Skip to content

rssor/extract_bgw_certs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 

Repository files navigation

AT&T BGW Certificate Extractor

This tool is designed to extract the device certificates and key material needed for 802.1x auth on AT&T's fiber network from files found on the provided gateway. For the most part, this is pointless except on GPON (making the BGW620-700 nothing more than a curiosity for now as only XGSPON customers can get one).

The device-unique certificates are stored on flash with the private key encrypted. Each device family has a hardcoded AES key/IV in /bin/eap_tls_peer that can be used to decrypt the private key material stored on flash. For the BGW210 and BGW320 there are firmwares available with unencrypted rootfs images. For the BGW620 all published firmwares discovered to date are encrypted, meaning that even with a full flash dump the private key was unrecoverable.

With this tool BGW620-700 certificates are recoverable as long as you can get a flash dump from a device.

Requirements

  • Python 3.7+
  • pycryptodome

Usage

  • pip install pycryptodome
  • ./extract_bgw_certs.py your_calibration_01.bin output_eapol.tgz

You will need to modify the wpa_supplicant.conf with updated file paths; should be self-explanatory.

For the BGW210-700 pass mfg.dat instead of calibration_01.bin. For all other devices pass calibration_01.bin.

Devices Supported

Credits

Authored by rss (@rssor) and d (@slush0_) from 8311

Resources

  • mfgdat open-source Go/Bash implementation filling a similar niche
  • mfg_dat_decode the original closed-source implementation from devicelocksmith, with support for all but the BGW620-700
  • 0x888e/certs software-only method to get the necessary files out of a BGW210 or BGW320

About

Decrypt 802.1x cert key material from AT&T residential gateways

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages