ESSID: MGTS-11 BSSID: FC:48:EF:A1:C1:C9 https://transfiles.ru/697mb ESSID: Home BSSID: 00:26:18:81:88:50 PMKID https://transfiles.ru/69c8k Cпасибо!
ESSID DON`T ENTER BSSID 88:BD:09:56:20:CE \ цифры 8 знаков прогнал, не нашел(( Может кто найдет, спасибо заранее!
ESSID = ZTE_2.4G_ch2Yzt BSSID = 34:36:54:A5:0A:EA https://transfiles.ru/00v3r ESSID = ZTE_2.4G_ch2Yzt-2.4G-ext BSSID = DC:4A:9E3:C6:E8 https://transfiles.ru/260jo Вероятно, 8 буквенно-цифровых символов. Заранее спасибо!
ESSID: TP-Link_9DCB BSSID: 90:9A:4A:BF:9D:CB ESSID: TP-Link_E7DD BSSID: E4:FA:C4:AC:E7:DD ESSID: TP-Link_BDC4 BSSID: 68:FF:7B:10:BD:C4 https://transfiles.ru/3u7n4 Заранрее Большое спасибо)
Hello all! I just completed the reverse engineering of some Rotek firmwares. I do not know if this is the correct thread. Please feel free to move. https://forum.hashkiller.io/index.php?threads/unpublished-wpa-key-algorithms.19944/post-353899 The default wifi passwords for models RX-22300, RX-22311, RX-23311 and RX-33412 with ESSID RT-WIFI-HHHH and RT-WIFI-GPON-HHHH are created using rotek_keygen2 (in python found here https://github.com/PlumLulz/rotek_keygen2) The rotek_keygen3 is for RX-22200 and RX-22301 with ESSID WIFI-DOM.ru-DDDD found here https://github.com/PlumLulz/rotek_keygen3 Still working on some other models. Have fun and good luck!
ESSID=MTSRouter_110105 BSSID=08:c6:b3:b7:da:5d https://transfiles.ru/w6c7q ESSID=TP-Link_B26D BSSID=5c:e9:31:c9:b2:6d https://transfiles.ru/kgnkd