Los módems Huawei HG520 de Telmex por default utilizan para la cuenta de administración:
Usuario: TELMEX
Contraseña: WEP Key default del equipo.
A partir del SSID se puede obtener las posibles WEP Key.
Hemos generado un script (generarrainbowtable.py) que nos permite generar una rainbow table con el SSID y WEP Key correspondientes de 3 OUI de Huawei (001E10, 002568 y 6416F0) [Cabe destacar que esto no hubiera sido posible sin el trabajo de: hochoa@websec.mx - http://websec.mx]
Al obtener el prefijo del SSID lo introducimos al script “generarlistaposibleswep.py” que consulta la base de datos previamente generada y nos escribe el archivo “words.txt” con una lista de 768 posibles WEP Keys el cual se puede utilizar con herramientas como Brutus para realizar un ataque diccionario.
Se obtienen 768 posibles WEP Keys porque en cada OUI se repite el mismo SSID 256 veces, dando así 256 posibilidades de WEP Keys, como hemos procesado 3 OUI distintos 256 * 3 = 768
Ejemplo del ataque:
Para obtener el SSID de un modem remoto por medio de la interfaz web sin estar autenticado utilizaremos la vulnerabilidad “HUAWEI ECHOLIFE HG520c Revelación de Información” publicada por HKM que consiste en abrir la página:
http://<ip remota>/Listadeparametros.html
Introducimos el SSID obtenido a generarposibleswepkey.py
Configuramos Brutus con esta lista de contraseñas y con el usuario “TELMEX”.
Descargas:
Generarrainbowtable.py
Generarlistaposibleswep.py
Rainbowtable generada:
Part 1
Part 2
Part 3
Part 4
Part 5
Thursday, May 5, 2011
Obtaining administrator account credentials of Huawei HG520C
Huawei HG520 Telmex modems use by default this account:
User: TELMEX
Password: WEP Key default of the equipment
The possible WEP keys can be obtained by its SSID.
We have generated a script (generarrainbowtable.py) that allows us generate a rainbow table with the SSID and corresponding WEP Key of 3 Huawei OUI (001E10, 002568 y 6416F0) [This would not have been possible without the work of: hochoa@websec.mx - http://websec.mx]
The obtained SSID is then introduced to “generarlistaposibleswep.py” which queries the previously generated database and writes a file (words.txt) with the list of 768 possible WEP Keys (words.txt) that can be introduced to tools like Brutus to make a dictionary attack.
768 possible WEP Keys are obtained because in each OUI the same SSID is repeated 256.
Thus, 256 WEP Keys * 3 OUIs = 768 WEP Keys
Example of the attack:
To obtain the SSID from a remote modem we will use the vulnerability “HUAWEI ECHOLIFE HG520C Revelation of Information” published by HKM that consists on opening the page:
http://<REMOTE IP>/Listadeparametros.html
Then we introduce the obtained SSID to generarposibleswepkey.py
We configure Brutus with this list of passwords with the user “TELMEX”.
Downloads:
Generaterainbowtable.py
Generatepossiblewep.py
Generated rainbowtable:
Part 1
Part 2
Part 3
Part 4
Part 5
User: TELMEX
Password: WEP Key default of the equipment
The possible WEP keys can be obtained by its SSID.
We have generated a script (generarrainbowtable.py) that allows us generate a rainbow table with the SSID and corresponding WEP Key of 3 Huawei OUI (001E10, 002568 y 6416F0) [This would not have been possible without the work of: hochoa@websec.mx - http://websec.mx]
The obtained SSID is then introduced to “generarlistaposibleswep.py” which queries the previously generated database and writes a file (words.txt) with the list of 768 possible WEP Keys (words.txt) that can be introduced to tools like Brutus to make a dictionary attack.
768 possible WEP Keys are obtained because in each OUI the same SSID is repeated 256.
Thus, 256 WEP Keys * 3 OUIs = 768 WEP Keys
Example of the attack:
To obtain the SSID from a remote modem we will use the vulnerability “HUAWEI ECHOLIFE HG520C Revelation of Information” published by HKM that consists on opening the page:
http://<REMOTE IP>/Listadeparametros.html
Then we introduce the obtained SSID to generarposibleswepkey.py
We configure Brutus with this list of passwords with the user “TELMEX”.
Downloads:
Generaterainbowtable.py
Generatepossiblewep.py
Generated rainbowtable:
Part 1
Part 2
Part 3
Part 4
Part 5
Subscribe to:
Posts (Atom)