Undocumented WEP keys

Unanswered Question
Jan 31st, 2007

Is there a way to find out what WEP key was entered on an aironet AP?

For instance, this is a statement on an AP that I have:

encryption key 1 size 128bit 7 28E70FD9203EA78469931F6EC8E1 transmit-key

The key there is encrypted, is there a way to decrypt it so that I can document what WEP key was used?

I have this problem too.
0 votes
  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 4 (2 ratings)
Loading.
choywy Thu, 02/08/2007 - 20:38

Download the utilitiy "GetPass" (think from Boson)...Or do a search in Google.

Cut-paste the string "28E70FD9203EA78469931F6EC8E1" into it and it will show you the clear text..

Thanks.

rfountain Fri, 02/09/2007 - 10:28

I tried this already with two different decryption tools, one of them being Getpass. They both give errors when trying to decrypt the string. I have a cisco decrypter that complains about a "hash point" being between 00 and 15.

I think the string is too long or something.

Tim Glen Fri, 02/09/2007 - 14:09

This isnt the standard #7 encryption. I tried to setup a key pair on my router to decrypt the string and that didnt work either.

I use

!

key chain labtest

key 1

key-string 7 0000160516421B12423544471A

!

!

RasBox#sh key chain labtest

Key-chain labtest:

key 1 -- text "decrypt-this"

accept lifetime (always valid) - (always valid) [valid now]

send lifetime (always valid) - (always valid) [valid now]

RasBox#

RasBox#

Actions

This Discussion