Jump to content

Can someone Help me to Decrypt password of hw_ctree.xml


JokeLFK

Recommended Posts

I have connection but only by ethernet and need the WLAN password without change it. Can someone decrypt that and explain me how to do it? Thanks.

I think the WLAN password is this: "$2xuIAFwVz>;~^djP`4EWQ}~EO+~"~nF`/^@Z<@RT7$"
Here are the lines:

<WPS X_HW_ConfigMethod="PushButton" DevicePassword="$2g!7JC8\2&apos;YHQBB/*z^zD$d)`/lnF&amp;Zwid&apos;Rh)pOO$" X_HW_PinGenerator="AP" ConfigMethodsSupported="" Enable="0" ConfigMethodsEnabled="PushButton" SetupLock="0" X_HW_TimeOut="120" DeviceName="" UUID="" LastConfigurationError="" RegistrarNumberOfEntries="0" RegistrarEstablished="0" X_HW_WPSRegistrationState=""/>
<X_HW_AdvanceConf DtimPeriod="1" BeaconPeriod="100" RTSThreshold="2346" FragThreshold="2346"/>
<WEPKey NumberOfInstances="4">
<WEPKeyInstance InstanceID="1" WEPKey="$2@-LG=b8^|UJ2Ew(6;P|*qia;M+&amp;!wCS50&amp;(41PD)$"/>
<WEPKeyInstance InstanceID="2" WEPKey="$25m^-Pe\Ok0XjTQ=w4(K&amp;QuTc:ZISnF@,xY&lt;v&quot;J3&quot;$"/>
<WEPKeyInstance InstanceID="3" WEPKey="$2K&gt;3X&amp;he%6@DF.RI#9ET;H|}@E!1xr&apos;~J5E0&lt;YTxT$"/>
<WEPKeyInstance InstanceID="4" WEPKey="$2S|zKUQEChHysT&gt;FLih4BJ@vCDl,J34yy[c~q*YhP$"/>
</WEPKey>
<PreSharedKey NumberOfInstances="1">
<PreSharedKeyInstance InstanceID="1" PreSharedKey="$2xuIAFwVz&gt;;~^djP`4EWQ}~EO+~&quot;~nF`/^@Z&lt;@RT7$" KeyPassphrase="" AssociatedDeviceMACAddress=""/>
</PreSharedKey>
<X_HW_WifiShare Enabled="0"/>
<APWMMParameter NumberOfInstances="4">
<APWMMParameterInstance InstanceID="1" AIFSN="3" ECWMin="4" ECWMax="6" TXOP="0" AckPolicy="0"/>
<APWMMParameterInstance InstanceID="2" AIFSN="7" ECWMin="4" ECWMax="10" TXOP="0" AckPolicy="0"/>
<APWMMParameterInstance InstanceID="3" AIFSN="1" ECWMin="3" ECWMax="4" TXOP="94" AckPolicy="0"/>
<APWMMParameterInstance InstanceID="4" AIFSN="1" ECWMin="2" ECWMax="3" TXOP="47" AckPolicy="0"/>
</APWMMParameter>
<STAWMMParameter NumberOfInstances="4">
<STAWMMParameterInstance InstanceID="1" AIFSN="3" ECWMin="4" ECWMax="10" TXOP="0" AckPolicy="0"/>
<STAWMMParameterInstance InstanceID="2" AIFSN="7" ECWMin="4" ECWMax="10" TXOP="0" AckPolicy="0"/>
<STAWMMParameterInstance InstanceID="3" AIFSN="2" ECWMin="3" ECWMax="4" TXOP="94" AckPolicy="0"/>
<STAWMMParameterInstance InstanceID="4" AIFSN="2" ECWMin="2" ECWMax="3" TXOP="47" AckPolicy="0"/>
</STAWMMParameter>
</WLANConfigurationInstance>
<WLANConfigurationInstance InstanceID="5" Name="ath4" Enable="1" RegulatoryDomain="CN" Standard="11na" X_HW_Standard="11ac" TransmitPower="100" Channel="0" AutoChannelEnable="1" X_HW_HT20="3" SSID="WirelessNet-5G" SSIDAdvertisementEnabled="1" MaxBitRate="auto" WMMEnable="1" BeaconType="WPAand11i" BasicEncryptionModes="None" BasicAuthenticationMode="None" WPAEncryptionModes="TKIPEncryption" WPAAuthenticationMode="PSKAuthentication" IEEE11iEncryptionModes="AESEncryption" IEEE11iAuthenticationMode="PSKAuthentication" X_HW_WPAand11iEncryptionModes="TKIPandAESEncryption" X_HW_WPAand11iAuthenticationMode="PSKAuthentication" WEPKeyIndex="1" WEPEncryptionLevel="104-bit" X_HW_RadiuServer="192.168.0.100" X_HW_RadiusPort="1812" X_HW_RadiusKey="" X_HW_GroupRekey="3600" X_HW_AssociateNum="32" X_HW_Powerlevel="5" X_HW_PowerValue="39" X_HW_WPSKeyWord="128" TotalBytesSent="0" TotalBytesReceived="0" TotalPacketsSent="0" TotalPacketsReceived="0" BSSID="" TransmitPowerSupported="20,40,60,80,100" WMMSupported="1" LowerLayers="InternetGatewayDevice.LANDevice.1.WiFi.Radio.2">
<ObjExtention>
<Enable Notify="0" AccList="Subscriber"/>
</ObjExtention>
<Stats ErrorsSent="0" ErrorsReceived="0" DiscardPacketsSent="0" DiscardPacketsReceived="0"/>
<WPS X_HW_ConfigMethod="Lable" DevicePassword="$2#=gLMQ9yrWFR9:Oi#},W,J0wHjg&apos;}DE%nEGYZ`*&lt;$" X_HW_PinGenerator="AP" ConfigMethodsSupported="PushButton Label" Enable="0"/>
<X_HW_AdvanceConf DtimPeriod="1" BeaconPeriod="100" RTSThreshold="2346" FragThreshold="2346"/>
<WEPKey NumberOfInstances="4">
<WEPKeyInstance InstanceID="1" WEPKey="$24V1hG3D3s~KnGVJ2,W|B%.x7.$S0F&amp;4l5=CI2^,V$"/>
<WEPKeyInstance InstanceID="2" WEPKey="$2VA)00-dKdWdJf*~#sME-9d+55mUMl2[.aKAZW4(G$"/>
<WEPKeyInstance InstanceID="3" WEPKey="$2Au6:3&amp;&apos;_mELea;4y*eOY&amp;~cEU+|&gt;u&lt;Xr\V2J0A9P$"/>
<WEPKeyInstance InstanceID="4" WEPKey="$2pc,S*2K9T&gt;$bhwG&apos;@`~U!\.49_*dzL}a#u7&quot;|6MY$"/>
</WEPKey>
<PreSharedKey NumberOfInstances="1">
<PreSharedKeyInstance InstanceID="1" PreSharedKey="$2b\P{&gt;Q{ngPgFvc.QoH]&lt;caTGQ|eP7!NEn&quot;Z3J@I&apos;$"/>
</PreSharedKey>

Link to comment
Share on other sites

  • 3 months later...
On 1/31/2021 at 8:31 PM, kdodge said:

There are 2 PreSharedKeyInstance entries, and it appears that they are uuencoded hashes, which decode to:


0bcc1b7b16ce1f01e65833b13e8f5c0c1d27 Cisco Type 7 / BigCrypt Hash
615a61997d9a79b7be10ac00525df175e96f Cisco Type 7 / BigCrypt Hash

But you will have to figure it out from there. 

Hey I have a similar problem but with PPPoE password. It seems it has the same encryption but I don't know how to decode it.

It is "$2/9V=XtbcpC!df;Q*******k,GS48BUI=EYs9f;Q$".

Can you explain how have you decoded these strings?

Thank you!

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...