TWEAK :Unstable vip to STABLE VIP
d2 nio makikita kung bakit tayo nagamit ng "CHERLES WIMAX TOOL" PARA MAKITA NATIN ANG DEFAULT BA O HINDI YUNG GAGAMITIN NATING DOMAIN PARA SA MAC NA AAYUSIN NATIN OK SO NEED LANG NATIN UNAWAIN ANG VIDEO PARA SA GANUN NAKUHA AGAD NATIN OK
SAMPLE LANG YAN PERO GAWIN NIO AT WALANG MAWAWALA OK
DOWNLOAD"
CLICK ME......
wimax
TWEAK VIP STABLE
7:42 PM |
Read User's Comments(13)
MASK Protection (High Level Protection)
6:12 PM |
WAN MASK MASKING COMMANDS
BM622 Users
Login:wimax
Password: *******
BM622 Users
Login:wimax
Password: *******
ATP>shell
# ifconfig eth1 down
# ifconfig eth1 hw ether 000000000000 ------>> Any MAC Series is ACCEPTED
# ifconfig eth1 up
# exit
ATP>save
Successed in saving config datas
ATP>exit
(Optional)
ATP>shell
#killall cwmp ---------------------------------------->> To Disable all CWMP - TR069 connections
Note: To all 625/621 Users Disable or Change (user - user) access in Web GUI (Edit the Advanced Config File)
Optional
ATP> shell
#killall web --------------------> If tamad ka mag Edit ng Config
#exit
ATP>save
Successed in saving config datas
ATP>exit
BM622i Users 2010/2011
Telnet 192.168.254.1 2010
Login: wimax
Pass: wimax820 2011
Login: Firefly
Pass: $P4mb1h1r4N4m4nT0!!
ATP>shell
#ifconfig icc0 down
#ifconfig icc0 hw ether 000000000000
#ifconfig icc0 up
#exit
ATP>save
# ifconfig eth1 down
# ifconfig eth1 hw ether 000000000000 ------>> Any MAC Series is ACCEPTED
# ifconfig eth1 up
# exit
ATP>save
Successed in saving config datas
ATP>exit
(Optional)
ATP>shell
#killall cwmp ---------------------------------------->> To Disable all CWMP - TR069 connections
Note: To all 625/621 Users Disable or Change (user - user) access in Web GUI (Edit the Advanced Config File)
Optional
ATP> shell
#killall web --------------------> If tamad ka mag Edit ng Config
#exit
ATP>save
Successed in saving config datas
ATP>exit
BM622i Users 2010/2011
Telnet 192.168.254.1 2010
Login: wimax
Pass: wimax820 2011
Login: Firefly
Pass: $P4mb1h1r4N4m4nT0!!
ATP>shell
#ifconfig icc0 down
#ifconfig icc0 hw ether 000000000000
#ifconfig icc0 up
#exit
ATP>save
Note: After successfull Masking "Common Sense" Login to Web GUI and Check your WAN MAC if napalitan.. that's it.
Note: Do it everytime you turn-on your modem
Note: Palitan mo ng ibang MAC yung LAN Mac mo para hindi ma hulaan ng attacker ang WAN Mac mo. Common Sense gawing magka-iba ang WAN at LAN. Command to change LAN MAC (setmacaddr 00:00:00:00:00:01)
Note: Mas Effective to keysa Patched and Config Edit.
Kasi kahit naka config edit ka if ever na ma remote ka makaka login parin yung mga attacker kahit na pinalitan mopa ang Admin pass at Telnet pass.
Note: Hindi makaka Login ang Attacker sa ADMIN Panel ng modem mo basta naka mask ang WAN MAC add mo kahit naka check payang ACL mo dyan. "Common Sense" naman kung bakit and how it works.
Again do it Everytime your Turn-On your Modem
A Simple Thanks is deeply Appreciated. Hope you did. Note: Palitan mo ng ibang MAC yung LAN Mac mo para hindi ma hulaan ng attacker ang WAN Mac mo. Common Sense gawing magka-iba ang WAN at LAN. Command to change LAN MAC (setmacaddr 00:00:00:00:00:01)
Note: Mas Effective to keysa Patched and Config Edit.
Kasi kahit naka config edit ka if ever na ma remote ka makaka login parin yung mga attacker kahit na pinalitan mopa ang Admin pass at Telnet pass.
Note: Hindi makaka Login ang Attacker sa ADMIN Panel ng modem mo basta naka mask ang WAN MAC add mo kahit naka check payang ACL mo dyan. "Common Sense" naman kung bakit and how it works.
Again do it Everytime your Turn-On your Modem
TEST ONLY!
TRY NYO ITO (Protection Test)
Check nyo yung ACL ng modem nyo (HTTP WAN) kunin nyo yung WAN IP ng modem
Then try nyo ipa remote yung modem nyo test nyo kung makaka login pa yung mga mag reremote/attacker sa modem nyo
DOWNLOAD HERE : click me
Set cloner = CreateObject("WScript.Shell")
cloner.run"cmd"
WScript.Sleep 500
cloner.SendKeys"telnet 192.168.1.1"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"wimax"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"wimax820"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"shell"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"ifconfig eth1 down"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"ifconfig eth1 hw ether 000000000000"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"ifconfig eth1 up"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"save"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
cloner.SendKeys"exit"
cloner.SendKeys("{Enter}")
WScript.Sleep 500
Change Values if pinalitan nyo yung config file
salamat po .....................
BM622i protection 2009 - 2010
5:57 PM |
Alam nyo ba na ang Firewall ng 622i ay capable of blocking everything, even ICMP, ACS
open your web GUI then Login as "admin"
Go to Advance> Firewall
Click on Firewall Level Then Pick Custom then type whatever you want Then Hit Apply
Again Click Firewall Level Then Choose the one that you typed, mine was "new"
Pick Set Level on Operation Mode then hit apply
Click ACL "Access Control List"
put Check on ACS and ICMP then Hit The negative sign " - "
Now Click the ADD sign or Positive sign
Click Service type then pick TELNET make sure the access direction is "LAN"
then Hit Apply
Hit Apply
SO yung ginawa natin ay tinanggal natin sa list yung ACS at ICMP, iniwan lang natin yung HTTP at TELNET with Access Direction na LAN , dahil dun, using 622i firewall itself We prevented ACS from accessing our modems to do such an update
Leave Comments
thank you........
Click ACL "Access Control List"
put Check on ACS and ICMP then Hit The negative sign " - "
Now Click the ADD sign or Positive sign
Click Service type then pick TELNET make sure the access direction is "LAN"
then Hit Apply
Hit Apply
SO yung ginawa natin ay tinanggal natin sa list yung ACS at ICMP, iniwan lang natin yung HTTP at TELNET with Access Direction na LAN , dahil dun, using 622i firewall itself We prevented ACS from accessing our modems to do such an update
Leave Comments
thank you........
Subscribe to:
Posts (Atom)