Oh, I’ve made it! Now I will go through all the points to save someone helluva nerves!
First, the Wireshark is only able to “see” interfaces when it is run in Admin mode (you must be logged in to your PC as Admin or a user with admin’s rights).
Second, if this is the first time you connect the particular radio to the PC (“new device found”) message pops up, you MUST restart your computer to let Wireshark detect it as an interface.
Now here we go. Start the Wireshark and select your MotoTRBO radio to capture. The screen will begin to fill with the captured data lines. Better note the last several lines before proceeding to the following step (you may not look through them further when looking for the password).
Then fire up the TRBO CPS. As soon as it’s up and walkin hit the “Read” button. Wait for the input password screen to pop up. NOW rush to the Wireshark and stop the capture! This will limit the number of strings for you to look through. If this is the first time you work with the Wireshark – be attentive! Do not panic if you can’t see the password in the ASCII field (in the bottom of the screen) immediately. Find the last several strings you have remembered before starting the TRBO CPS. Got it? Now start browsing the ASCII contents of every log string from the upper part. See the model and serial number of your radio? You’re getting close! Look for the u.e.n.-.u.s. Your password will be just before this word (just as a pic). Every symbol is divided with a dot, so when inputting it in the CPS use NO dots. In my example the password was 1250.
DONE!
Here are some things /\/\ wants us to know about the password in TRBO radios:
Now you know it’s not exactly true!
I’ve found a piece of advice that tells to try to read the password-protected codeplug and then open the RAM dump of mototrbocps.exe in the HxD or a similar software. Of course I’ve tried it and found it too difficult compared to the Wireshark method. The dump itself weighs 4 GB – imagine how many data strings it has!
That’s a pity we don’t know yet how to extract the advanced privacy keys which have already been loaded. I had to sacrifice them to program my own data to the radio
I was using: DP4401 radio, PMKN4012B programming cable, CF-28 laptop with Win XP SP3 running on it, TRBO CPS 8.5 EMEA, Wireshark ver. 1.6.8.