compressed<br />
    Data Start:  0x0228c800<br />
    Data Size:    3461392 Bytes = 3.3 MiB<br />
    Architecture: AArch64<br />
    OS:          Linux<br />
    Load Address: 0x00100000<br />
    Entry Point:  0x00100000<br />
    Hash algo:    sha256<br />
    Hash value:  77e40836ec218fa969f9d2bd572115ed9a7ef008cc75bfec4912354ce78a6349<br />
  Verifying Hash Integrity ... sha256+ OK<br />
## Loading fdt from FIT Image at 02000000 ...<br />
  Using 'conf_lx_VERIZON-G3100' configuration<br />
  Verifying Hash Integrity ... OK<br />
  Trying 'fdt_VERIZON-G3100' fdt subimage<br />
    Description:  dtb<br />
    Type:        Flat Device Tree<br />
    Compression:  uncompressed<br />
    Data Start:  0x026ea1c4<br />
    Data Size:    50618 Bytes = 49.4 KiB<br />
    Architecture: AArch64<br />
    Hash algo:    sha256<br />
    Hash value:  c50470d2e693ebcd7dd68e42cc1de0ace24ccc30766e9c36d08c6b4462fa2e53<br />
  Verifying Hash Integrity ... sha256+ OK<br />
  Booting using the fdt blob at 0x26ea1c4<br />
ARCADYAN: Authenticating vmlinux ...<br />
ARCADYAN: Authenticating vmlinux pass<br />
ARCADYAN: Decrypting kernel image ...<br />
ARCADYAN: Decrypting kernel image done<br />
  Uncompressing Kernel Image ... OK<br />
ERROR: reserving fdt memory region failed (addr=1b400000 size=4c00000)<br />
  Loading Device Tree to 0000000007f73000, end 0000000007fff5b9 ... OK<br />
RSVD: not found enrty for adsl<br />
RSVD: not found enrty for bufmem<br />
RSVD: not found enrty for rnrmem<br />
RSVD: Allocated for rdp1    64MB<br />
RSVD: Allocated for rdp2    8MB<br />
RSVD: Allocated for dhd0    11MB<br />
RSVD: Allocated for dhd1    11MB<br />
RSVD: Allocated for dhd2    11MB<br />
RSVD: Total 0x06c00000 bytes CMA reserved memory @ 0x19400000<br />
appending extra boot args to linux boot command line:<br />
  mtdparts=brcmnand.0:2097152(loader),313524224@2097152(image),8388608@315621376(misc1),1048576@324009984(misc3),709885952@325058560(data),28311552@1034944512(owl),1048576@1063256064(mtdoops),2097152@1064304640(license),2097152@1066401792(certificate),1048576@1068498944(pri<br />
Starting kernel ...<br />
<br />
D%G</code></div></div><br />
My device is currently running firmware 3.4.0.9, which I tried to revert to any previous version.  I found a reference to a “hidden” admin page to update firmware at <a href="https://192.168.1.1/#/firmware_upgrade" target="_blank" rel="noopener" class="mycode_url">https://192.168.1.1/#/firmware_upgrade</a>, but none of the firmware I downloaded would work (I think due to anti rollback).<br />
<br />
So this is where I am currently stuck.  I doubt that the key generation algorithm is on the device.  However, if anyone is able to make sense of the serial output that might help unlock the firmware, I would love to just have a look around for curiosity sake.  I will try to periodically scrape and update the password file, I originally thought it would have more entries by now.<br />
<br />
Next Steps:<ul class="mycode_list"><li>Analyze the data set to try to reduce key space (unused characters, common words, find the wordlist?)<br />
</li>
<li>Collect more complete entries for the dataset<br />
</li>
<li>Try to mount file system (ubi.img) in a proper Linux environment<br />
</li>
<li>Try to find older firmware<br />
</li>
</ul>
<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/image.gif" title="JPEG Image" border="0" alt=".jpeg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1237" target="_blank" title="">Backref.jpeg</a> (Size: 50 KB / Downloads: 238)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[a DIY wordlist generator]]></title>
			<link>https://hashcat.net/forum/thread-12189.html</link>
			<pubDate>Tue, 15 Oct 2024 01:11:21 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=19258">bored_dude</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-12189.html</guid>
			<description><![CDATA[Hi,<br />
<br />
<span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b">Introduction</span></span><br />
<br />
A little contributation to whom may be interested to make their own wordlist,  with continuous update, lightweight and simple as hell<br />
<br />
The idea behind it was to find a (almost) limitless source of english words with constant update. As the english language continually evolve, having a "tool" to generate new words make sense.<br />
<br />
The generator will use as source wikipedia, in particular the random article : <a href="https://en.wikipedia.org/wiki/Special:Random" target="_blank" rel="noopener" class="mycode_url">https://en.wikipedia.org/wiki/Special:Random</a><br />
<br />
This page on trigger, will redirect to a random article.<br />
<br />
This could work on Windows, though the following instruction are for Linux (but definitively adaptable for Windows)<br />
<br />
<span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b">Getting Ready and Started</span></span><br />
<br />
Create a new directory and go into<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>mkdir scrap &amp;&amp; cd scrap</code></div></div><br />
Create the wordlist file <br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>touch dic.txt</code></div></div><br />
Create the scrapping script (I use nano but any editor will work)<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>nano wikipedia_scrap.py</code></div></div><br />
Insert inside<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>#!/usr/bin/env python3<br />
import pycurl<br />
from io import BytesIO<br />
from bs4 import BeautifulSoup<br />
<br />
<br />
buffer = BytesIO()<br />
c = pycurl.Curl()<br />
c.setopt(c.URL, "https://en.wikipedia.org/wiki/Special:Random")<br />
c.setopt(c.FOLLOWLOCATION, True)<br />
c.setopt(c.WRITEDATA, buffer)<br />
c.perform()<br />
c.close()<br />
html = buffer.getvalue().decode("utf-8")<br />
<br />
# GET HTML<br />
soup = BeautifulSoup(html, "html.parser")<br />
<br />
# GET URL from &lt;link rel="canonical"<br />
rurl = soup.find('link', {'rel' : 'canonical'}).get("href")<br />
<br />
# Print the current (redirected url) where the scrap will happen<br />
print(rurl)<br />
<br />
# GET all &lt;p&gt; from soup var<br />
ptext = soup.find_all('p')<br />
# Extract text from &lt;p&gt;<br />
for p in ptext:<br />
    arr = p.text.split()<br />
<br />
    for words in arr:<br />
        # Need more work, remove punctuation<br />
        words = words.replace(',','').replace('.','').replace('(','').replace(')','').lower()<br />
        if words.isalpha():<br />
            # Only words that have at least 5 chars<br />
            if len(words) &gt; 4:<br />
                f = open("dic.txt","a")<br />
                f.write(words + '&#92;n')<br />
                f.close()</code></div></div><br />
Make the script executable<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>chmod +x wikipedia_scrap.py</code></div></div><br />
Create the bash script that will act as a process and execute the python script every X seconds (timer can be change here)<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>nano exec.sh</code></div></div><br />
Insert inside <br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>#!/bin/bash<br />
<br />
# On exit script (ctrl+c or kill), sort alphabetically and clean any double (or triple...) entries<br />
trap "sort -u dic.txt &gt; temp &amp;&amp; mv temp dic.txt &amp;&amp; exit" SIGINT<br />
<br />
while :<br />
do<br />
  ./wikipedia_scrap.py<br />
  # Set a pause between wikipedia request, can be change for lower value (unsure how many request per minute wikipedia will allow)<br />
  sleep 10<br />
done</code></div></div><br />
Make the bash script executable<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>chmod +x exec.sh</code></div></div><br />
Now run the bash script<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>./exec.sh</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Cleaning</span></span><br />
<br />
Unfortunatelly, determine if a word is in english language is tricky, most of the unwanted foreign words will be easily cleaned as they will be sorted after the last english word.<br />
<br />
For example on my current generated dic<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>...<br />
zygogaster<br />
zygomatic<br />
zygomorphic<br />
zygomycetes<br />
zygomycota<br />
zygopetalinae<br />
zygopetalon<br />
zygopetalum<br />
zygotaria<br />
zygote<br />
zymalkowski<br />
zynetix<br />
zysman<br />
zytek<br />
zytronic<br />
zyuganov<br />
zzzero<br />
...</code></div></div><br />
Everything after zzzero<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>zábřeh<br />
záhady<br />
záhony<br />
zákupy<br />
záleský<br />
zámok<br />
zánka<br />
zápolya<br />
...<br />
électorale<br />
électrique<br />
éliphas<br />
élisabeth<br />
élite<br />
éloize<br />
élèves<br />
éléonore<br />
émigré<br />
émigrés<br />
émile<br />
émilie<br />
énergies<br />
épinac<br />
épiscopale<br />
époque<br />
épreuves<br />
...<br />
διοικητής<br />
διοικηταὶ<br />
δρουγουβιτεία<br />
εβίνα<br />
εθνική<br />
εκλογική<br />
ελλάδα<br />
εσφούγγιζε<br />
ευθύμης<br />
εὐλόγιος<br />
εὔρωψ<br />
θέλεις<br />
θαυμαζω<br />
θεσσαλιῶτις<br />
θεῖος<br />
θρασὺς<br />
...</code></div></div><br />
Starting from there, other non english words can be found sorted between english word, this is the part I think can be improved.<br />
<br />
<span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b">Improving the script</span></span><br />
<br />
The script can definitively be improved, I'm thinking adding a regex to exclude characters found in words like "divisão" or "phước", or using python library that can do a better job than the function .is_alpha()<br />
<br />
Another way could be to change the source, instead of wikipedia, using the API of the New york time to scrap word inside article <br />
<br />
I welcome any idea, suggestion or "contribution" to make this little project better. Just keep in mind I like to keep thing as simple as they can be<br />
<br />
Here a generated wordlist made with this "tool", with a dirty fast cleaning, over 137770 words generated in ~40 hours of run<br />
<br />
<a href="https://0x0.st/X6n3.txt" target="_blank" rel="noopener" class="mycode_url">https://0x0.st/X6n3.txt</a><br />
<br />
Thank you !]]></description>
			<content:encoded><![CDATA[Hi,<br />
<br />
<span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b">Introduction</span></span><br />
<br />
A little contributation to whom may be interested to make their own wordlist,  with continuous update, lightweight and simple as hell<br />
<br />
The idea behind it was to find a (almost) limitless source of english words with constant update. As the english language continually evolve, having a "tool" to generate new words make sense.<br />
<br />
The generator will use as source wikipedia, in particular the random article : <a href="https://en.wikipedia.org/wiki/Special:Random" target="_blank" rel="noopener" class="mycode_url">https://en.wikipedia.org/wiki/Special:Random</a><br />
<br />
This page on trigger, will redirect to a random article.<br />
<br />
This could work on Windows, though the following instruction are for Linux (but definitively adaptable for Windows)<br />
<br />
<span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b">Getting Ready and Started</span></span><br />
<br />
Create a new directory and go into<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>mkdir scrap &amp;&amp; cd scrap</code></div></div><br />
Create the wordlist file <br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>touch dic.txt</code></div></div><br />
Create the scrapping script (I use nano but any editor will work)<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>nano wikipedia_scrap.py</code></div></div><br />
Insert inside<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>#!/usr/bin/env python3<br />
import pycurl<br />
from io import BytesIO<br />
from bs4 import BeautifulSoup<br />
<br />
<br />
buffer = BytesIO()<br />
c = pycurl.Curl()<br />
c.setopt(c.URL, "https://en.wikipedia.org/wiki/Special:Random")<br />
c.setopt(c.FOLLOWLOCATION, True)<br />
c.setopt(c.WRITEDATA, buffer)<br />
c.perform()<br />
c.close()<br />
html = buffer.getvalue().decode("utf-8")<br />
<br />
# GET HTML<br />
soup = BeautifulSoup(html, "html.parser")<br />
<br />
# GET URL from &lt;link rel="canonical"<br />
rurl = soup.find('link', {'rel' : 'canonical'}).get("href")<br />
<br />
# Print the current (redirected url) where the scrap will happen<br />
print(rurl)<br />
<br />
# GET all &lt;p&gt; from soup var<br />
ptext = soup.find_all('p')<br />
# Extract text from &lt;p&gt;<br />
for p in ptext:<br />
    arr = p.text.split()<br />
<br />
    for words in arr:<br />
        # Need more work, remove punctuation<br />
        words = words.replace(',','').replace('.','').replace('(','').replace(')','').lower()<br />
        if words.isalpha():<br />
            # Only words that have at least 5 chars<br />
            if len(words) &gt; 4:<br />
                f = open("dic.txt","a")<br />
                f.write(words + '&#92;n')<br />
                f.close()</code></div></div><br />
Make the script executable<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>chmod +x wikipedia_scrap.py</code></div></div><br />
Create the bash script that will act as a process and execute the python script every X seconds (timer can be change here)<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>nano exec.sh</code></div></div><br />
Insert inside <br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>#!/bin/bash<br />
<br />
# On exit script (ctrl+c or kill), sort alphabetically and clean any double (or triple...) entries<br />
trap "sort -u dic.txt &gt; temp &amp;&amp; mv temp dic.txt &amp;&amp; exit" SIGINT<br />
<br />
while :<br />
do<br />
  ./wikipedia_scrap.py<br />
  # Set a pause between wikipedia request, can be change for lower value (unsure how many request per minute wikipedia will allow)<br />
  sleep 10<br />
done</code></div></div><br />
Make the bash script executable<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>chmod +x exec.sh</code></div></div><br />
Now run the bash script<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>./exec.sh</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Cleaning</span></span><br />
<br />
Unfortunatelly, determine if a word is in english language is tricky, most of the unwanted foreign words will be easily cleaned as they will be sorted after the last english word.<br />
<br />
For example on my current generated dic<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>...<br />
zygogaster<br />
zygomatic<br />
zygomorphic<br />
zygomycetes<br />
zygomycota<br />
zygopetalinae<br />
zygopetalon<br />
zygopetalum<br />
zygotaria<br />
zygote<br />
zymalkowski<br />
zynetix<br />
zysman<br />
zytek<br />
zytronic<br />
zyuganov<br />
zzzero<br />
...</code></div></div><br />
Everything after zzzero<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>zábřeh<br />
záhady<br />
záhony<br />
zákupy<br />
záleský<br />
zámok<br />
zánka<br />
zápolya<br />
...<br />
électorale<br />
électrique<br />
éliphas<br />
élisabeth<br />
élite<br />
éloize<br />
élèves<br />
éléonore<br />
émigré<br />
émigrés<br />
émile<br />
émilie<br />
énergies<br />
épinac<br />
épiscopale<br />
époque<br />
épreuves<br />
...<br />
διοικητής<br />
διοικηταὶ<br />
δρουγουβιτεία<br />
εβίνα<br />
εθνική<br />
εκλογική<br />
ελλάδα<br />
εσφούγγιζε<br />
ευθύμης<br />
εὐλόγιος<br />
εὔρωψ<br />
θέλεις<br />
θαυμαζω<br />
θεσσαλιῶτις<br />
θεῖος<br />
θρασὺς<br />
...</code></div></div><br />
Starting from there, other non english words can be found sorted between english word, this is the part I think can be improved.<br />
<br />
<span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b">Improving the script</span></span><br />
<br />
The script can definitively be improved, I'm thinking adding a regex to exclude characters found in words like "divisão" or "phước", or using python library that can do a better job than the function .is_alpha()<br />
<br />
Another way could be to change the source, instead of wikipedia, using the API of the New york time to scrap word inside article <br />
<br />
I welcome any idea, suggestion or "contribution" to make this little project better. Just keep in mind I like to keep thing as simple as they can be<br />
<br />
Here a generated wordlist made with this "tool", with a dirty fast cleaning, over 137770 words generated in ~40 hours of run<br />
<br />
<a href="https://0x0.st/X6n3.txt" target="_blank" rel="noopener" class="mycode_url">https://0x0.st/X6n3.txt</a><br />
<br />
Thank you !]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[sha256 OpenSSL vs 7z]]></title>
			<link>https://hashcat.net/forum/thread-12110.html</link>
			<pubDate>Mon, 12 Aug 2024 09:58:42 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=16666">arduan77</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-12110.html</guid>
			<description><![CDATA[Hi.<br />
I wrote two programs, one using sha256 from LZMA-SDK, the other using OpenSSL. I noticed that there is a significant speed improvement when using OpenSSL, especially when the processor does not have sha256 instructions. Also, when using LZMA-SDK, there is a decrease in hashing performance over time. Both programs are based on the same algorithm taken from LZMA-SDK, but using the appropriate instructions SHA256_Update(&amp;sha, buf, unrollSize); //from OpenSSL and Sha256_Update((CSha256*)(void*)(Byte*)sha, buf, unrollSize); //from 7z. Could implementing OpenSSL into Hashcat give similar results? <br />
<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>unsigned char* GetSHA256_7zD(string PassStringUTF16) //OpenSSL<br />
{<br />
    const int len = PassStringUTF16.length();<br />
    CByteBuffer_Wipe PassBuffer(len * 2);<br />
    for (size_t k = 0; k &lt; len; k++)<br />
    {<br />
        wchar_t c = PassStringUTF16[k];<br />
        ((Byte*)PassBuffer)[k * 2] = (Byte)c;<br />
        ((Byte*)PassBuffer)[k * 2 + 1] = (Byte)(c &gt;&gt; 8);<br />
    }<br />
    const unsigned kUnrPow = 6;<br />
    const UInt32 numUnroll = (UInt32)1 &lt;&lt; (*g_Cost &lt;= kUnrPow ? (unsigned)*g_Cost : kUnrPow);<br />
<br />
    const size_t bufSize = 8 + 0 + PassBuffer.Size();<br />
    const size_t unrollSize = bufSize * numUnroll;<br />
    CAlignedBuffer sha2(sizeof(CSha256) + unrollSize + bufSize * 2); //From 7z to set buf<br />
    Byte* buf = sha2 + sizeof(CSha256); //From 7z<br />
    SHA256_CTX sha; //From OpenSSL<br />
    SHA256_Init(&amp;sha); //From OpenSSL<br />
<br />
    //memcpy(buf, "", 0); //for salt, but no salt<br />
    memcpy(buf + 0, PassBuffer, PassBuffer.Size());<br />
    memset(buf + bufSize - 8, 0, 8);<br />
<br />
    {<br />
        {<br />
            Byte* dest = buf;<br />
            for (UInt32 i = 1; i &lt; numUnroll; i++)<br />
            {<br />
                dest += bufSize;<br />
                memcpy(dest, buf, bufSize);<br />
            }<br />
        }<br />
<br />
        const UInt32 numRounds = (UInt32)1 &lt;&lt; *g_Cost;<br />
        UInt32 r = 0;<br />
        do<br />
        {<br />
            Byte* dest = buf + bufSize - 8;<br />
            UInt32 i = r;<br />
            r += numUnroll;<br />
            do<br />
            {<br />
                SetUi32(dest, i)  i++; dest += bufSize;<br />
            } while (i &lt; r);<br />
            SHA256_Update(&amp;sha, buf, unrollSize); //from OpenSSL<br />
        } while (r &lt; numRounds);<br />
    }<br />
<br />
    unsigned char* Key = (unsigned char*)malloc(32);<br />
    SHA256_Final(Key, &amp;sha); //from OpenSSL<br />
    return Key;<br />
}<br />
<br />
<br />
////////////////////////////<br />
<br />
unsigned char* GetSHA256_7zZ(string PassStringUTF16) //7z<br />
{<br />
    //From 7z only -&gt;<br />
    const int len = PassStringUTF16.length();<br />
    CByteBuffer_Wipe PassBuffer(len * 2);<br />
    for (size_t k = 0; k &lt; len; k++)<br />
    {<br />
        wchar_t c = PassStringUTF16[k];<br />
        ((Byte*)PassBuffer)[k * 2] = (Byte)c;<br />
        ((Byte*)PassBuffer)[k * 2 + 1] = (Byte)(c &gt;&gt; 8);<br />
    }<br />
    const unsigned kUnrPow = 6;<br />
    const UInt32 numUnroll = (UInt32)1 &lt;&lt; (*g_Cost &lt;= kUnrPow ? (unsigned)*g_Cost : kUnrPow);<br />
<br />
    const size_t bufSize = 8 + 0 + PassBuffer.Size();<br />
    const size_t unrollSize = bufSize * numUnroll;<br />
    CAlignedBuffer sha(sizeof(CSha256) + unrollSize + bufSize * 2);<br />
    Byte* buf = sha + sizeof(CSha256);<br />
<br />
    //memcpy(buf, "", 0); //no salt<br />
    memcpy(buf + 0, PassBuffer, PassBuffer.Size());<br />
    memset(buf + bufSize - 8, 0, 8);<br />
<br />
    Sha256_Init((CSha256*)(void*)(Byte*)sha);<br />
<br />
    {<br />
        {<br />
            Byte* dest = buf;<br />
            for (UInt32 i = 1; i &lt; numUnroll; i++)<br />
            {<br />
                dest += bufSize;<br />
                memcpy(dest, buf, bufSize);<br />
            }<br />
        }<br />
<br />
        const UInt32 numRounds = (UInt32)1 &lt;&lt; *g_Cost;<br />
        UInt32 r = 0;<br />
        do<br />
        {<br />
            Byte* dest = buf + bufSize - 8;<br />
            UInt32 i = r;<br />
            r += numUnroll;<br />
            do<br />
            {<br />
                SetUi32(dest, i)  i++; dest += bufSize;<br />
            } while (i &lt; r);<br />
            Sha256_Update((CSha256*)(void*)(Byte*)sha, buf, unrollSize);<br />
        } while (r &lt; numRounds);<br />
    }<br />
<br />
    unsigned char* Key = (unsigned char*)malloc(32);<br />
    Sha256_Final((CSha256*)(void*)(Byte*)sha, Key);<br />
    memset(&amp;sha, 0, sizeof(sha));<br />
    return Key;<br />
}</code></div></div>]]></description>
			<content:encoded><![CDATA[Hi.<br />
I wrote two programs, one using sha256 from LZMA-SDK, the other using OpenSSL. I noticed that there is a significant speed improvement when using OpenSSL, especially when the processor does not have sha256 instructions. Also, when using LZMA-SDK, there is a decrease in hashing performance over time. Both programs are based on the same algorithm taken from LZMA-SDK, but using the appropriate instructions SHA256_Update(&amp;sha, buf, unrollSize); //from OpenSSL and Sha256_Update((CSha256*)(void*)(Byte*)sha, buf, unrollSize); //from 7z. Could implementing OpenSSL into Hashcat give similar results? <br />
<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>unsigned char* GetSHA256_7zD(string PassStringUTF16) //OpenSSL<br />
{<br />
    const int len = PassStringUTF16.length();<br />
    CByteBuffer_Wipe PassBuffer(len * 2);<br />
    for (size_t k = 0; k &lt; len; k++)<br />
    {<br />
        wchar_t c = PassStringUTF16[k];<br />
        ((Byte*)PassBuffer)[k * 2] = (Byte)c;<br />
        ((Byte*)PassBuffer)[k * 2 + 1] = (Byte)(c &gt;&gt; 8);<br />
    }<br />
    const unsigned kUnrPow = 6;<br />
    const UInt32 numUnroll = (UInt32)1 &lt;&lt; (*g_Cost &lt;= kUnrPow ? (unsigned)*g_Cost : kUnrPow);<br />
<br />
    const size_t bufSize = 8 + 0 + PassBuffer.Size();<br />
    const size_t unrollSize = bufSize * numUnroll;<br />
    CAlignedBuffer sha2(sizeof(CSha256) + unrollSize + bufSize * 2); //From 7z to set buf<br />
    Byte* buf = sha2 + sizeof(CSha256); //From 7z<br />
    SHA256_CTX sha; //From OpenSSL<br />
    SHA256_Init(&amp;sha); //From OpenSSL<br />
<br />
    //memcpy(buf, "", 0); //for salt, but no salt<br />
    memcpy(buf + 0, PassBuffer, PassBuffer.Size());<br />
    memset(buf + bufSize - 8, 0, 8);<br />
<br />
    {<br />
        {<br />
            Byte* dest = buf;<br />
            for (UInt32 i = 1; i &lt; numUnroll; i++)<br />
            {<br />
                dest += bufSize;<br />
                memcpy(dest, buf, bufSize);<br />
            }<br />
        }<br />
<br />
        const UInt32 numRounds = (UInt32)1 &lt;&lt; *g_Cost;<br />
        UInt32 r = 0;<br />
        do<br />
        {<br />
            Byte* dest = buf + bufSize - 8;<br />
            UInt32 i = r;<br />
            r += numUnroll;<br />
            do<br />
            {<br />
                SetUi32(dest, i)  i++; dest += bufSize;<br />
            } while (i &lt; r);<br />
            SHA256_Update(&amp;sha, buf, unrollSize); //from OpenSSL<br />
        } while (r &lt; numRounds);<br />
    }<br />
<br />
    unsigned char* Key = (unsigned char*)malloc(32);<br />
    SHA256_Final(Key, &amp;sha); //from OpenSSL<br />
    return Key;<br />
}<br />
<br />
<br />
////////////////////////////<br />
<br />
unsigned char* GetSHA256_7zZ(string PassStringUTF16) //7z<br />
{<br />
    //From 7z only -&gt;<br />
    const int len = PassStringUTF16.length();<br />
    CByteBuffer_Wipe PassBuffer(len * 2);<br />
    for (size_t k = 0; k &lt; len; k++)<br />
    {<br />
        wchar_t c = PassStringUTF16[k];<br />
        ((Byte*)PassBuffer)[k * 2] = (Byte)c;<br />
        ((Byte*)PassBuffer)[k * 2 + 1] = (Byte)(c &gt;&gt; 8);<br />
    }<br />
    const unsigned kUnrPow = 6;<br />
    const UInt32 numUnroll = (UInt32)1 &lt;&lt; (*g_Cost &lt;= kUnrPow ? (unsigned)*g_Cost : kUnrPow);<br />
<br />
    const size_t bufSize = 8 + 0 + PassBuffer.Size();<br />
    const size_t unrollSize = bufSize * numUnroll;<br />
    CAlignedBuffer sha(sizeof(CSha256) + unrollSize + bufSize * 2);<br />
    Byte* buf = sha + sizeof(CSha256);<br />
<br />
    //memcpy(buf, "", 0); //no salt<br />
    memcpy(buf + 0, PassBuffer, PassBuffer.Size());<br />
    memset(buf + bufSize - 8, 0, 8);<br />
<br />
    Sha256_Init((CSha256*)(void*)(Byte*)sha);<br />
<br />
    {<br />
        {<br />
            Byte* dest = buf;<br />
            for (UInt32 i = 1; i &lt; numUnroll; i++)<br />
            {<br />
                dest += bufSize;<br />
                memcpy(dest, buf, bufSize);<br />
            }<br />
        }<br />
<br />
        const UInt32 numRounds = (UInt32)1 &lt;&lt; *g_Cost;<br />
        UInt32 r = 0;<br />
        do<br />
        {<br />
            Byte* dest = buf + bufSize - 8;<br />
            UInt32 i = r;<br />
            r += numUnroll;<br />
            do<br />
            {<br />
                SetUi32(dest, i)  i++; dest += bufSize;<br />
            } while (i &lt; r);<br />
            Sha256_Update((CSha256*)(void*)(Byte*)sha, buf, unrollSize);<br />
        } while (r &lt; numRounds);<br />
    }<br />
<br />
    unsigned char* Key = (unsigned char*)malloc(32);<br />
    Sha256_Final((CSha256*)(void*)(Byte*)sha, Key);<br />
    memset(&amp;sha, 0, sizeof(sha));<br />
    return Key;<br />
}</code></div></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Big feature request:  Improve PDF support, cover all versions, better hash format]]></title>
			<link>https://hashcat.net/forum/thread-11879.html</link>
			<pubDate>Wed, 27 Mar 2024 22:32:19 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=18483">JDLH</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-11879.html</guid>
			<description><![CDATA[I am a new user of hashcat. I am trying to use it on a collection of PDF files spanning decades, to recover some passwords. I know a bit about PDF's format, but I am naive about the constraints of hashcat's architecture and history. My experience led me to write up a rather big feature request:<br />
<br />
<a href="https://github.com/hashcat/hashcat/issues/3976" target="_blank" rel="noopener" class="mycode_url"><span style="font-weight: bold;" class="mycode_b">Improve PDF support, cover all versions, better hash format</span> (issue 3976)</a><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>…Make one hashcat invocation able to find passwords for hashes of any version of PDF file, including owner as well as user password. Also, make an improved hash format which a) can describe hashes for any version of PDF file, b) can include a filename and path of the PDF document described by each hash, which may need to be c) a structured format like JSON or bencode rather than the current asterisk-separated flat file format, with d) clear documentation of the hash format, and e) an official, reliable pdf-to-hash tool.…</blockquote>
<br />
The issue has more about my view of the current situation, and the desired outcome. I welcome comments and discussion, here, or in issue #3976 on GitHub.]]></description>
			<content:encoded><![CDATA[I am a new user of hashcat. I am trying to use it on a collection of PDF files spanning decades, to recover some passwords. I know a bit about PDF's format, but I am naive about the constraints of hashcat's architecture and history. My experience led me to write up a rather big feature request:<br />
<br />
<a href="https://github.com/hashcat/hashcat/issues/3976" target="_blank" rel="noopener" class="mycode_url"><span style="font-weight: bold;" class="mycode_b">Improve PDF support, cover all versions, better hash format</span> (issue 3976)</a><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>…Make one hashcat invocation able to find passwords for hashes of any version of PDF file, including owner as well as user password. Also, make an improved hash format which a) can describe hashes for any version of PDF file, b) can include a filename and path of the PDF document described by each hash, which may need to be c) a structured format like JSON or bencode rather than the current asterisk-separated flat file format, with d) clear documentation of the hash format, and e) an official, reliable pdf-to-hash tool.…</blockquote>
<br />
The issue has more about my view of the current situation, and the desired outcome. I welcome comments and discussion, here, or in issue #3976 on GitHub.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Handshake Hcxdumptool]]></title>
			<link>https://hashcat.net/forum/thread-11841.html</link>
			<pubDate>Mon, 04 Mar 2024 07:50:44 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=18047">brahim7</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-11841.html</guid>
			<description><![CDATA[Im using last version , and i wanted to extract handshake but i can't choose specifc ssid <br />
The tools got all sssid memorise on my phone on put them in pcapng file<br />
I use this command<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>Hcxdumptool -i wlan0mon -w myssid.pcapng --rds=1</code></div></div><br />
When i converted it by hcxpcapngtool they told me in wpa-sec this format not supported<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>Hcxpcapngtool -o myssid myssid.pcapng</code></div></div>]]></description>
			<content:encoded><![CDATA[Im using last version , and i wanted to extract handshake but i can't choose specifc ssid <br />
The tools got all sssid memorise on my phone on put them in pcapng file<br />
I use this command<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>Hcxdumptool -i wlan0mon -w myssid.pcapng --rds=1</code></div></div><br />
When i converted it by hcxpcapngtool they told me in wpa-sec this format not supported<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>Hcxpcapngtool -o myssid myssid.pcapng</code></div></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[AngryOxide - 802.11 Attack tool generating Hashcat Formats]]></title>
			<link>https://hashcat.net/forum/thread-11817.html</link>
			<pubDate>Sat, 10 Feb 2024 19:05:51 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=18308">rage</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-11817.html</guid>
			<description><![CDATA[This has been shared a bit already including in the discord. But I figured I should create a post here too!<br />
<br />
I created a WiFi attack tool that generates mode 22000 hashlines for cracking. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Here are the details:<br />
</span><ul class="mycode_list"><li>Active state-based attack engine used to retrieve relevent EAPOL messages from Access Points and clients.<br />
</li>
<li>Target option that accepts MAC (aabbcc..., aa:bb:cc...) and SSID "Test_SSID" to limit attack scope.<br />
</li>
<li>Whitelist option to protect specific networks from attacks. Useful if not using targets.<br />
</li>
<li>Auto Hunt capability to find all target channels and hop between them.<br />
</li>
<li>A Terminal-UI that presents all relevent data while still living in the terminal for easy usage over SSH.<br />
</li>
<li>Limits DEAUTHENTICATION frames that can cause more damage than good to the authentication sequence.<br />
</li>
<li>EAPOL 4-Way-Handshake validation using Nonce Correction, Replay Counter validation, and Temporal validation.<br />
</li>
<li>Automatically elicits PMKID from access points where available.<br />
</li>
<li>Utilizes GPSD with ability to set remote GPSD service address.<br />
</li>
<li>Provides pcapng files with embedded GPS using the Kismet Format.<br />
</li>
<li>Provides a kismetdb file with all frames (with GPS) for post-processing.<br />
</li>
<li>Wraps all output files in a gzipped tarball.<br />
</li>
<li>Bash autocompletions for easy interface selection provided.<br />
</li>
</ul>
<br />
<span style="font-weight: bold;" class="mycode_b">Attacks</span>:<br />
<br />
Will by default attack ALL access points in range, unless atleast one target is supplied, at which point the tool will only transmit against defined targets. (But will still passively collect on other access points).<br />
<ul class="mycode_list"><li>Attempts authentication/association sequence to produce EAPOL Message 1 (PMKID Collection)<br />
</li>
<li>Attempts to retrieve hidden SSID's with undirected probe requests.<br />
</li>
<li>Utilizes Anonymous Reassociation to force Access Points to deauthenticate their own clients (MFP Bypass)<br />
</li>
<li>Will attempt to send Channel Switch Announcement to send clients to adjacent channels.<br />
</li>
<li>Attempts to downgrade RSN modes to WPA2-CCMP (Probe Response Injection)<br />
</li>
<li>Attempts to collect EAPOL M2 from stations based solely on Probe Requests (Rogue AP)<br />
</li>
<li>Will send controlled deauthentication frames unless told not to (--nodeauth)<br />
</li>
</ul>
<br />
All of these attacks are rate-controlled both to prevent erroneous EAPOL timer resets and to maintain some level of OPSEC.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">You can find AngryOxide on my github:</span><br />
<br />
<a href="https://github.com/Ragnt/AngryOxide" target="_blank" rel="noopener" class="mycode_url">Link</a><br />
<br />
<span style="font-weight: bold;" class="mycode_b">And visit out discord if you want some quick responses to questions:</span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><a href="https://discord.gg/cNqCKCqMRe" target="_blank" rel="noopener" class="mycode_url">Discord</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Screenshots</span>:<br />
<br />
<img src="https://github.com/Ragnt/AngryOxide/raw/master/screenshots/ap_tab.png" loading="lazy"  alt="[Image: ap_tab.png]" class="mycode_img" /><br />
<br />
<img src="https://github.com/Ragnt/AngryOxide/raw/master/screenshots/handshakes_tab.png" loading="lazy"  alt="[Image: handshakes_tab.png]" class="mycode_img" />]]></description>
			<content:encoded><![CDATA[This has been shared a bit already including in the discord. But I figured I should create a post here too!<br />
<br />
I created a WiFi attack tool that generates mode 22000 hashlines for cracking. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Here are the details:<br />
</span><ul class="mycode_list"><li>Active state-based attack engine used to retrieve relevent EAPOL messages from Access Points and clients.<br />
</li>
<li>Target option that accepts MAC (aabbcc..., aa:bb:cc...) and SSID "Test_SSID" to limit attack scope.<br />
</li>
<li>Whitelist option to protect specific networks from attacks. Useful if not using targets.<br />
</li>
<li>Auto Hunt capability to find all target channels and hop between them.<br />
</li>
<li>A Terminal-UI that presents all relevent data while still living in the terminal for easy usage over SSH.<br />
</li>
<li>Limits DEAUTHENTICATION frames that can cause more damage than good to the authentication sequence.<br />
</li>
<li>EAPOL 4-Way-Handshake validation using Nonce Correction, Replay Counter validation, and Temporal validation.<br />
</li>
<li>Automatically elicits PMKID from access points where available.<br />
</li>
<li>Utilizes GPSD with ability to set remote GPSD service address.<br />
</li>
<li>Provides pcapng files with embedded GPS using the Kismet Format.<br />
</li>
<li>Provides a kismetdb file with all frames (with GPS) for post-processing.<br />
</li>
<li>Wraps all output files in a gzipped tarball.<br />
</li>
<li>Bash autocompletions for easy interface selection provided.<br />
</li>
</ul>
<br />
<span style="font-weight: bold;" class="mycode_b">Attacks</span>:<br />
<br />
Will by default attack ALL access points in range, unless atleast one target is supplied, at which point the tool will only transmit against defined targets. (But will still passively collect on other access points).<br />
<ul class="mycode_list"><li>Attempts authentication/association sequence to produce EAPOL Message 1 (PMKID Collection)<br />
</li>
<li>Attempts to retrieve hidden SSID's with undirected probe requests.<br />
</li>
<li>Utilizes Anonymous Reassociation to force Access Points to deauthenticate their own clients (MFP Bypass)<br />
</li>
<li>Will attempt to send Channel Switch Announcement to send clients to adjacent channels.<br />
</li>
<li>Attempts to downgrade RSN modes to WPA2-CCMP (Probe Response Injection)<br />
</li>
<li>Attempts to collect EAPOL M2 from stations based solely on Probe Requests (Rogue AP)<br />
</li>
<li>Will send controlled deauthentication frames unless told not to (--nodeauth)<br />
</li>
</ul>
<br />
All of these attacks are rate-controlled both to prevent erroneous EAPOL timer resets and to maintain some level of OPSEC.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">You can find AngryOxide on my github:</span><br />
<br />
<a href="https://github.com/Ragnt/AngryOxide" target="_blank" rel="noopener" class="mycode_url">Link</a><br />
<br />
<span style="font-weight: bold;" class="mycode_b">And visit out discord if you want some quick responses to questions:</span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><a href="https://discord.gg/cNqCKCqMRe" target="_blank" rel="noopener" class="mycode_url">Discord</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Screenshots</span>:<br />
<br />
<img src="https://github.com/Ragnt/AngryOxide/raw/master/screenshots/ap_tab.png" loading="lazy"  alt="[Image: ap_tab.png]" class="mycode_img" /><br />
<br />
<img src="https://github.com/Ragnt/AngryOxide/raw/master/screenshots/handshakes_tab.png" loading="lazy"  alt="[Image: handshakes_tab.png]" class="mycode_img" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[7z False positive -> True positive, rule or not...]]></title>
			<link>https://hashcat.net/forum/thread-11792.html</link>
			<pubDate>Sun, 28 Jan 2024 10:34:32 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=16666">arduan77</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-11792.html</guid>
			<description><![CDATA[Hi...<br />
I'm trying to decode 7z Qlocker password with my own password generator<br />
<a href="https://hashcat.net/forum/thread-11146.html" target="_blank" rel="noopener" class="mycode_url">MikiDecoder</a><br />
no success yet, but...<br />
I know, it's impossible to find simple the rule for passwords in 7z, but I have found something interesting, I think. I have tried to compare all false positive passwords, but I haven't find any rule if I divide, multiply, subtract, try to find HCF and LCM in for all corresponding password-number.<br />
So, I wonder about one thing that seems interesting to me, I want to share with you.<br />
I've been working with Hashcat and hash/password for a long time, and I have seen, that false positive passwords appear at specific intervals. I mean, in my situation, almost always hashcat finds two false positive passwords in one day, then there is a break for 2-4 days, and again two false positive passwords. What do you think about this, is it worth looking for rule?]]></description>
			<content:encoded><![CDATA[Hi...<br />
I'm trying to decode 7z Qlocker password with my own password generator<br />
<a href="https://hashcat.net/forum/thread-11146.html" target="_blank" rel="noopener" class="mycode_url">MikiDecoder</a><br />
no success yet, but...<br />
I know, it's impossible to find simple the rule for passwords in 7z, but I have found something interesting, I think. I have tried to compare all false positive passwords, but I haven't find any rule if I divide, multiply, subtract, try to find HCF and LCM in for all corresponding password-number.<br />
So, I wonder about one thing that seems interesting to me, I want to share with you.<br />
I've been working with Hashcat and hash/password for a long time, and I have seen, that false positive passwords appear at specific intervals. I mean, in my situation, almost always hashcat finds two false positive passwords in one day, then there is a break for 2-4 days, and again two false positive passwords. What do you think about this, is it worth looking for rule?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Inside hc22000 file]]></title>
			<link>https://hashcat.net/forum/thread-11728.html</link>
			<pubDate>Mon, 11 Dec 2023 11:32:50 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=18047">brahim7</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-11728.html</guid>
			<description><![CDATA[Please can you explain what inside the file<br />
<br />
I know there is Bssid And essid client , what about others separated by * , what kind of hash is that ?<br />
And where is Passphrase crypted hash<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>WPA*01*<br />
?????? :  e05630666aa9198ca136f10ba11e8b11<br />
Bssid : *340a983b7f1c*<br />
Essid :   ec51bc1e7f7d*<br />
??????? :   4d616c696b20486f6d65***01</code></div></div>]]></description>
			<content:encoded><![CDATA[Please can you explain what inside the file<br />
<br />
I know there is Bssid And essid client , what about others separated by * , what kind of hash is that ?<br />
And where is Passphrase crypted hash<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>WPA*01*<br />
?????? :  e05630666aa9198ca136f10ba11e8b11<br />
Bssid : *340a983b7f1c*<br />
Essid :   ec51bc1e7f7d*<br />
??????? :   4d616c696b20486f6d65***01</code></div></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Algorithm for generate default password]]></title>
			<link>https://hashcat.net/forum/thread-11714.html</link>
			<pubDate>Wed, 06 Dec 2023 11:48:51 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=18047">brahim7</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-11714.html</guid>
			<description><![CDATA[One of the ISP in my country distributes a router ZTE H288A , this router comes with a default password that is a Mac address without : <br />
<br />
<img src="https://i.postimg.cc/fbz0RPS8/20231206-114533.jpg" loading="lazy"  alt="[Image: 20231206-114533.jpg]" class="mycode_img" /><br />
<br />
<br />
I want a code that converts Mac to a password<br />
And how i add it to Router Keygen dictionary]]></description>
			<content:encoded><![CDATA[One of the ISP in my country distributes a router ZTE H288A , this router comes with a default password that is a Mac address without : <br />
<br />
<img src="https://i.postimg.cc/fbz0RPS8/20231206-114533.jpg" loading="lazy"  alt="[Image: 20231206-114533.jpg]" class="mycode_img" /><br />
<br />
<br />
I want a code that converts Mac to a password<br />
And how i add it to Router Keygen dictionary]]></content:encoded>
		</item>
	</channel>
</rss>