Crack Telecom Telecommunications Router

  
I just turned around in the forum today. I saw that such a post is about router cracking. I suddenly found that my router is also castrated like this, and the page is similar to the amazing one mentioned above. I originally thought it was the same. . So decisively use Firefox to enter the air, how is this going? Suddenly surprised, I am different from his model, so I have to rely on myself! The general idea, first try the router's weak password, the system kernel is: Linux 2.6.9 - 2.6.31, first use putty to telnet. Start trying weak passwords, admin admin888, etc., and finally enter the password with root/root after 15 minutes of trial. Then look at the directory, then go to each directory in turn to view the content, found in the home folder under the httpd folder is the root directory of the web access. Then look for it, look for it, finally found a file named db_backup_cfg.xml in the tmp folder: cat a bit, and then was brushed the dog's eyes. Reluctantly, copy it to the root directory of the website, cp db_backup_cfg.xml /home/httpd/and then display the successful execution, access the routing page http://192.168.1.1/db_backup_cfg.xml, successfully access, see a large string of English. Press Ctrl+F and enter useradmin (this is the account that Telecom gave me. I guess if there is an account, it should be near this account), and it doesn't matter: the account is telecomadmin, and the password is a bunch. Use it to enter the password input in the return 192.168.1.1, and sure enough to be multi-functional, finally, the right to succeed! The whole process is not complicated, but it is thought-provoking. Is this router for telecommunications using the default password root and root? So isn't a hacker able to invade various home routers by various means? And afterwards I tried to change the password with passwd, but show /bin/sh: passwd: not found not to change the password? Doesn't that mean only the default password, then seeing the telecom router is not a spike? I originally wanted to use tracert to trace the route to see if I could invade the route of the cell or the area, but I still didn't dare. It felt that the damage might be quite big. This article comes from [System Home] www.xp85.com
Copyright © Windows knowledge All Rights Reserved