is this even possible, I have a list of router names and passwords, would there be a master seed or is the seed the mac address or numbers after the router such as VM900358-2G. What kind of algorithm would be needed.
or is this just like breaking a strong encryption. I know one router has been broken cant remember its name.
They used mac addresses of the router to reverse engineer the keys, im guessing.
Either that or they reversed engineered the routers software.
or is this just like breaking a strong encryption. I know one router has been broken cant remember its name.
They used mac addresses of the router to reverse engineer the keys, im guessing.
Either that or they reversed engineered the routers software.