RouterPassView v1.57 - Recover lost password from router backup file
Copyright (c) 2010 - 2015 Nir Sofer

Description

Most modern routers allow you to backup the configuration of the router into a file, and then restore the configuration from the file when it's needed. The backup file of the router usually contains important data like your ISP user name/password, the login password of the router, and wireless network keys.
If you lost one of these password/keys, but you still have a backup file of your router configuration, RouterPassView might help you to recover your lost password from your router file

Versions History


Version 1.57:
Added 'Export To Raw Decrypted File' option.

Version 1.56:
Added support for TP-LINK Archer D5 (Only in Ascii text mode).

Version 1.55:
Added support for TP-LINK Archer C2 (Only in Ascii text mode).

Version 1.54:
Added support for NETGEAR DEVG2020 (Only in Ascii text mode).

Version 1.53:
Added support for Linksys WRV200 (Base64 encoded file) - Hex Dump mode only.

Version 1.52:
Added support for ipTIME N604V (Hex Dump mode only)

Version 1.51:
Added support for NETGEAR WGR614v9, WNR1000v3, WNR3500L, and possibly other models.

Version 1.50:
Added support for routers that use zlib compression with 78DA header.

Version 1.48:
Added /RouterWeb command-line option, which opens the Web interface of the router in the default Web browser.

Version 1.47:
Added support for DD-WRT files (nvrambak.bin). You can view the entire file in name=value format, on Ascii text mode.

Version 1.46:
Added generic support for xml files with Base64 encoding, like in TP-Link TD-W8960N router.

Version 1.45:
Added generic support for simple XOR/Add encryption. (Works on HuaWei-3Com Aolynk BR104 and probably other routers)
The Find dialog-box now also works on the text modes.

Version 1.42:
Added support for HuaWei HG526.
The opened router filename is now displayed in the window title.

Version 1.41:
Added support for D-Link DIR-600 (Only in Ascii text mode)

Version 1.40:
Added support for D-Link DI-524 (firmware versions 2.x and 3.x), D-Link DI-624+A, and other routers with DLB6061 / DLB6031 signature.

Version 1.39:
Fixed a bug with decryption of Asus routers (Asus RT-N10+, Asus RT-N56U, and others)

Version 1.38:
Added support for Asus RT-N10+ , and possibly other routers with the same encryption.

Version 1.37:
Added support for HuaWei EchoLife HG520 (In Ascii Text Mode), and possibly other routers with the same encryption.

Version 1.36:
Added support for D-Link DIR-615 G2.

Version 1.35:
Added support for TP-LINK TL-WR700N, advanced versions of TL-WR340G, and probably other TP-LINK routers.

Version 1.33:
Imporved (again) the detection of Edimax routers.

Version 1.32:
Added support for multiple TP-LINK routers, including TL-WR841N, TL-WR841DN, TL-MR342, TL-WR340G, TL-R460, and probably other models.

Version 1.31:
Added support for decrypting the passwords of Linksys/Cisco RV042.

Version 1.30:
Imporved the detection of Edimax routers.

Version 1.29:
Added 'Open Router Web Interface' option (Ctrl+W), which allows you to easily open the Web interface of your router with your default Web browser.

Version 1.28:
Added support for more NETGEAR router models.

Version 1.27:
Added generic support (in Hex Dump mode) for router files that are encrypted with XOR 0xff, like Thomson TG580 DSL.

Version 1.26:
Added 'Copy Password/Value' option to easily copy only the password or wireless key into the clipboard.

Version 1.25:
Added support for D-Link DSL-604T and other models that their config file begins with LMMC signature.
Added generic support for router files that are compressed with Deflate compression algorithm. (only on Ascii and Hex Dump modes)

Version 1.20:
Added /sascii command-line option - Save the decrypted router file as Ascii text file.
Added /shex command-line option - Save the decrypted router file as hex-dump text file.
Added /sraw command-line option - Save the decrypted router file as raw binary file.

Version 1.16:
Added support for other versions of Edimax router file - currently only in Hex Dump mode.
When you open a file that RouterPassView can decrypt, but it cannot locate the exact passwords location, it'll automatically switch to Hex Dump mode, so you'll be able to try locating the password in the decrypted Hex Dump.

Version 1.15:
Added command-line support.
Fixed issue: Removed the wrong encoding from the xml string, which caused problems to some xml viewers.

Version 1.10:
Added 'Grab Password From IE Window' option - Allows you to open the router configuration interface in Internet Explorer, and then grab the password stored inside the password text-box of the router Web page.

Version 1.05:
Added support for D-Link DIR-300, and possibly similar models.

Version 1.04:
Added support for Sitecom WL-351, and possibly other models.

Version 1.03:
Fixed bug: user names of D-Link routers were wrong.

Version 1.02:
Added support for D-Link DIR-655, and possibly other models (with gateway_settings.gws filename)
Added support for Sanex SA 5100, and possibly other models.
Fixed bug: Copy to clipboard (Ctrl+C) was disabled in text mode.

Version 1.01:
Added support for Tomato firmware.
Added the password of 'support' user for D-Link DSL-2540U and possibly other routers.
Version 1.00 - First release.

Supported Routers

Due to large amount of router models available in the market, it's impossible to support all of them.
For now, RouterPassView supports a limited number of router models, and I'll gradually add support for more routers in future versions. Also, be aware that even if your router is not in the list, you can still try to open your router backup file with RouterPassView, because some routers are sold with different brand name, but they still use the same software/chipset of other routers. Here's the list:
  • Linksys WRT54GL (With original firmware or Tomato firmware), WRT54G (only some of them), WRT160N, WRT320N, and possibly similar models.
  • Linksys E5200
  • Linksys E2000
  • Linksys RV082
  • Linksys E2500
  • Linksys N1500
  • Linksys E900
  • Cisco-Linksys E4200
  • Cisco Linksys E1000 v2.1
  • Edimax BR6204WG, and possibly similar models.
  • Siemens ADSL SL2-141, and possibly similar models.
  • Dynalink RTA1025W, and possibly similar models.
  • NETGEAR WGT624, WGR614v9, WNR1000v3, WNR3500L, and possibly other models.
  • NETGEAR DEVG2020
  • ASUS WL-520g, WL-600g, and possibly similar models.
  • ASUS RT-N10+ , and possibly similar models.
  • Asus RT-N56U , and possibly similar models.
  • Asus RT-AC66U
  • D-Link DIR-655, DIR-300, and possibly similar models.
  • Sanex SA 5100, and possibly similar models.
  • Sitecom WL-351, WL-575, WL-312, and possibly similar models.
  • COMTREND 536+ (Only Internet Login)
  • US Robotics 9108 ADSL (internet login and admin login)
  • D-Link DSL-2540U/BRU/D ADSL2+, DSL-2650U, DSL-520B
  • D-Link DVA-G3170i/PT
  • D-Link DSL-604T
  • D-Link G3670B
  • D-Link DSL-2640T
  • D-Link DSL-G684T
  • D-Link DSL-2500U
  • D-Link 2740B
  • D-Link DIR-615 G2
  • D-Link WBR-1310
  • D-Link DSL-2543B
  • D-Link DI-524
  • D-Link DI-624+A
  • D-Link DIR-600
  • D-Link DIR-300
  • D-Link DSL-2780
  • TL-WDR4300 N750
  • TP-Link TD-8810 ADSL Modem/Router.
  • Dynamode R-ADSL-C4-W-G1
  • NetComm NB5Plus4 DSL
  • Thomson TG580 DSL (only in Hex Dump mode)
  • Asus RT-G31
  • HuaWei EchoLife HG520 (Only some of them)
  • HuaWei HG526
  • HuaWei-3Com Aolynk BR104
  • TP-LINK TL-WR841N
  • TP-LINK TL-WR841DN
  • TP-LINK TL-MR342
  • TP-LINK TL-WR340G
  • TP-LINK TL-R460
  • TP-LINK TL-WR741ND v2.0
  • TP-LINK TL-WR700N
  • TP-LINK TL-WR740N
  • TP-LINK TL-WA801N
  • TP-LINK TL-WR541G
  • TP-LINK TL-WR1043ND
  • TP-LINK TD-W8960N
  • TP-Link TL-WR941ND
  • TP-Link TL-MR3220
  • TP-Link TL-WR642G
  • TP-Link TL-WDR3320
  • TP-Link TL-WDR3600
  • TP-Link TD-W8970
  • TP-LINK Archer C2
  • TP-LINK Archer D5
  • TP-LINK Archer D9
  • Belkin N+ (F5D8236uk4)
  • Mercury MW54R
  • Netgear DG632
  • Netgear Wireless Cable Voice Gateway CG3000/CG3100
  • Netgear WNDR4000 (Rev 1)
  • Netcomm NB6W
  • Aztech DSL605EW
  • Comtrend CT-5072T ADSL2+ modem/router
  • Small Business RV042
  • Intelbras WRN240
  • ipTIME N604V
  • Linksys WRV200
  • Sagem F@ST2404
  • ZTE ZXV10
  • ZTE ZXHN H108N
If you have router model that is not listed here, and you managed to recover your password with RouterPassView, please report about it to nirsofer@yahoo.com and specify the exact model name.

Using RouterPassView

RouterPassView doesn't require any installation process or additional DLL files. In order to start using it, simply run the executable file - RouterPassView.exe
After running RouterPassView, you can open your router configuration file by using 'Open Router Config File' option (Ctrl+O) or by dragging the config file from Explorer into the main window of RouterPassView.
If RouterPassView manage to detect and decrypt your router file, you should get a list of passwords/wireless keys in the main window of RouterPassView. If RouterPassView cannot detect your file, it'll remain empty.




How to submit a config file

If you have a router config file that RouterPassView cannot decrypt and analyze, you are welcomed to send the sample config file to nirsofer@yahoo.com, and I'll try to figure out how to read it and add support for this file in future version. You can also increase the chance of my ability to add support for your config file if you follow the submission instructions below. However, be aware that it requires you to disconnect your network and internet connection for a few minues.
  1. Backup your current router configuration and keep it in a safe place on your local disk.
  2. Update your router configuration with dummy user names, passwords, and wireless keys. You should use very simple passwords/keys, like 1111111111, 2222222222, ABABABABAB, 12345678, and so on. Putting these easy passwords give me a much better chance to crack the config file and find out how the passwords are encrypted.
  3. Save the modified dummy configuration into a file. This file should be sent to nirsofer@yahoo.com for examination.
  4. Restore your real router configuration from the file that you saved in the first stage.
  5. Send the backup file with the dummy passwords to nirsofer@yahoo.com, and specify the router model/firmware and the dummy passwords that you set in this config file.

Using the 'Grab Password From IE Window' option

If you try to recover your ISP/ADSL/L2TP/PPTP/PPPOE/DDNS password, but RouterPassView cannot decrypt the configuration file of your router, you still have a chance to retrieve the password by using this feature, assuming that you have the login password of your router. In order to use this feature, follow the instructions below.
  1. Login into your router Web interface with Internet Explorer, and go to the password page that you wish to recover. This password page may look like this one:

    As you can see in the above screenshot, the password field is filled with bullets, but if this password field really contains the password, RouterPassView will be able to extract it and display it on the main window.
  2. Go to the File menu, and choose 'Grab Password From IE Window' or simply press Ctrl+G
  3. If the router Web page store the password in the password field, RouterPassView will display the hidden password:
    Be aware that some routers deliberately store wrong password in this field, and in for these routers, RouterPassView won't be able to recover your real password.

Command-Line Options

/RouterFile <Filename> Specifies the router file to load.
/RouterWeb Opens the Web interface of the router in the default Web browser.
/stext <Filename> Save the list of router passwords into a regular text file.
/stab <Filename> Save the list of router passwords into a tab-delimited text file.
/scomma <Filename> Save the list of router passwords into a comma-delimited text file (csv).
/stabular <Filename> Save the list of router passwords into a tabular text file.
/shtml <Filename> Save the list of router passwords into HTML file (Horizontal).
/sverhtml <Filename> Save the list of router passwords into HTML file (Vertical).
/sxml <Filename> Save the list of router passwords into XML file.
/sascii <Filename> Save the decrypted router file as Ascii text file. (Similar to the Ascii Text Mode)
/shex <Filename> Save the decrypted router file as hex-dump text file. (Similar to the Hex-Dump Text Mode)
/sraw <Filename> Save the decrypted router file as raw binary file, Which means that the file is decrypted and then saved 'as is' without any processing.

Translating RouterPassView to other languages

In order to translate RouterPassView to other language, follow the instructions below:
  1. Run RouterPassView with /savelangfile parameter:
    RouterPassView.exe /savelangfile
    A file named RouterPassView_lng.ini will be created in the folder of RouterPassView utility.
  2. Open the created language file in Notepad or in any other text editor.
  3. Translate all string entries to the desired language. Optionally, you can also add your name and/or a link to your Web site. (TranslatorName and TranslatorURL values) If you add this information, it'll be used in the 'About' window.
  4. After you finish the translation, Run RouterPassView, and all translated strings will be loaded from the language file.
    If you want to run RouterPassView without the translation, simply rename the language file, or move it to another folder.

License

This utility is released as freeware. You are allowed to freely use it at your home or in your company. However, you are not allowed to make profit from this software or to charge your customers for recovering their passwords with this software, unless you got a permission from the software author.
You are also allowed to freely distribute this utility via floppy disk, CD-ROM, Internet, or in any other way, as long as you don't charge anything for this. If you distribute this utility, you must include all files in the distribution package, without any modification !


Download RouterPassView

/userRpm/config.bin
    /rom-0


Say Thanks to nirsoft ,,,

0 comments Blogger 0 Facebook

Post a Comment

 
The Fake2ry © 2016. All Rights Reserved. Powered by Blogger
Top