RSS

Mga Pahina

wimax

TWEAK VIP STABLE

TWEAK :Unstable vip to STABLE VIP

d2 nio makikita kung bakit tayo nagamit ng "CHERLES WIMAX TOOL" PARA MAKITA NATIN ANG DEFAULT BA O HINDI YUNG GAGAMITIN NATING DOMAIN PARA SA MAC NA AAYUSIN NATIN OK SO NEED LANG NATIN UNAWAIN ANG VIDEO PARA SA GANUN NAKUHA AGAD NATIN OK 

SAMPLE LANG YAN PERO GAWIN NIO AT WALANG MAWAWALA OK 

DOWNLOAD"
CLICK ME...... 

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

MASK Protection (High Level Protection)

WAN MASK MASKING COMMANDS

BM622 Users

Login:wimax
Password: *******


ATP>shell
# ifconfig eth1 down
# ifconfig eth1 hw ether 000000000000 ------>> Any MAC Series is ACCEPTED
# ifconfig eth1 up
# exit
ATP>save
Successed in saving config datas
ATP>exit

(Optional)
ATP>shell

#killall cwmp ---------------------------------------->> To Disable all CWMP - TR069 connections
Note: To all 625/621 Users Disable or Change (user - user) access in Web GUI (Edit the Advanced Config File)
Optional
ATP> shell
#killall web --------------------> If tamad ka mag Edit ng Config
#exit
ATP>save

Successed in saving config datas
ATP>exit

BM622i Users 2010/2011
Telnet 192.168.254.1
2010
Login: wimax
Pass: wimax820
2011
Login: Firefly
Pass: $P4mb1h1r4N4m4nT0!!
ATP>shell
#ifconfig icc0 down
#ifconfig icc0 hw ether 000000000000
#ifconfig icc0 up
#exit
ATP>save

Note: After successfull Masking "Common Sense" Login to Web GUI and Check your WAN MAC if napalitan.. that's it.


Note: Do it everytime you turn-on your modem

Note: Palitan mo ng ibang MAC yung LAN Mac mo para hindi ma hulaan ng attacker ang WAN Mac mo. Common Sense gawing magka-iba ang WAN at LAN. Command to change LAN MAC (setmacaddr 00:00:00:00:00:01)

Note: Mas Effective to keysa Patched and Config Edit.
Kasi kahit naka config edit ka if ever na ma remote ka makaka login parin yung mga attacker kahit na pinalitan mopa ang Admin pass at Telnet pass.

Note: Hindi makaka Login ang Attacker sa ADMIN Panel ng modem mo basta naka mask ang WAN MAC add mo kahit naka check payang ACL mo dyan. "Common Sense" naman kung bakit and how it works.

Again do it Everytime your Turn-On your Modem
A Simple Thanks is deeply Appreciated. Hope you did.

TEST ONLY!

TRY NYO ITO (Protection Test)

Check nyo yung ACL ng modem nyo (HTTP WAN) kunin nyo yung WAN IP ng modem
Then try nyo ipa remote yung modem nyo test nyo kung makaka login pa yung mga mag reremote/attacker sa modem nyo

  

DOWNLOAD HERE click me

Set cloner = CreateObject("WScript.Shell")
cloner.run"cmd"
WScript.Sleep 500

cloner.SendKeys"telnet 192.168.1.1"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"wimax"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"wimax820"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"shell"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"ifconfig eth1 down"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"ifconfig eth1 hw ether 000000000000"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"ifconfig eth1 up"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"save"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

Change Values if pinalitan nyo yung config file

salamat po .....................

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

BM622i protection 2009 - 2010

Alam nyo ba na ang Firewall ng 622i ay capable of blocking everything, even ICMP, ACS
  

open your web GUI then Login as "admin"

 Go to Advance> Firewall

Click on Firewall Level Then Pick Custom then type whatever you want Then Hit Apply



Again Click Firewall Level Then Choose the one that you typed, mine was "new"

Pick Set Level on Operation Mode then hit apply

Click ACL "Access Control List"

 
 put Check on ACS and ICMP then Hit The negative sign " - "

Now Click the ADD sign or Positive sign
 
 Click Service type then pick TELNET make sure the access direction is "LAN"
then Hit Apply


Hit Apply  



 SO yung ginawa natin ay tinanggal natin sa list yung ACS at ICMP, iniwan lang natin yung HTTP at TELNET with Access Direction na LAN , dahil dun, using 622i firewall itself We prevented ACS from accessing our modems to do such an update


Leave Comments  
thank you........

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS