hallo hph,
ich hoffe das du so damit etwas anfangen kannst (wie gesagt, ich bin nicht so sehr bewandert in der Materie):
########################################################################
Arcadyan IAD Decrypter v0.04
"a tool that decrypts Arcadyan IAD config files"
written by Hanno Heinrichs in 2013
special thanks go to Daniel Meyerholt
(for more information see http://hph.name/269)
########################################################################
Layer 1: reading o2box6431.bin... 37243 bytes read.
Layer 1: checking size... ok.
Layer 1: checking magic bytes "CFG5"... ok.
Layer 1: decrypting... ok.
Layer 2: checking size... ok.
Layer 2: computing key index for magic byte 0xEB... (idx=9) ok.
Layer 2: decrypting... ok.
Layer 2: deobfuscating plaintext... ok.
Layer 3: checking size... ok.
Layer 3: checking SHA-1... ok.
Layer 4: checking size... ok.
Layer 4: checking magic bytes "HFDB"... ok.
Layer 4: checking size field of header... ok.
Layer 4: checking MD5... ok.
Layer 4: decompressing... ok.
Layer 5: checking size... ok.
Layer 5: checking magic bytes "3456"... ok.
Layer 5: checking size field of header... ok.
Layer 5: searching for VLAN IDs... found 8 IDs.
Layer 5: VLAN IDs (PPPoE1..8) are: 12, 7, 0, 0, 0, 0, 0, 0.
Layer 5: writing o2box6431_decrypted.bin... 366304 bytes written.
all done
Now use the "strings" command or any hex editor on the output file to determine your VoIP data.
"strings" for windows can be obtained here:
http://technet.microsoft.com/en-us/sysinternals/bb897439.aspx
ich hoffe das du so damit etwas anfangen kannst (wie gesagt, ich bin nicht so sehr bewandert in der Materie):
########################################################################
Arcadyan IAD Decrypter v0.04
"a tool that decrypts Arcadyan IAD config files"
written by Hanno Heinrichs in 2013
special thanks go to Daniel Meyerholt
(for more information see http://hph.name/269)
########################################################################
Layer 1: reading o2box6431.bin... 37243 bytes read.
Layer 1: checking size... ok.
Layer 1: checking magic bytes "CFG5"... ok.
Layer 1: decrypting... ok.
Layer 2: checking size... ok.
Layer 2: computing key index for magic byte 0xEB... (idx=9) ok.
Layer 2: decrypting... ok.
Layer 2: deobfuscating plaintext... ok.
Layer 3: checking size... ok.
Layer 3: checking SHA-1... ok.
Layer 4: checking size... ok.
Layer 4: checking magic bytes "HFDB"... ok.
Layer 4: checking size field of header... ok.
Layer 4: checking MD5... ok.
Layer 4: decompressing... ok.
Layer 5: checking size... ok.
Layer 5: checking magic bytes "3456"... ok.
Layer 5: checking size field of header... ok.
Layer 5: searching for VLAN IDs... found 8 IDs.
Layer 5: VLAN IDs (PPPoE1..8) are: 12, 7, 0, 0, 0, 0, 0, 0.
Layer 5: writing o2box6431_decrypted.bin... 366304 bytes written.
all done
Now use the "strings" command or any hex editor on the output file to determine your VoIP data.
"strings" for windows can be obtained here:
http://technet.microsoft.com/en-us/sysinternals/bb897439.aspx