Jump to content

Can someone Help me to Decrypt password of hw_ctree.xml


JokeLFK

Recommended Posts

I have connection but only by ethernet and need the WLAN password without change it. Can someone decrypt that and explain me how to do it? Thanks.

I think the WLAN password is this: "$2xuIAFwVz>;~^djP`4EWQ}~EO+~"~nF`/^@Z<@RT7$"
Here are the lines:

<WPS X_HW_ConfigMethod="PushButton" DevicePassword="$2g!7JC8\2&apos;YHQBB/*z^zD$d)`/lnF&amp;Zwid&apos;Rh)pOO$" X_HW_PinGenerator="AP" ConfigMethodsSupported="" Enable="0" ConfigMethodsEnabled="PushButton" SetupLock="0" X_HW_TimeOut="120" DeviceName="" UUID="" LastConfigurationError="" RegistrarNumberOfEntries="0" RegistrarEstablished="0" X_HW_WPSRegistrationState=""/>
<X_HW_AdvanceConf DtimPeriod="1" BeaconPeriod="100" RTSThreshold="2346" FragThreshold="2346"/>
<WEPKey NumberOfInstances="4">
<WEPKeyInstance InstanceID="1" WEPKey="$2@-LG=b8^|UJ2Ew(6;P|*qia;M+&amp;!wCS50&amp;(41PD)$"/>
<WEPKeyInstance InstanceID="2" WEPKey="$25m^-Pe\Ok0XjTQ=w4(K&amp;QuTc:ZISnF@,xY&lt;v&quot;J3&quot;$"/>
<WEPKeyInstance InstanceID="3" WEPKey="$2K&gt;3X&amp;he%6@DF.RI#9ET;H|}@E!1xr&apos;~J5E0&lt;YTxT$"/>
<WEPKeyInstance InstanceID="4" WEPKey="$2S|zKUQEChHysT&gt;FLih4BJ@vCDl,J34yy[c~q*YhP$"/>
</WEPKey>
<PreSharedKey NumberOfInstances="1">
<PreSharedKeyInstance InstanceID="1" PreSharedKey="$2xuIAFwVz&gt;;~^djP`4EWQ}~EO+~&quot;~nF`/^@Z&lt;@RT7$" KeyPassphrase="" AssociatedDeviceMACAddress=""/>
</PreSharedKey>
<X_HW_WifiShare Enabled="0"/>
<APWMMParameter NumberOfInstances="4">
<APWMMParameterInstance InstanceID="1" AIFSN="3" ECWMin="4" ECWMax="6" TXOP="0" AckPolicy="0"/>
<APWMMParameterInstance InstanceID="2" AIFSN="7" ECWMin="4" ECWMax="10" TXOP="0" AckPolicy="0"/>
<APWMMParameterInstance InstanceID="3" AIFSN="1" ECWMin="3" ECWMax="4" TXOP="94" AckPolicy="0"/>
<APWMMParameterInstance InstanceID="4" AIFSN="1" ECWMin="2" ECWMax="3" TXOP="47" AckPolicy="0"/>
</APWMMParameter>
<STAWMMParameter NumberOfInstances="4">
<STAWMMParameterInstance InstanceID="1" AIFSN="3" ECWMin="4" ECWMax="10" TXOP="0" AckPolicy="0"/>
<STAWMMParameterInstance InstanceID="2" AIFSN="7" ECWMin="4" ECWMax="10" TXOP="0" AckPolicy="0"/>
<STAWMMParameterInstance InstanceID="3" AIFSN="2" ECWMin="3" ECWMax="4" TXOP="94" AckPolicy="0"/>
<STAWMMParameterInstance InstanceID="4" AIFSN="2" ECWMin="2" ECWMax="3" TXOP="47" AckPolicy="0"/>
</STAWMMParameter>
</WLANConfigurationInstance>
<WLANConfigurationInstance InstanceID="5" Name="ath4" Enable="1" RegulatoryDomain="CN" Standard="11na" X_HW_Standard="11ac" TransmitPower="100" Channel="0" AutoChannelEnable="1" X_HW_HT20="3" SSID="WirelessNet-5G" SSIDAdvertisementEnabled="1" MaxBitRate="auto" WMMEnable="1" BeaconType="WPAand11i" BasicEncryptionModes="None" BasicAuthenticationMode="None" WPAEncryptionModes="TKIPEncryption" WPAAuthenticationMode="PSKAuthentication" IEEE11iEncryptionModes="AESEncryption" IEEE11iAuthenticationMode="PSKAuthentication" X_HW_WPAand11iEncryptionModes="TKIPandAESEncryption" X_HW_WPAand11iAuthenticationMode="PSKAuthentication" WEPKeyIndex="1" WEPEncryptionLevel="104-bit" X_HW_RadiuServer="192.168.0.100" X_HW_RadiusPort="1812" X_HW_RadiusKey="" X_HW_GroupRekey="3600" X_HW_AssociateNum="32" X_HW_Powerlevel="5" X_HW_PowerValue="39" X_HW_WPSKeyWord="128" TotalBytesSent="0" TotalBytesReceived="0" TotalPacketsSent="0" TotalPacketsReceived="0" BSSID="" TransmitPowerSupported="20,40,60,80,100" WMMSupported="1" LowerLayers="InternetGatewayDevice.LANDevice.1.WiFi.Radio.2">
<ObjExtention>
<Enable Notify="0" AccList="Subscriber"/>
</ObjExtention>
<Stats ErrorsSent="0" ErrorsReceived="0" DiscardPacketsSent="0" DiscardPacketsReceived="0"/>
<WPS X_HW_ConfigMethod="Lable" DevicePassword="$2#=gLMQ9yrWFR9:Oi#},W,J0wHjg&apos;}DE%nEGYZ`*&lt;$" X_HW_PinGenerator="AP" ConfigMethodsSupported="PushButton Label" Enable="0"/>
<X_HW_AdvanceConf DtimPeriod="1" BeaconPeriod="100" RTSThreshold="2346" FragThreshold="2346"/>
<WEPKey NumberOfInstances="4">
<WEPKeyInstance InstanceID="1" WEPKey="$24V1hG3D3s~KnGVJ2,W|B%.x7.$S0F&amp;4l5=CI2^,V$"/>
<WEPKeyInstance InstanceID="2" WEPKey="$2VA)00-dKdWdJf*~#sME-9d+55mUMl2[.aKAZW4(G$"/>
<WEPKeyInstance InstanceID="3" WEPKey="$2Au6:3&amp;&apos;_mELea;4y*eOY&amp;~cEU+|&gt;u&lt;Xr\V2J0A9P$"/>
<WEPKeyInstance InstanceID="4" WEPKey="$2pc,S*2K9T&gt;$bhwG&apos;@`~U!\.49_*dzL}a#u7&quot;|6MY$"/>
</WEPKey>
<PreSharedKey NumberOfInstances="1">
<PreSharedKeyInstance InstanceID="1" PreSharedKey="$2b\P{&gt;Q{ngPgFvc.QoH]&lt;caTGQ|eP7!NEn&quot;Z3J@I&apos;$"/>
</PreSharedKey>

Link to comment
Share on other sites

  • 3 months later...
On 1/31/2021 at 8:31 PM, kdodge said:

There are 2 PreSharedKeyInstance entries, and it appears that they are uuencoded hashes, which decode to:


0bcc1b7b16ce1f01e65833b13e8f5c0c1d27 Cisco Type 7 / BigCrypt Hash
615a61997d9a79b7be10ac00525df175e96f Cisco Type 7 / BigCrypt Hash

But you will have to figure it out from there. 

Hey I have a similar problem but with PPPoE password. It seems it has the same encryption but I don't know how to decode it.

It is "$2/9V=XtbcpC!df;Q*******k,GS48BUI=EYs9f;Q$".

Can you explain how have you decoded these strings?

Thank you!

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...