JFC-Group / JF-Customisation

Firmwares, Tips and Tricks regarding JF
139 stars 36 forks source link

Decryption not working: ARCNTF1_JCOW411_R2.29 #34

Closed lscambo13 closed 2 months ago

lscambo13 commented 10 months ago

command used after generating key from keyguesser.py:

openssl aes-128-cbc -d -pass file:key-success.txt -in RAROTKH00053021_JCOW411.enc -out RAROTKH00053021_JCOW411.txt

output:

*** WARNING : deprecated key derivation used.
Using -iter or -pbkdf2 would be better.

Problem: the decrypted txt file is still just a garbled text.

Firmware Version: ARCNTF1_JCOW411_R2.29

Internet suggested to use LibreSSL, but I couldn't get the windows version to work. I don't have a mac.

Vshindou commented 5 months ago

open the keyguesser.py make the following changes

  1. Open your key.txt
  2. Check the text after routerSSID in the key.txt.
  3. Add these to the keyString variable as shown below

keyStrings = ["1n0NaZQnC9oxcfwf", "us4AQiJAgbj0Fmxq", "NTqK8Ps5iFke8zrp", "bfqerloC15y79WQZ", "9gNzEbuDjtyT9Pyc", "uuphsZuO92AZW5GJ", "qdySWmmvYKdBcO53", "Q7ODauKsxUAUtbR7", "Kohgiem4joochei3","XXXXXXXXXX"]

  1. Here replace the X with your characters mine was 10 char long yours might be longer or shorter
  2. Save keyguesser.py and run it again
  3. It gives that key depreciated error that can be ignored
itsyourap commented 2 months ago

Closing due to no activity