[color=rgba(0, 0, 0, 0.84)]Today I will teach you how to obtain the root password from a WiFi router firmware image. [color=rgba(0, 0, 0, 0.84)]Why I would waste my time in doing so? - Root passwords from a firmware can be used in some circumstances to obtain access to a router system via an serial port or other services.
- Potential backdoor left by developers as found here:
Gas Stations Hardcoded Passwords (CVE-2017–14728)- This tutorial is intended to be a basic one in order to learn fun and useful stuff
- Good for CTF training.
[color=rgba(0, 0, 0, 0.84)]Steps to getting the password:
- binwalk -e wr740nv7_eu_3_16_9_up_boot\(160708\).bin
before binwalk -e
after binwalk -e- Go to “_wr740nv7_eu_3_16_9_up_boot(160708).bin.extracted/squashfs-root/etc/” and open shadow file.
- Bruteforce or obtain from Google the equivalent password for the given hash.
[color=rgba(0, 0, 0, 0.84)]In other words: [color=rgba(0, 0, 0, 0.84)] The password for the given hash (root1$GTN.gpri$DlSyKvZKMR9A9Uj9e9wR3/:15502:0:99999:7:: is squal to “shoadmin”.
|