WAN MASK MASKING COMMANDS
BM622 Users
Login:wimax
Password: *******
BM622 Users
Login:wimax
Password: *******
ATP>shell
# ifconfig eth1 down
# ifconfig eth1 hw ether 000000000000 ------>> Any MAC Series is ACCEPTED
# ifconfig eth1 up
# exit
ATP>save
Successed in saving config datas
ATP>exit
(Optional)
ATP>shell
#killall cwmp ---------------------------------------->> To Disable all CWMP - TR069 connections
Note: To all 625/621 Users Disable or Change (user - user) access in Web GUI (Edit the Advanced Config File)
Optional
ATP> shell
#killall web --------------------> If tamad ka mag Edit ng Config
#exit
ATP>save
Successed in saving config datas
ATP>exit
BM622i Users 2010/2011
Telnet 192.168.254.1 2010
Login: wimax
Pass: wimax820 2011
Login: Firefly
Pass: $P4mb1h1r4N4m4nT0!!
ATP>shell
#ifconfig icc0 down
#ifconfig icc0 hw ether 000000000000
#ifconfig icc0 up
#exit
ATP>save
# ifconfig eth1 down
# ifconfig eth1 hw ether 000000000000 ------>> Any MAC Series is ACCEPTED
# ifconfig eth1 up
# exit
ATP>save
Successed in saving config datas
ATP>exit
(Optional)
ATP>shell
#killall cwmp ---------------------------------------->> To Disable all CWMP - TR069 connections
Note: To all 625/621 Users Disable or Change (user - user) access in Web GUI (Edit the Advanced Config File)
Optional
ATP> shell
#killall web --------------------> If tamad ka mag Edit ng Config
#exit
ATP>save
Successed in saving config datas
ATP>exit
BM622i Users 2010/2011
Telnet 192.168.254.1 2010
Login: wimax
Pass: wimax820 2011
Login: Firefly
Pass: $P4mb1h1r4N4m4nT0!!
ATP>shell
#ifconfig icc0 down
#ifconfig icc0 hw ether 000000000000
#ifconfig icc0 up
#exit
ATP>save
Note: After successfull Masking "Common Sense" Login to Web GUI and Check your WAN MAC if napalitan.. that's it.
Note: Do it everytime you turn-on your modem
Note: Palitan mo ng ibang MAC yung LAN Mac mo para hindi ma hulaan ng attacker ang WAN Mac mo. Common Sense gawing magka-iba ang WAN at LAN. Command to change LAN MAC (setmacaddr 00:00:00:00:00:01)
Note: Mas Effective to keysa Patched and Config Edit.
Kasi kahit naka config edit ka if ever na ma remote ka makaka login parin yung mga attacker kahit na pinalitan mopa ang Admin pass at Telnet pass.
Note: Hindi makaka Login ang Attacker sa ADMIN Panel ng modem mo basta naka mask ang WAN MAC add mo kahit naka check payang ACL mo dyan. "Common Sense" naman kung bakit and how it works.
Again do it Everytime your Turn-On your Modem
A Simple Thanks is deeply Appreciated. Hope you did. Note: Palitan mo ng ibang MAC yung LAN Mac mo para hindi ma hulaan ng attacker ang WAN Mac mo. Common Sense gawing magka-iba ang WAN at LAN. Command to change LAN MAC (setmacaddr 00:00:00:00:00:01)
Note: Mas Effective to keysa Patched and Config Edit.
Kasi kahit naka config edit ka if ever na ma remote ka makaka login parin yung mga attacker kahit na pinalitan mopa ang Admin pass at Telnet pass.
Note: Hindi makaka Login ang Attacker sa ADMIN Panel ng modem mo basta naka mask ang WAN MAC add mo kahit naka check payang ACL mo dyan. "Common Sense" naman kung bakit and how it works.
Again do it Everytime your Turn-On your Modem
TEST ONLY!
TRY NYO ITO (Protection Test)
Check nyo yung ACL ng modem nyo (HTTP WAN) kunin nyo yung WAN IP ng modem
Then try nyo ipa remote yung modem nyo test nyo kung makaka login pa yung mga mag reremote/attacker sa modem nyo
DOWNLOAD HERE : click me
Set cloner = CreateObject("WScript.Shell")
cloner.run"cmd"
WScript.Sleep 500
cloner.SendKeys"telnet 192.168.1.1"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"wimax"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"wimax820"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"shell"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"ifconfig eth1 down"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"ifconfig eth1 hw ether 000000000000"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"ifconfig eth1 up"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"save"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
Change Values if pinalitan nyo yung config file
salamat po .....................
3 comments:
Kahit naka tago ang wan mo or lan pwde parin yan ma acces ang admin yan . pwede naman magpunta sa security mo at tingnan ang nai deh boom kitams ang mac mo or pwede i remote ka niyan ng attackers na restore or reboot pag tapos na yun balik na sa original ng wimax mo :)
mas magnda parin sakin ang wimax defender kahit ikaw mismo may ari hindi mo ma access ang gui mo pwera lng kung unprotected mo
tanga mo asnawi paano makakalogin sa admin para mapasok ang nai kung hindi nga mahulaan ang mac mo to generate admin pass? bobo
natanga ka tuloy
Post a Comment