Anda di halaman 1dari 3

http://192.168.1.

1 This post is about hacking broadband connections,for hacking broadband connections whether airtel or bsnl or reliance or tata indicom you have to downl oad a port scanner software from the internet.the following are the steps to be performed for Step Step1: Download any port Scanner like Super Scan, IPscanner, gfi LAN nat securit y scanner Step 2: First Get your ipGo to Command prompt type ipconfig /allHit enter.You will see your ip as a clients ip.suppose its 61.1.1.51 Step 3: write your ip in IP scanner Software and scan for alive IPs in the below range start:61.1.1.1 to End:61.1.255.255 and wait Step 4: Then check in your scanner which alive IPs has the port 80 open or 23 fo r telnet service. Step 5: if port 80 is open then Enter that IP in your web browser if 23 port is open then u should know how to telnet it frm cmd........ Step 6: It asks for user ID AND password type username =admin password =admin or password It is the default password for most of the routers.if denied then use on another alive IP Step 7: If success then it will show router settings page of tht IP user There g oto Home -> Wan Settings and the username and password of his account will appear there. Step 8: use Show Password tools to view the password in asterisks********. Now you have username and password ready for use Enjoy!!. now you can enjoy free bsnl or airtel broadband by performing similiar functions in your connections. tags: hacking airtel broadband,bsnl broadband tricks Disclaimer : The information provided below is for educational purpose only. The author is not responsible for any misuse of the information and discourages any illegal use of it. First lets see how simple it is to get bsnl broadband usernames and passwords. For this you shall need a ipscanner tool called Angry IP Scanner Ok so lets begin... Step 1 : Start Angry IP scanner and goto options > ports. Type in 80 in the firs t ports textbox and click ok.Then goto options > options ; in the display section select "only open ports" and click ok&save. Now on the main screen put in the ip scan range as something 59.*.0.0 - 59.*.255 .255 (for e.g. 59.95.2.3) and click the start button. And the list that shall follow next are the victims. In this example we choose the range 59.95.0.0 - 59.95.255.255. You will

be surprised at the number of victims you discover. Step 2 : Pick the ip-address of any of them and open up your browser and type in ht*p://59.*.*.* (the * should be replaced by the values from the ip you are usin g. A box will popup asking for username and password. Enter the username : admin and password : admin .There is a high chance that you will be able to login with tha t username and password. admin-admin is the default username and password that is set while manufacturing the adsl modem devices. What follows next is the modem administration panel. Simply search for the "WAN" option and click it. On the next page you will find the username and password of that user. now right-click on the page and click view source. in Mozilla/Opera This frame -> view frame source Bsnl Broadband continues to grow as one the most popular broadband services in India with high speed facilities of upto 2 mpbs. But a large number of users of this service are vulnerable to hacker attacks because discovering and hacking the vulnerable victims of this network is shockingly simple. If you are a Bsnl Broad band user then immediately assess the security of your internet connection and take appropriate steps to secure yourself. Now in the source code search for this : INPUT TYPE="PASSWORD" and the value field of this input element will have the password if its not there as in case of D-Link DSL 502T ADSL Routers the search for this input type="hidden" name="connection0 ppoe:settings/password" value="password" id="uiPostPppoePassword"and the value field will have the password Well each steps take less than 1 minute so getting username passwords wont take even 2 minutes and is easier than sending a mail.And this exposes the weak secur ity of bsnl broadband users. Well this is not a weakness but more of a mis-configuration which leads to insecurity. If you understand networking then you would probably realise that it was merely logging into the remote administration service of the modem and nothing else. This was not really hacking but a simple search of victims who are absolutely ignorant of their weak security on the internet Most routers have an option where remote management can be disabled. In other words, you can only connect to the configuration interface from the internal network, not the WAN(Internet) side. You would definitely want to make sure remote management is not active to protect yourself. Note : On SmartAX MT880 eventhough Remote Management is disabled , it permits remote logins from over the Internet. So change your mode administration passwords immediately The problem is that the professionals at Bsnl are ignorant networking and unable to advise the users or guide them to measures leaving their customers and themselves absolutely Now lets check a few more options related to this issue. A of such simplicity of take proper security unsecure. bsnl broadband modem

can be used in two modes. RFC Bridged mode and pppoe mode. In the RFC Bridged mode the device behaves like a modem device that is attached to your computer and you use some dialup software to dial into the isp through t his modem.This is PPPOE from the PC and the adsl device is a good modem. This mode is safer as the username password are on your pc and nothing is on the modem. In the PPPOE mode the adsl device becomes a router - a distinct network device with many features enabled. In this mode the username password is stored in the modem which will dial to the isp and establish the internet connectivity. The computers will just connect to this router who would be their primary gateway. N ow this is the mode where the risk exists. If remote administration is enabled the remote users from the internet can login to this modems administration panel. Now the main problem is the default admin username-password which most users dont change due to ignorance. "adminadmin" is pair that works in most cases giving you full access to the modems internals. What follows next is simple as drinking a glass of orange juice. Many users install firewalls and think they are safe, but they fail to understa nd that the firewall protects their PC not the "router" since the topology is like(PC) > router -> internet So how should you secure yourself ? 1. Use RFC Bridged mode if it is sufficient for you. 2. Change the default admin password of your modem. 3. Disable wan ping reply . ( this will prevent the hackers from directly discov ering your pc when it is on the internet) 4. Disable remote configuration feature. 5. Check your broadband usage on a regular basis and compare it with your own surfing schedules to check whether someone else has used it or not. If suspiscio us

Anda mungkin juga menyukai