JokeLFK Posted January 29, 2021 Share Posted January 29, 2021 I have connection but only by ethernet and need the WLAN password without change it. Can someone decrypt that and explain me how to do it? Thanks. I think the WLAN password is this: "$2xuIAFwVz>;~^djP`4EWQ}~EO+~"~nF`/^@Z<@RT7$" Here are the lines: <WPS X_HW_ConfigMethod="PushButton" DevicePassword="$2g!7JC8\2'YHQBB/*z^zD$d)`/lnF&Zwid'Rh)pOO$" X_HW_PinGenerator="AP" ConfigMethodsSupported="" Enable="0" ConfigMethodsEnabled="PushButton" SetupLock="0" X_HW_TimeOut="120" DeviceName="" UUID="" LastConfigurationError="" RegistrarNumberOfEntries="0" RegistrarEstablished="0" X_HW_WPSRegistrationState=""/> <X_HW_AdvanceConf DtimPeriod="1" BeaconPeriod="100" RTSThreshold="2346" FragThreshold="2346"/> <WEPKey NumberOfInstances="4"> <WEPKeyInstance InstanceID="1" WEPKey="$2@-LG=b8^|UJ2Ew(6;P|*qia;M+&!wCS50&(41PD)$"/> <WEPKeyInstance InstanceID="2" WEPKey="$25m^-Pe\Ok0XjTQ=w4(K&QuTc:ZISnF@,xY<v"J3"$"/> <WEPKeyInstance InstanceID="3" WEPKey="$2K>3X&he%6@DF.RI#9ET;H|}@E!1xr'~J5E0<YTxT$"/> <WEPKeyInstance InstanceID="4" WEPKey="$2S|zKUQEChHysT>FLih4BJ@vCDl,J34yy[c~q*YhP$"/> </WEPKey> <PreSharedKey NumberOfInstances="1"> <PreSharedKeyInstance InstanceID="1" PreSharedKey="$2xuIAFwVz>;~^djP`4EWQ}~EO+~"~nF`/^@Z<@RT7$" KeyPassphrase="" AssociatedDeviceMACAddress=""/> </PreSharedKey> <X_HW_WifiShare Enabled="0"/> <APWMMParameter NumberOfInstances="4"> <APWMMParameterInstance InstanceID="1" AIFSN="3" ECWMin="4" ECWMax="6" TXOP="0" AckPolicy="0"/> <APWMMParameterInstance InstanceID="2" AIFSN="7" ECWMin="4" ECWMax="10" TXOP="0" AckPolicy="0"/> <APWMMParameterInstance InstanceID="3" AIFSN="1" ECWMin="3" ECWMax="4" TXOP="94" AckPolicy="0"/> <APWMMParameterInstance InstanceID="4" AIFSN="1" ECWMin="2" ECWMax="3" TXOP="47" AckPolicy="0"/> </APWMMParameter> <STAWMMParameter NumberOfInstances="4"> <STAWMMParameterInstance InstanceID="1" AIFSN="3" ECWMin="4" ECWMax="10" TXOP="0" AckPolicy="0"/> <STAWMMParameterInstance InstanceID="2" AIFSN="7" ECWMin="4" ECWMax="10" TXOP="0" AckPolicy="0"/> <STAWMMParameterInstance InstanceID="3" AIFSN="2" ECWMin="3" ECWMax="4" TXOP="94" AckPolicy="0"/> <STAWMMParameterInstance InstanceID="4" AIFSN="2" ECWMin="2" ECWMax="3" TXOP="47" AckPolicy="0"/> </STAWMMParameter> </WLANConfigurationInstance> <WLANConfigurationInstance InstanceID="5" Name="ath4" Enable="1" RegulatoryDomain="CN" Standard="11na" X_HW_Standard="11ac" TransmitPower="100" Channel="0" AutoChannelEnable="1" X_HW_HT20="3" SSID="WirelessNet-5G" SSIDAdvertisementEnabled="1" MaxBitRate="auto" WMMEnable="1" BeaconType="WPAand11i" BasicEncryptionModes="None" BasicAuthenticationMode="None" WPAEncryptionModes="TKIPEncryption" WPAAuthenticationMode="PSKAuthentication" IEEE11iEncryptionModes="AESEncryption" IEEE11iAuthenticationMode="PSKAuthentication" X_HW_WPAand11iEncryptionModes="TKIPandAESEncryption" X_HW_WPAand11iAuthenticationMode="PSKAuthentication" WEPKeyIndex="1" WEPEncryptionLevel="104-bit" X_HW_RadiuServer="192.168.0.100" X_HW_RadiusPort="1812" X_HW_RadiusKey="" X_HW_GroupRekey="3600" X_HW_AssociateNum="32" X_HW_Powerlevel="5" X_HW_PowerValue="39" X_HW_WPSKeyWord="128" TotalBytesSent="0" TotalBytesReceived="0" TotalPacketsSent="0" TotalPacketsReceived="0" BSSID="" TransmitPowerSupported="20,40,60,80,100" WMMSupported="1" LowerLayers="InternetGatewayDevice.LANDevice.1.WiFi.Radio.2"> <ObjExtention> <Enable Notify="0" AccList="Subscriber"/> </ObjExtention> <Stats ErrorsSent="0" ErrorsReceived="0" DiscardPacketsSent="0" DiscardPacketsReceived="0"/> <WPS X_HW_ConfigMethod="Lable" DevicePassword="$2#=gLMQ9yrWFR9:Oi#},W,J0wHjg'}DE%nEGYZ`*<$" X_HW_PinGenerator="AP" ConfigMethodsSupported="PushButton Label" Enable="0"/> <X_HW_AdvanceConf DtimPeriod="1" BeaconPeriod="100" RTSThreshold="2346" FragThreshold="2346"/> <WEPKey NumberOfInstances="4"> <WEPKeyInstance InstanceID="1" WEPKey="$24V1hG3D3s~KnGVJ2,W|B%.x7.$S0F&4l5=CI2^,V$"/> <WEPKeyInstance InstanceID="2" WEPKey="$2VA)00-dKdWdJf*~#sME-9d+55mUMl2[.aKAZW4(G$"/> <WEPKeyInstance InstanceID="3" WEPKey="$2Au6:3&'_mELea;4y*eOY&~cEU+|>u<Xr\V2J0A9P$"/> <WEPKeyInstance InstanceID="4" WEPKey="$2pc,S*2K9T>$bhwG'@`~U!\.49_*dzL}a#u7"|6MY$"/> </WEPKey> <PreSharedKey NumberOfInstances="1"> <PreSharedKeyInstance InstanceID="1" PreSharedKey="$2b\P{>Q{ngPgFvc.QoH]<caTGQ|eP7!NEn"Z3J@I'$"/> </PreSharedKey> Quote Link to comment Share on other sites More sharing options...
jmmc Posted May 9, 2021 Share Posted May 9, 2021 On 1/31/2021 at 8:31 PM, kdodge said: There are 2 PreSharedKeyInstance entries, and it appears that they are uuencoded hashes, which decode to: 0bcc1b7b16ce1f01e65833b13e8f5c0c1d27 Cisco Type 7 / BigCrypt Hash 615a61997d9a79b7be10ac00525df175e96f Cisco Type 7 / BigCrypt Hash But you will have to figure it out from there. Hey I have a similar problem but with PPPoE password. It seems it has the same encryption but I don't know how to decode it. It is "$2/9V=XtbcpC!df;Q*******k,GS48BUI=EYs9f;Q$". Can you explain how have you decoded these strings? Thank you! Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.