Open erentomurcuk opened 11 months ago
(Have not tried rebuilding the file.)
Rebuilding of a decrypted binary config file of an Archer MR600V2 was successful and the file hash was identical:
decrypt to xml using option littleendian:
python3 tpconf_bin_xml.py -l conf.bin conf.xml
encrypt back to bin using options littleendian and skiphits:
python3 tpconf_bin_xml.py -l -s conf.xml conf.bin
Without the option skiphits
the resulting file was not identical to the original binary.
Rebuilding of a decrypted binary config file of an Archer MR600V2 was successful and the file hash was identical:
decrypt to xml using option littleendian:
python3 tpconf_bin_xml.py -l conf.bin conf.xml
encrypt back to bin using options littleendian and skiphits:
python3 tpconf_bin_xml.py -l -s conf.xml conf.bin
Without the option
skiphits
the resulting file was not identical to the original binary.
Works exactly like that on the Archer MR500 v1/MR550 v1 :) @sta-c0000 can be added to readme
Archer VR400 v3 can be added into the list of working modems for decryption of the file. Firmware version tested: 1.5.0