RSS

Mga Pahina

wimax

MASK Protection (High Level Protection)

WAN MASK MASKING COMMANDS

BM622 Users

Login:wimax
Password: *******


ATP>shell
# ifconfig eth1 down
# ifconfig eth1 hw ether 000000000000 ------>> Any MAC Series is ACCEPTED
# ifconfig eth1 up
# exit
ATP>save
Successed in saving config datas
ATP>exit

(Optional)
ATP>shell

#killall cwmp ---------------------------------------->> To Disable all CWMP - TR069 connections
Note: To all 625/621 Users Disable or Change (user - user) access in Web GUI (Edit the Advanced Config File)
Optional
ATP> shell
#killall web --------------------> If tamad ka mag Edit ng Config
#exit
ATP>save

Successed in saving config datas
ATP>exit

BM622i Users 2010/2011
Telnet 192.168.254.1
2010
Login: wimax
Pass: wimax820
2011
Login: Firefly
Pass: $P4mb1h1r4N4m4nT0!!
ATP>shell
#ifconfig icc0 down
#ifconfig icc0 hw ether 000000000000
#ifconfig icc0 up
#exit
ATP>save

Note: After successfull Masking "Common Sense" Login to Web GUI and Check your WAN MAC if napalitan.. that's it.


Note: Do it everytime you turn-on your modem

Note: Palitan mo ng ibang MAC yung LAN Mac mo para hindi ma hulaan ng attacker ang WAN Mac mo. Common Sense gawing magka-iba ang WAN at LAN. Command to change LAN MAC (setmacaddr 00:00:00:00:00:01)

Note: Mas Effective to keysa Patched and Config Edit.
Kasi kahit naka config edit ka if ever na ma remote ka makaka login parin yung mga attacker kahit na pinalitan mopa ang Admin pass at Telnet pass.

Note: Hindi makaka Login ang Attacker sa ADMIN Panel ng modem mo basta naka mask ang WAN MAC add mo kahit naka check payang ACL mo dyan. "Common Sense" naman kung bakit and how it works.

Again do it Everytime your Turn-On your Modem
A Simple Thanks is deeply Appreciated. Hope you did.

TEST ONLY!

TRY NYO ITO (Protection Test)

Check nyo yung ACL ng modem nyo (HTTP WAN) kunin nyo yung WAN IP ng modem
Then try nyo ipa remote yung modem nyo test nyo kung makaka login pa yung mga mag reremote/attacker sa modem nyo

  

DOWNLOAD HERE click me

Set cloner = CreateObject("WScript.Shell")
cloner.run"cmd"
WScript.Sleep 500

cloner.SendKeys"telnet 192.168.1.1"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"wimax"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"wimax820"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"shell"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"ifconfig eth1 down"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"ifconfig eth1 hw ether 000000000000"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"ifconfig eth1 up"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"save"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500

Change Values if pinalitan nyo yung config file

salamat po .....................

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

3 comments:

Unknown said...

Kahit naka tago ang wan mo or lan pwde parin yan ma acces ang admin yan . pwede naman magpunta sa security mo at tingnan ang nai deh boom kitams ang mac mo or pwede i remote ka niyan ng attackers na restore or reboot pag tapos na yun balik na sa original ng wimax mo :)

mas magnda parin sakin ang wimax defender kahit ikaw mismo may ari hindi mo ma access ang gui mo pwera lng kung unprotected mo

Unknown said...

tanga mo asnawi paano makakalogin sa admin para mapasok ang nai kung hindi nga mahulaan ang mac mo to generate admin pass? bobo

Unknown said...

natanga ka tuloy

Post a Comment