Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TP-Link POC #1

Open
theweefies opened this issue Nov 7, 2024 · 7 comments
Open

TP-Link POC #1

theweefies opened this issue Nov 7, 2024 · 7 comments

Comments

@theweefies
Copy link

Is there a planned release for the TP-Link and other remaining manufacturer write-ups/PoCs? Really enjoyed seeing your work at BlackHat and have been looking forward to seeing the other PoCs. Thanks!

@zhouxinan
Copy link
Collaborator

Thank you for asking! Yes, we will try adding other exploits hopefully this weekend. Sorry for the delay.

@theweefies
Copy link
Author

Thank you for the quick response!

@naf419
Copy link

naf419 commented Nov 27, 2024

closed this too soon perhaps...

@zhouxinan zhouxinan reopened this Nov 27, 2024
@zhouxinan
Copy link
Collaborator

Thanks for your comments. Yes, the issue was closed so that I forgot. Sorry for any inconvenience. Let me see if I can work something out this holiday.

@zhouxinan
Copy link
Collaborator

@theweefies TP-Link attacks are available now. I will try adding others soon. Have fun!

@theweefies
Copy link
Author

Thanks a ton! Been playing around with it today! Question for you; i was able to pull the ssh-rsa pubkey using the fetch python script you made, but i am having some issues with the ssh rsa cracking process. I've done a ton of research and had significant issues trying to get ssh-keygen to convert the key in the format returned by the fetch script into a PEM file to get the modulus to feed into msieve. ssh-keygen keeps complaining that the key returned by the fetch script is actually a private key (its in the same format and length as the one in the image you posted), and openssl also fails when trying to convert as well. Most of the guides online provide the process for creating a key pair to test to crack and most of them start by generating pem files and don't have to deal with the openssh conversion to pem format. Any tips here?

Would you mind sharing the line-by-line process you used for the private key recovery, including converting the openssh format the fetch script outputs into a format that we can work with? Thanks for any help!

@zhouxinan
Copy link
Collaborator

@theweefies I just added a script to read out the modulus n from that .pub file. Then you can consult Attack Step 2 in this solution to factor n and get p and q. More details are also there.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants