diff --git a/break_script/automated_attack.py b/break_script/automated_attack.py index d75a230..6e13ed9 100755 --- a/break_script/automated_attack.py +++ b/break_script/automated_attack.py @@ -144,7 +144,7 @@ while len(key) < 16: else: break -encrypted_adminpw = bytes([0xe3, 0x07, 0x2e, 0x9f, 0x5b, 0xe8, 0xed, 0xd6, 0x02, 0xab, 0x89, 0xb8, 0xeb, 0x49, 0xcc, 0x56]) +encrypted_adminpw = bytes([0x95, 0x22, 0x28, 0xf3, 0x90, 0xa6, 0x0b, 0xd2, 0x5d, 0x61, 0xdd, 0x1e, 0xdf, 0x39, 0x44, 0x7b]) aes = AES.new(bytes(key), AES.MODE_ECB) adminpw = aes.decrypt(encrypted_adminpw) remotes[0].send("login\nadmin\n") diff --git a/key.txt b/key.txt index f01fd5d..16222d2 100644 --- a/key.txt +++ b/key.txt @@ -1 +1 @@ -A0 7C 3D 99 FA 00 02 46 97 33 73 50 31 7C D3 DC \ No newline at end of file +8f 31 d2 39 c9 7f 5d 60 ac 29 91 ec 6b 8e df 54 diff --git a/main.cpp b/main.cpp index 37818ff..f6e2d0b 100644 --- a/main.cpp +++ b/main.cpp @@ -63,7 +63,7 @@ void login() encrypted_password[i] = password[i]; } AES::encrypt_ecb(encrypted_password, key); - uint8_t rootpw[16] = {0xe3, 0x07, 0x2e, 0x9f, 0x5b, 0xe8, 0xed, 0xd6, 0x02, 0xab, 0x89, 0xb8, 0xeb, 0x49, 0xcc, 0x56}; + uint8_t rootpw[16] = {0x95, 0x22, 0x28, 0xf3, 0x90, 0xa6, 0x0b, 0xd2, 0x5d, 0x61, 0xdd, 0x1e, 0xdf, 0x39, 0x44, 0x7b}; for (int i = 0;i < 16;i++) { if (encrypted_password[i] != rootpw[i])