-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
decrypting alcatel config #1
Comments
Hi,
Sorry for long delay... you can download the bin file and use "binwalk" on kali linux to download the files/settings within it.
Regards,
James Hemmings
…On 15/09/18 22:20, H1-N1 wrote:
hi
when im googling for decrypting alcatel config file i was redirected to you github repo
can you help me wich tool i can use to do so
thx
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, [view it on GitHub](#1), or [mute the thread](https://github.com/notifications/unsubscribe-auth/AH7Kpup8JDwL1qkr8-la22m_jU1sCmhkks5ubW8DgaJpZM4WqjBQ).
|
hi,
also can i modifi the config file then encrypt it with binwalk because i need toupdate my router config everyday remotely ... |
hi , finaly awas able to decrypt the configuration but i can't figure out how to change the wifi password then upload it if you have any idea thx |
@H1-N1 Did you ever figure out a way to do this? I was looking at potentially "abusing" the backup and restore feature to override the SSH setting, as I want it enabled again for further exploration of the configuration on the OpenWrt side. EE themselves disabled it due to the hard coded root credentials as per the research and responsible disclosure from @JamesIT. I was able to extract the contents of a configure.bin using binwalk, which reveals it is actually two gzip archives at two offsets. There doesn't appear to be any encryption other than compression.
The gzip archive at 0x2D, also contains a sysconfig.tar.gz within which when extracted reveals the config files stored at The question however is can you make changes and then repackage the configure.bin and upload it without bricking the device? I don't know what checks are done by the backup and restore feature. i.e. checksums, file length checks etc. Equally, because the config file I want is within the 0x2D offset and then within a sysconfig.tar.gz, it needs several layers of extraction and then repackaging this seems the challenge, while maintaining the original file header so the backup and restore feature doesn't reject it. Maybe you could generate your own backup.tar.gz, matching the directory structure expected and then hex edit that into the original configure.bin file? Seems dangerous though, possible bricking risk? |
For anyone interested, this how you can do it: |
hi
when im googling for decrypting alcatel config file i was redirected to you github repo
can you help me wich tool i can use to do so
thx
The text was updated successfully, but these errors were encountered: