Skip to main content

TP-LINK Configuration file encrypt and decrypt.



Here we go!
TP-Link is another company that thinks that security by obscurity could ever work.

If you "backup" the configuration from most TP-Link routers, you will get a .BIN file which is "encrypted".

Use this utility below, to decrypt it (so you can edit it) and encrypt it again.

Have fun.

Drop files here or

Comments

  1. Awesome! Thanks for this. For $REASONS i needed to set my WPS ping to 12345678. With the help of your site, this was easy :)

    FYI the model was a TL-WA801ND.

    Thanks again.

    ReplyDelete
  2. "One is happy to be of service" :D

    ReplyDelete
  3. It doesn't work for TP-LINK WA854RE

    ReplyDelete
  4. Thank you so much for making this tool. I had to create unique configurations for 40 routers and your tool was a real life saver.

    ReplyDelete
  5. Thanks to you. P.S. Donations are welcome :D

    ReplyDelete
  6. Will you update this to support the Archer VR900 ?

    ReplyDelete
  7. If I send you a config file with known settings would that help... ?

    ReplyDelete
  8. Not really, I should need the file, the device and the firmware. And some more free time. :D

    ReplyDelete
  9. Awesome utility! Thanks a lot for sharing.

    Any suggestions for open the .cfg files? I'm using wordpad and its kinda scattered.

    ReplyDelete
  10. It's a normal text file with unix line endings. You can use Ultraedit or any other "good" editor. Not wordpad nor notepad.

    ReplyDelete
  11. Thank you for your contribution, i have a question, is it posible to have this tool in an .exe?

    ReplyDelete
  12. My friend, you're a live saver! Thanks so much!!

    ReplyDelete
  13. There is an easy way to thank me: donate! https://zibri1.blogspot.com

    ReplyDelete
  14. This doesn't seem to work on my WR841N v13 (latest firmware), as it is producing garbled output with some readable text inside. I can send you the config backup if you're willing to take a look.

    Grazie,
    Francesco

    ReplyDelete
  15. ok manda pure.. zibri at zibri punto org

    ReplyDelete
  16. This is really good !
    can you share the source code to make it available to other platforms? such as .net, android, etc.
    Thank you for this Amazing tool

    ReplyDelete
  17. It is already available. Search on github. Someone made a shell script for linux.

    ReplyDelete

Post a Comment

Popular posts from this blog

Powerline Ethernet fun and secrets.

Many 200 Mb/s powerline adapters nowadays are based on the INTELLON 6300 chipset.
Despite what can be thought looking at them, they are all using the same hardware and firmwares.
I heard many people with Netgear XAV101 or Linksys PLK 200 or PLE 200 having problems after firmware updates and many other people with other brands having much more problems because of lack of support or configuration/upgrade utilities.

So let me explain a few things I learnt studying them.

Many of 200 Mb/s powerline ethernet adapters follow the "HomePlug AV" standard. (85 Mb adapters use HomePlug 1.0 standard which is completely different).
This standard uses ethernet broadcast packets using the HomePlug AV protocol.

The interesting thing is that their firmware is made of two different parts:
a .PIB file (Parameter Information Block) and a .NVM file (the code itself).
In the P.I.B. there are many interesting things:
The branding (mac address, device name, etc) and the tone map.

I tested many firmw…

Obfuscation will never work.

ml>
Hello again, sweet readers !
OpenRG is an embedded OS for routers. It's based on Linux and it's inside many ISP routers out there.
Inside OpenRG configuration file, passwords appear in a way that can seem to be crypted, but it's just obfuscated.
For example: (username(admin)) (password(&b7;X&5c;&b9;&a2;))
Above you can see a simple deobfuscator. Enjoy!
You can try it with: &ad;Y&5b;&b3;&a3;&17;T&8b;&c4;&b9;#&96;&04;c&ea;&1d;$%&5d;&16;&08;B3&c0;
:)
Zibri.