Добавить
Уведомления

Extracting 802.1x from NVG589 via Rooting

Gist Guide: https://gist.github.com/Archerious/a10bd3627b9a2c187c9be621db2e062b Github Guide: https://github.com/Archerious/at #extract-certificates ------------------------------------------------ Download Putty: https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html Download 7zip: https://www.7-zip.org/download.html --------------------------------------- Download mfg.dat decoder v1.0.4: Windows: https://github.com/Archerious/att/blob/master/decoder/win/mfg_dat_decode_1_04.zip Linux: https://github.com/Archerious/att/blob/master/decoder/linux/mfg_dat_decode_1_04.tar.gz Mac OS: https://github.com/Archerious/att/blob/master/decoder/mac/mfg_dat_decode_1_04_macosx.zip -------------------------------------------- # # ##This enables SSH Upgrade to 9.2.2h4d16: https://github.com/Archerious/att/blob/master/firmware/nvg589/spnvg589-9.2.2h4d16.bin ######This allows us to obtain a shell via SSH which was previously disabled Downgrade back to 9.2.2h0d83: https://github.com/Archerious/att/blob/master/firmware/nvg589/spnvg589-9.2.2h0d83.bin ------------------------------------------ SSH via putty or terminal: remotessh@192.168.1.254 | password: 5SaP9I26 Run the three commands (youtube wont let me paste them), then exit ssh. Reconnect to the NVG589 using SSH via Putty, then type the "!" (without quotations) and press enter. That should give you a shell. Run the last commands (mount cd cp etc) then click on the two links below and download the cert.tar and save the mfg.dat page. http://192.168.1.254/images/cert.tar http://192.168.1.254/images/mfg.dat Remove any .txt that windows might have added to mfg.dat. Copy mfg.dat, unzip cert.tar to the same location as mfg_dat_decode. Delete cert.tar after extracting the .der files. Run mfg_dat_decode. You should get a file like this: EAP-TLS_8021x_XXXX. ----------------------------- You're all done.

Иконка канала ТехноРешения
5 подписчиков
12+
16 просмотров
2 года назад
12+
16 просмотров
2 года назад

Gist Guide: https://gist.github.com/Archerious/a10bd3627b9a2c187c9be621db2e062b Github Guide: https://github.com/Archerious/at #extract-certificates ------------------------------------------------ Download Putty: https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html Download 7zip: https://www.7-zip.org/download.html --------------------------------------- Download mfg.dat decoder v1.0.4: Windows: https://github.com/Archerious/att/blob/master/decoder/win/mfg_dat_decode_1_04.zip Linux: https://github.com/Archerious/att/blob/master/decoder/linux/mfg_dat_decode_1_04.tar.gz Mac OS: https://github.com/Archerious/att/blob/master/decoder/mac/mfg_dat_decode_1_04_macosx.zip -------------------------------------------- # # ##This enables SSH Upgrade to 9.2.2h4d16: https://github.com/Archerious/att/blob/master/firmware/nvg589/spnvg589-9.2.2h4d16.bin ######This allows us to obtain a shell via SSH which was previously disabled Downgrade back to 9.2.2h0d83: https://github.com/Archerious/att/blob/master/firmware/nvg589/spnvg589-9.2.2h0d83.bin ------------------------------------------ SSH via putty or terminal: remotessh@192.168.1.254 | password: 5SaP9I26 Run the three commands (youtube wont let me paste them), then exit ssh. Reconnect to the NVG589 using SSH via Putty, then type the "!" (without quotations) and press enter. That should give you a shell. Run the last commands (mount cd cp etc) then click on the two links below and download the cert.tar and save the mfg.dat page. http://192.168.1.254/images/cert.tar http://192.168.1.254/images/mfg.dat Remove any .txt that windows might have added to mfg.dat. Copy mfg.dat, unzip cert.tar to the same location as mfg_dat_decode. Delete cert.tar after extracting the .der files. Run mfg_dat_decode. You should get a file like this: EAP-TLS_8021x_XXXX. ----------------------------- You're all done.

, чтобы оставлять комментарии