找回密码
 注册

QQ登录

只需一步,快速开始

楼主: ahww

[教程] hw_ctree.xml文件无法解密

[复制链接]
 楼主| 发表于 2024-10-21 23:51:01 | 显示全部楼层
改成与超密一样的字符串也不行。
发表于 2024-10-22 00:26:37 | 显示全部楼层
  1. @Echo off
  2. echo set sh=WScript.CreateObject("WScript.Shell") >tmp.vbs
  3. echo WScript.Sleep 1000 >>tmp.vbs
  4. echo sh.SendKeys "open 192.168.1.1{ENTER}" >>tmp.vbs
  5. echo WScript.Sleep 1000 >>tmp.vbs
  6. echo sh.SendKeys "root{ENTER}" >>tmp.vbs
  7. echo WScript.Sleep 1000 >>tmp.vbs
  8. echo sh.SendKeys "adminHW{ENTER}" >>tmp.vbs
  9. echo WScript.Sleep 1000 >>tmp.vbs
  10. echo sh.SendKeys "su{ENTER}" >>tmp.vbs
  11. echo WScript.Sleep 1000 >>tmp.vbs
  12. echo sh.SendKeys "shell{ENTER}" >>tmp.vbs
  13. echo WScript.Sleep 1000 >>tmp.vbs
  14. echo sh.SendKeys "cp /mnt/jffs2/hw_ctree.xml /mnt/jffs2/mycfg.xml.gz {ENTER}" >>tmp.vbs
  15. echo WScript.Sleep 1000 >>tmp.vbs
  16. echo sh.SendKeys "cd /mnt/jffs2{ENTER}" >>tmp.vbs
  17. echo WScript.Sleep 1000 >>tmp.vbs
  18. echo sh.SendKeys "aescrypt2 1 mycfg.xml.gz tem{ENTER}" >>tmp.vbs
  19. echo WScript.Sleep 1000 >>tmp.vbs
  20. echo sh.SendKeys "gzip -d mycfg.xml.gz{ENTER}" >>tmp.vbs
  21. echo WScript.Sleep 1000 >>tmp.vbs
  22. echo sh.SendKeys "grep WebUserInfoInstance mycfg.xml{ENTER}" >>tmp.vbs
  23. echo WScript.Sleep 1000 >>tmp.vbs
  24. echo sh.SendKeys "rm mycfg.xml{ENTER}" >>tmp.vbs
  25. echo WScript.Sleep 1000 >>tmp.vbs
  26. start telnet
  27. cscript //nologo tmp.vbs
  28. del tmp.vbs
复制代码
 楼主| 发表于 2024-10-23 10:29:28 | 显示全部楼层
Marken888 发表于 2024-10-21 20:21
这不清楚,听说加密方式是哈希值,还原不回去的,改成跟超密一样试试看吧 ...

试了,无效。
 楼主| 发表于 2024-10-23 10:32:22 | 显示全部楼层
 楼主| 发表于 2024-10-23 11:24:13 | 显示全部楼层

不行,解出的密码部分仍是乱码或仍是加密的,如下:
<X_HW_WebUserInfoInstance InstanceID="1" UserName="root" Password="$2-{\&gt;L;OTS5*&amp;&gt;#YL[BsO`ghKA&lt;}TG#5]PEH[Gq|HvXVO2-vBfRGJD;2iK;$1f8&amp;I*&lt;E[$WqX&quot;0&quot;2Z@c~2o$_6scL#5q&quot;~k=V3`,U$" UserLevel="1" Enable="1" ModifyPasswordFlag="1" Salt="01efce6ddd3feac23ed85bad" PassMode="3" Alias="cpe-1"/>
<X_HW_WebUserInfoInstance InstanceID="2" UserName="telecomadmin" Password="$2/(E|7D&lt;JPDgbtLSQvg9W{/2^LKnb#P&lt;Yn/Z18G2NPC%.4&quot;OaL&quot;|~ayHm`vCCV7&lt;6Us^LZ)uSoH*wVWI&amp;Rh&lt;BL&amp;p^JUj/N,S*]6E$$" UserLevel="0" Enable="1" ModifyPasswordFlag="0" Salt="d4e109ad12d6ed238fb8eee1" PassMode="3" Alias="cpe-2"/>
 楼主| 发表于 2024-10-23 11:25:39 | 显示全部楼层

试了,不行,密码部分仍是一长串各种各样的字符
<X_HW_WebUserInfoInstance InstanceID="1" UserName="root" Password="$2-{\&gt;L;OTS5*&amp;&gt;#YL[BsO`ghKA&lt;}TG#5]PEH[Gq|HvXVO2-vBfRGJD;2iK;$1f8&amp;I*&lt;E[$WqX&quot;0&quot;2Z@c~2o$_6scL#5q&quot;~k=V3`,U$" UserLevel="1" Enable="1" ModifyPasswordFlag="1" Salt="01efce6ddd3feac23ed85bad" PassMode="3" Alias="cpe-1"/>
<X_HW_WebUserInfoInstance InstanceID="2" UserName="telecomadmin" Password="$2/(E|7D&lt;JPDgbtLSQvg9W{/2^LKnb#P&lt;Yn/Z18G2NPC%.4&quot;OaL&quot;|~ayHm`vCCV7&lt;6Us^LZ)uSoH*wVWI&amp;Rh&lt;BL&amp;p^JUj/N,S*]6E$$" UserLevel="0" Enable="1" ModifyPasswordFlag="0" Salt="d4e109ad12d6ed238fb8eee1" PassMode="3" Alias="cpe-2"/>
发表于 2024-10-23 14:35:28 | 显示全部楼层
本帖最后由 358954592 于 2024-10-23 20:07 编辑

还原后的密码是保存在hw_default_ctree.xml文件里的,把这个问价下载下来解析一下,
<X_HW_WebUserInfo NumberOfInstances="2">
<X_HW_WebUserInfoInstance InstanceID="1" ModifyPasswordFlag="0" UserName="useradmin" Password="r37us" UserLevel="1" Enable="1"/>         \\光猫背后的用户名密码
<X_HW_WebUserInfoInstance InstanceID="2" ModifyPasswordFlag="0" UserName="telecomadmin" Password="nE7jA%5m" UserLevel="0" Enable="1"/>  \\超级密码

改成你想要的密码,加密后上传。然后再恢复出厂设置。
*滑块验证:
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|小黑屋|宽带技术网 |网站地图 粤公网安备44152102000001号

GMT+8, 2025-8-1 07:01 , Processed in 0.025980 second(s), 3 queries , Redis On.

Powered by Discuz! X3.5 Licensed

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表