-
tc7200_password_disclosure_v2: fix vulnerability check and wrong pycrypto call (#406) · 050bb861
* Fix vulnerability check in tc7200_password_disclosure_v2 Use an encrypted zero block to identify the binary settings backup data. * Make tc7200_password_disclosure_v2 compatible with new pycrypto The decryption routine uses AES in ECB mode. The pycrypto module is used for this routine. ECB does not involve any initialization vector (IV). However routersploit uses one that is 16 NUL bytes. Older pycrypto versions just ignored this, but newer versions (at least since 2.6) error on using an IV with ECB. * tc7200_password_disclosure_v2: adapt test to the binary check * add missing import
bgermann authored
Name |
Last commit
|
Last update |
---|---|---|
.. | ||
creds | Loading commit data... | |
exploits | Loading commit data... | |
__init__.py | Loading commit data... | |
conftest.py | Loading commit data... |