-
-
Save staaldraad/605a5e40abaaa5915bc7 to your computer and use it in GitHub Desktop.
#!/usr/bin/python | |
""" | |
Simple tool to extract local users and passwords from most Huawei routers/firewalls config files. | |
Will extract plain-text passwords and crypted credentials. Huawei config files use DES encryption with | |
a known key. Using this information, the script will decrypt credentials found in the config file. | |
Author: Etienne Stalmans ([email protected]) | |
Version: 1.0 (12/01/2014) | |
""" | |
from Crypto.Cipher import DES | |
import sys | |
import binascii | |
def decode_char(c): | |
if c == 'a': | |
r = '?' | |
else: | |
r = c | |
return ord(r) - ord('!') | |
def ascii_to_binary(s): | |
assert len(s) == 24 | |
out = [0]*18 | |
i = 0 | |
j = 0 | |
for i in range(0, len(s), 4): | |
y = decode_char(s[i + 0]) | |
y = (y << 6) & 0xffffff | |
k = decode_char(s[i + 1]) | |
y = (y | k) & 0xffffff | |
y = (y << 6) & 0xffffff | |
k = decode_char(s[i + 2]) | |
y = (y | k) & 0xffffff | |
y = (y << 6) & 0xffffff | |
k = decode_char(s[i + 3]) | |
y = (y | k) & 0xffffff | |
out[j+2] = chr(y & 0xff) | |
out[j+1] = chr((y>>8) & 0xff) | |
out[j+0] = chr((y>>16) & 0xff) | |
j += 3 | |
return "".join(out) | |
def decrypt_password(p): | |
r = ascii_to_binary(p) | |
r = r[:16] | |
d = DES.new("\x01\x02\x03\x04\x05\x06\x07\x08", DES.MODE_ECB) | |
r = d.decrypt(r) | |
return r.rstrip("\x00") | |
f_in = open(sys.argv[1],'r') | |
print "[*] Huawei Password Decryptor" | |
for line in f_in: | |
if ('local-user' not in line) or ('password' not in line): | |
continue | |
inp = line.split() | |
print "[*]-----------------------" | |
print "\t[+] User: %s"%inp[1] | |
print "\t[+] Password type: %s"%inp[3] | |
if inp[3] == "cipher": | |
print "\t[+] Cipher: %s"%inp[4] | |
print "\t[+] Password: %s"%decrypt_password(inp[4]) | |
else: | |
print "\t[+] Password: %s"%(inp[4]) |
esto se puede desencriptar
$1c$Pv9J)NUMS4$~&,vCnflu5t<=]Ur(Lk10.XY3+5uM.E6N0TXG"v&$
Hi SwimmingTiger or anyone in this forum,
Can someone kindly help me to decrpyt this :
$2RW!aHei\s+NgXGkJJ1EJE><2[4w7Hm)0>ZnNHVMkh'|~E=r4-G5ME-5bm4)60{(<<:|1:p"N.TAi+Y7"{I<MQeM@@:Da.4:8wK$
My goal is to setup a bridge connection as the default ONT from ISP is not good enough for my usage. Currently setting up a bridge is not possible right now since myISP refuse to give the PPoE password.
$2+;wH~c[O-#PvA#-.\V]"'VC41$++18_%${$-O2k>$
you can use this web page also to decipher these passwords. https://andreluis034.github.io/huawei-utility-page/#cipher
Hello all, how i decrypt this
Password="$2f00n$%u8[D|>9n5LiO8D&yvrL)YH)O]TcMW,MLi>$"
@techfordummiesmm - I could be wrong but I think your password is ndg3347
@qatar2030
Looks like
AuthPassword = P9285FEHE
DNS Passwrod: Doha@202�"�#'��Kt�k� ,��t�k����
OR: Doha@202
No success on other three passwords, will try something later but have you already tried anything - if yes do let me know so i can have a head start on that. Also first try the above and see if that works.
@Boboaung-Myanmar - Try this 18855117
you can use this web page also to decipher these passwords. https://andreluis034.github.io/huawei-utility-page/#cipher
You, good sir, are my hero for pointing out that fabulous website. I was finally able to obtain the PPPoE password from my ISP provided router in order to bridge it to my ASUS one.
I used these two: https://andreluis034.github.io/huawei-utility-page/#cipher and Huawei configuration encryption and decryption tools.zip
However I cannot see the plain text of both results
This is my prompt: $2]Au-Q_}>09cV[jYab^xM2/S#MNQV}-ii',5EGw*LN5Sz8u1S$)PMm%7)6)z4mTO~Q(Mg'3M@{$1#3XaBaM;z<<M)-38[u!~6$Y<<$
and these are the results:
Web App: 00c8999ba600700b82d6432d0b8eb15764d5fbe54d4f8dde5be1b33bb44c24ef
Downloaded Tool: 00c8999ba600700b82d6432d0b8eb15764d5fbe54d4f8dde5be1b33bb44c24eft�k�
They seems like giving true decryption but it can't give the plain text.
Can anyone help me?
so please, what is my PPPoE pass?
64cd2624aa74439caad2c157534d296a2e3e1da229ef08d2aa5f88e0b4e12254
Hi can descript my PPPoE pass?
e46bd311bf46da89763b2859bbe47652353b37fe6fb5c19ee2ce661f1a397888
Due I used this tool but it can't decode my cipher password. It's HUAWEI switch console password. I rebooted it and got the logfile and extract the code have has been ciphered it shows $1a$[i9,QN\e<5$;^C{ChNsREuO-HT%G!];Q;=V3(^}TP4Hh}Qn{8w*$
and I tried every tool etc. bee-san and cipyed. The result of the decodings are always trash. So is there any chance to decode my password from above or else an usefull tools can do this. Thx
Can anybody decrypt this please: 30fdf15fd513fd69085f9344ff2d5d716254aa367bcac88e78ee60ad0298d606
Hi SwimmingTiger or anyone in this forum,
Can someone kindly help me to decrpyt this :
$2RW!aHei\s+Ng_XGkJJ1EJE><2[4w7Hm)0>ZnNHVMkh'|~E=r4_-G5ME-5bm4)60{(<<:|1:p"N.TAi+Y7"{I<MQeM@@:Da.4:8wK$ My goal is to setup a bridge connection as the default ONT from ISP is not good enough for my usage. Currently setting up a bridge is not possible right now since myISP refuse to give the PPoE password.
I can do it for you for free but i have to visiting you i leve in qatar بني هاجر
Hi SwimmingTiger or anyone in this forum,
Can someone kindly help me to decrpyt this : Unable to render expression.$2RW!aHei\s+Ng_XGkJJ1EJE><2[4w7Hm)0>ZnNHVMkh'|~E=r4_-G5ME-5bm4)60{(<<:|1:p"N.TAi+Y7"{I<MQeM@@:Da.4:8wK$
My goal is to setup a bridge connection as the default ONT from ISP is not good enough for my usage. Currently setting up a bridge is not possible right now since myISP refuse to give the PPoE password.
I can do it for you for free but i have to visiting you i leve in qatar بني هاجر
Hello @qatar2030 Please share your contact details i'm intersted or whatsapp me on +201123547811
Hello,
Can someone decrypt this
%$%$Tr_3Df|s6VDf6|1)A&{("KB9%$%$
%$%$N\VpOW$0S9]y*Hk\d#/>bYP%$%$6-%$%$
%$%$7k"P64W3S#_ZoB3nb3'.vKB9%$%$
%$%$oR:@125YZLqM,41mdg"DE
%$%$TyIDAD_l6Hk[vx<Z5fQPYpg^%$%$
%$%$HIWgCp$,qHg).|3(&Eb<{6-%$%$kzE@*4j70WhWNE%$%$
%$%$HP.RQA%Ba
from a Eudemon1000E-X5
Hello, Can someone decrypt this
Hi there! Any reason you're not decrypting it yourself?
Hi guys has anyone teste Encryption and Decryption on Huawei AX2 wifi6 routers? it seems the user is allways the same: admin.. just password on input menu login screen.. i have managed to analyze with F12 network traffic.. and it has 2 requests.. user_login_nonce, and user_login_proof which returns a RSAE : 010001 and RSA_N public modulus and RSA signature and Server signature keys , together with CSRF tokens for security protection.. on the user_login_nonce the password seems to be encripted.. and we can only see a SALT key info
hello, can anyone decript this?
local-user root password irreversible-cipher g-1CeT32Y$..R"-F[fW<;W15,m-yn>.Y.-J>{wC@@
Q|,!+Q&G$
can anyone decrypt that:
What is SU button function on GUI I ever try $1 and $2 only
I don't know.
Where i can find this GUI ?
sorry for inconviniace,
What is SU button function on GUI I ever try $1 and $2 only
I don't know.
Where i can find this GUI ?
Thanks
@Boboaung-Myanmar - Try this 18855117
$2M^7i5]ps.KDN0XI>kLtUo{cZ~\ZMZ2R.*.POxM|2t-Z'6"e{P~e6WM9D^[l)DtF8(_]48(b$v9WjPQ,&+0fO>c'Nb/_b||6$;,rR$
Can you helpme ser
sorry for inconviniace,
What is SU button function on GUI I ever try $1 and $2 only
I don't know.
Where i can find this GUI ?
Thanks
$2M^7i5]ps.KDN0XI>kLtUo{cZ~\ZMZ2R.*.POxM|2t-Z'6"e{P~e6WM9D^[l)DtF8(_]48(b$v9WjPQ,&+0fO>c'Nb/_b||6$;,rR$
Can you helpme ser
Hello!
It it possible to decrypt this one?
$1c$nIyL.#{5F2$TzF'@"gEaH_mJb*Vd>fBD"px&M1'i1aOXF:ptG:E$
Thank you in advance!
for dg 8245
i need Administrator user and password
i search through notpade and this what i get
UserName="vodadsl" Password="41a69149e63df1ce83234fc39a70caeab11eed3d390629ca7cffc2dcd327480b" UserLevel="0" Enable="1" ModifyPasswordFlag="0"
i need to decrypt the password
$2GACZYhI-vIoR>v/Cdi:7dkP=;9/(HKvZ2UK[5,]AA9ALE\Z%.S*&iVCn216/StW,(M%
'bpB{@[jdL!1:Be=`9P*Ky}2(&|=jsR$
pls
i tried the site, it doesnt give a good result:
https://andreluis034.github.io/huawei-utility-page/#cipher
$2#$A:@i5s+L7OAK/KQ.r9gfB`5v,-S%T=rz~&0[6I:Zt,<Rvhz):[v3(*"K@(OMJMf<*aA1z#1KIlO4LUwr,FX$5D||9s)E#|%0$
Result: bbf2073ca9c495606fe49628cffef83e0dfce8dc29270703b3c6709e14029911
Hi everyone,
I really appreciate the work that has gone into these tools. I have successfully- I say "successfully" because when I upload the altered configuration file to the modem (HG8145V5), it gives me a green check mark, reboots and in the log there is no mention of the modem reverting back to another configuration file- the problem is that if I download the config file, decrypt that file and look at it, it's the same as the original config file set by the ISP. None of my new passwords/access level privilege changes have have been retained. My goal is to setup my on VOIP ATA behind my router using the ISP's credentials (they provide internet and VOIP service), as well as have my modem in bridge mode. Any recommendations on forcing the modem to retain the new configuration file? Thank you.