Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for TIM (Telecomitalia) Smart Hub+, H388X #24

Open
emenotti opened this issue Oct 10, 2021 · 13 comments
Open

Add support for TIM (Telecomitalia) Smart Hub+, H388X #24

emenotti opened this issue Oct 10, 2021 · 13 comments

Comments

@emenotti
Copy link

Mark has invited me to post here. I may provide (privately) a config.bin, also with different settings for comparison, and the serial number of the device. I can have a look at some of the web console source, but I don't have any command line access.

Of course I've already tried. The info.py gives:

Signature: H388X
Payload Type: 4 (UNKNOWN)
Payload Start: 77
Decompressed size: 0 bytes
2nd last chunk: 0
Chunk size: 0 bytes
Payload CRC: 0
Header CRC: 0

decode.py with serial gives malformed payload.

Compared to the config.bin for the ZXHN H298N reported in this repo, mine is completely missing the initial 128-byte header1.

In case you'd like to have a look at my config.bin and have the serial, you may drop me a message at enrico [dot] menotti [at] libero [dot] it.

@kies83
Copy link

kies83 commented Oct 10, 2021

If you have telnet access than you can continue to decrypt your config.bin!

@emenotti
Copy link
Author

If you have telnet access than you can continue to decrypt your config.bin!

No telnet access. I can only look at some of the web page source via browser.

@kies83
Copy link

kies83 commented Oct 10, 2021

You need shell access for comfig decryption

@emenotti
Copy link
Author

You need shell access for comfig decryption

Why? Shell access is what I'm trying to get.

@kies83
Copy link

kies83 commented Oct 11, 2021

If you want to decrypt config.bin or made any changes in it to enjoy features mostly by modifying config.bin than it is necessary to have shell access means roots account..

@emenotti
Copy link
Author

I was thinking about decrypting config.bin, changing things, encrypting and uploading back.

@kies83
Copy link

kies83 commented Oct 11, 2021

Yes that's it.. you will need decryption key for it!!

@emenotti
Copy link
Author

But that does not necessarily mean having a shell, or even root, access, right?

@kies83
Copy link

kies83 commented Oct 11, 2021

Brother in your model if it's not decrypting your config.bin than it's using tagparam md5 so you will need access to it

@emenotti
Copy link
Author

Ok, but this leads me to a circle: need to decrypt to get access, and need to get access to decrypt...

@kies83
Copy link

kies83 commented Oct 11, 2021

Yes dear am also stucked at this point coz it's not using serial or any hardcoded encryption keys.. its using tagparam md5 as key.. and the tapgram file is also specific for others models.

@811Alex
Copy link
Contributor

811Alex commented Oct 15, 2021

Don't listen to kies too much, they don't really understand how it works and they'll only confuse you, when it comes to specifics.

Now that that's out of the way, yes, to find out how it encrypts things or what key it uses, you need access to the router's filesystem.
Different models use different methods and keys. If your model's key & method have not been discovered, you need filesystem/terminal access (and someone with solid programing knowledge) to get further. In some cases telnet happens to be open, in others people use exploits (when known ones exist), etc.
You're right in that it is very much a circle, so either hard or impossible. That's why nobody can guarantee we'll find a way.

I'll send you an email and take a look, but I don't know when or if I'll get anywhere. If serial didn't work, it probably uses a different method and we can't do too much with just the config.bin for that. After that, unless I email you again or you have something new, please just keep track of this issue and don't spam my DMs like some people here, thanks for understanding.

@markus0m
Copy link

A (packed and potentially encrypted) firmware for this device seems to have been posted here:
https://0x00sec.org/t/unpacking-encrypted-router-firmware/29996

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants