hacker

turmio

hacker
ms

/VulnCoord (2013)

We are hacking my actively used DSL-modem so some of the details will be on private side. Sorry about that.

/Private

NMAP scans

LAN-side

$ nmap  -v -sT -p 1-65535 -A 192.168.1.1
...
Nmap scan report for 192.168.1.1
Host is up (0.019s latency).
Not shown: 65525 closed ports
PORT      STATE SERVICE     VERSION
21/tcp    open  tcpwrapped
22/tcp    open  ssh         Dropbear sshd 0.46 (protocol 2.0)
|_ssh-hostkey: 1040 7c:17:56:30:1e:48:96:50:8d:eb:ad:64:c9:93:ed:b4 (RSA)
23/tcp    open  telnet?
80/tcp    open  http        micro_httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 501)
|_http-title: Inteno Residential Gateway
139/tcp   open  netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP)
445/tcp   open  netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP)
1780/tcp  open  tcpwrapped
30005/tcp open  unknown
44401/tcp open  unknown
49431/tcp open  upnp        Belkin/Linksys wireless router UPnP (Linux 2.4; UPnP 1.0; BRCM400 1.0)
Service Info: OS: Linux; Device: router

Host script results:
|_smbv2-enabled: Server doesn't support SMBv2 protocol
| smb-os-discovery: 
|   OS: Unix (Samba 3.3.4)
|   Name: Unknown\Unknown
|_  System time: 2013-11-07 23:06:46 UTC+0

From Internet

Nmap scan report for x x 
Host is up (0.0097s latency).
Not shown: 55588 filtered ports, 9943 closed ports
PORT   STATE SERVICE    VERSION
21/tcp open  tcpwrapped
|_ftp-anon: ERROR: Script execution failed (use -d to debug)
22/tcp open  tcpwrapped
23/tcp open  telnet?
80/tcp open  http?

Shell

Infos

# cat cpuinfo
system type             : 96368SV2
processor               : 0
cpu model               : Broadcom4350 V3.1
BogoMIPS                : 399.36
wait instruction        : yes
microsecond timers      : yes
tlb_entries             : 32
extra interrupt vector  : no
hardware watchpoint     : no
ASEs implemented        :
shadow register sets    : 1
core                    : 0
VCED exceptions         : not available
VCEI exceptions         : not available

unaligned exceptions            : 5451

# iptables -L   
Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     udp  --  anywhere             anywhere            udp dpt:5060 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:5060 

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     udp  --  anywhere             anywhere            udp dpt:5060 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:5060 

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         

description
Hacking Intenos VDSL -box
started
2013-11-07


CategoryProjekti